x54) syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c2000000080048544500001c0000f6ffff399078ac1414bbac1414aa80009078e000"], 0x0) [ 1350.406989][T21200] device team_slave_0 left promiscuous mode [ 1350.433919][T21200] device team_slave_1 left promiscuous mode [ 1350.513658][T21827] device team0 left promiscuous mode 14:38:45 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x4c000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:45 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000002c0)={0x5, 0x8, 0xbfe, 0x2e7, 0x68}) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000200)={r2, r3+30000000}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r4 = socket(0x11, 0x802, 0x0) r5 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r5, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1350.559493][T21827] device team_slave_0 left promiscuous mode 14:38:45 executing program 4: r0 = epoll_create1(0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000340)) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) socket$unix(0x1, 0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) syz_open_dev$rtc(&(0x7f00000002c0)='/dev/rtc#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 1350.612772][T21827] device team_slave_1 left promiscuous mode 14:38:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x806, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000140)={0x400000000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000009c0)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe487], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 14:38:45 executing program 1: write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x200000, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x4, 0xffffffff}, {0xfffffffffffffffb, 0x7}]}, 0x14, 0x3) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="2f6465762f737230131cdf2d84a8e380459c68ee92a5d2779d3f253172e0466bd12e6daa374438db4e208d67d6ab032936ee89dcd101937f77da416c03881b95f5c85c423a347ddd662240f7da1002a7567d67a8af2a4dc4a3651a2fed9f50155a8ce0bb277e701fe7a8e013bf1d48fb42e71977db8d52ba7844e1adb9cb1d9f0033fb8b01b01fd0d2b55c376df21c96451219207883b1d9513fa8e8d123bed3ce22cabf831ef26218bfb987d88fcde5d0f623edd90823890d41b39bf5ec5e11fbdf8aacf9f4266a50a920716fcad12646cf6a362e643aaee4f3cb6dbb91"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='jfs\x00', 0x800, &(0x7f0000000140)='./cgroup.cpu/syz1\'') eventfd(0x100000001) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a45323, 0x0) [ 1350.667723][T21832] device team0 entered promiscuous mode [ 1350.690015][T21832] device team_slave_0 entered promiscuous mode [ 1350.707174][T21832] device team_slave_1 entered promiscuous mode [ 1350.743689][T21832] 8021q: adding VLAN 0 to HW filter on device team0 [ 1350.754697][T22043] input: syz0 as /devices/virtual/input/input19 [ 1350.777058][T22048] device team0 entered promiscuous mode [ 1350.785796][T22048] device team_slave_0 entered promiscuous mode [ 1350.794514][T22048] device team_slave_1 entered promiscuous mode [ 1350.816891][T22048] 8021q: adding VLAN 0 to HW filter on device team0 14:38:45 executing program 5: r0 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:45 executing program 4: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xa400295c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000000)='./file0\x00') [ 1350.845237][T22040] device team0 entered promiscuous mode [ 1350.862861][T22040] device team_slave_0 entered promiscuous mode [ 1350.897590][T22040] device team_slave_1 entered promiscuous mode [ 1350.942480][T22040] 8021q: adding VLAN 0 to HW filter on device team0 [ 1350.968198][T22012] device team0 left promiscuous mode [ 1350.980839][T22012] device team_slave_0 left promiscuous mode 14:38:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) close(r0) r1 = dup2(r0, r0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000280)=""/215) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x402, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, &(0x7f0000000040)) sendto$inet6(r2, &(0x7f0000000380)="57fb3c26fdb526111d46118b16920d9b320b9e57419c6de53d0fb33c1f73f6983a23c2d34238e257074e992b7ae08a04051dfb1e1dc95f83c567dc6370ec2c22e40ac2a10bb21948d17aa7eeb6c1bcb95cddafc1abe8170ec446c8fdd2cb5653cd82535d33c021eae1a66c78144a0b30fa3b44cc545e05cc58889af8e1122d2745e6b5499e1fe8350711c9ff13adbb07f2b5d5834cc629b216bb6b4343aa77e77cfe897f381eea562bf82235d3dbe387bcee861b90c6c56c88991aea89a0ea217fcfe4d83c0c27aabf164ce1ed3db343652ea0fd6e68ae606a8e7eeb00aa3883896e99ff9b63dac4053a68dc98f5bdd4af8218ecc13bfccb", 0xf8, 0x8004, &(0x7f0000000100)={0xa, 0x4e20, 0x1, @local, 0xffff}, 0x1c) [ 1350.993112][T22012] device team_slave_1 left promiscuous mode [ 1351.008558][T22048] device team0 entered promiscuous mode [ 1351.027417][T22048] device team_slave_0 entered promiscuous mode [ 1351.036284][T22048] device team_slave_1 entered promiscuous mode [ 1351.049258][T22048] 8021q: adding VLAN 0 to HW filter on device team0 [ 1351.059238][T22350] device team0 left promiscuous mode [ 1351.070382][T22350] device team_slave_0 left promiscuous mode [ 1351.076544][T22350] device team_slave_1 left promiscuous mode 14:38:45 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x60000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:45 executing program 5: r0 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:46 executing program 5: r0 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:46 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x40096102, &(0x7f0000000000)=0x2) 14:38:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) time(&(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) delete_module(&(0x7f0000000040)='syzkaller\x00', 0x800) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) [ 1351.446286][T22040] device team0 entered promiscuous mode [ 1351.480877][T22040] device team_slave_0 entered promiscuous mode [ 1351.538342][T22040] device team_slave_1 entered promiscuous mode [ 1351.553716][T22040] 8021q: adding VLAN 0 to HW filter on device team0 14:38:46 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r2 = socket(0x11, 0x802, 0x0) ioctl$KDDISABIO(r0, 0x4b37) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x4e20, @remote}}) r3 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r3, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:46 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x0) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f00000000c0)={0x7ff, 0x1007fffffff, @value=0x3ff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) prctl$PR_GET_FP_MODE(0x2e) fcntl$setstatus(r3, 0x4, 0x2000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000700)='pagemap\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e21, @empty}}) sendfile(r3, r4, 0x0, 0x10000000000443) read(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000180)={r0, r3, 0x800000008c3, 0x9, &(0x7f0000000280)="d8ab55ecb921cc4869", 0x2, 0x20, 0x6c92, 0x10001, 0x5, 0x2, 0x4, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\xfd\x00'}) sendmsg$xdp(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) 14:38:46 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:46 executing program 4: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000002c0)={0x5, 0x8, 0xbfe, 0x2e7, 0x68}) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000200)={r2, r3+30000000}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r4 = socket(0x11, 0x802, 0x0) r5 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r5, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1351.901961][T22375] device team0 left promiscuous mode [ 1351.910165][T22375] device team_slave_0 left promiscuous mode 14:38:46 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1351.964589][T22375] device team_slave_1 left promiscuous mode [ 1352.059152][T22489] device team0 entered promiscuous mode 14:38:46 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1352.101404][T22489] device team_slave_0 entered promiscuous mode [ 1352.218191][T22489] device team_slave_1 entered promiscuous mode [ 1352.294287][T22489] 8021q: adding VLAN 0 to HW filter on device team0 [ 1352.347804][T22690] device team0 left promiscuous mode [ 1352.354085][T22690] device team_slave_0 left promiscuous mode [ 1352.377107][T22690] device team_slave_1 left promiscuous mode [ 1352.645003][T22719] device team0 entered promiscuous mode [ 1352.650880][T22719] device team_slave_0 entered promiscuous mode [ 1352.667776][T22719] device team_slave_1 entered promiscuous mode [ 1352.678258][T22719] 8021q: adding VLAN 0 to HW filter on device team0 [ 1352.693982][T22798] device team0 left promiscuous mode [ 1352.699476][T22798] device team_slave_0 left promiscuous mode [ 1352.706757][T22798] device team_slave_1 left promiscuous mode [ 1352.876722][T22802] device team0 left promiscuous mode [ 1352.892939][T22802] device team_slave_0 left promiscuous mode [ 1352.902573][T22802] device team_slave_1 left promiscuous mode 14:38:47 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x68000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:47 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x5f4, 0x1, 0x7fff, 'queue0\x00', 0xb55}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0xd, &(0x7f0000000040)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @empty}}}, 0x108) 14:38:47 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ptrace$getsig(0x4202, r0, 0xffffffffffffffff, &(0x7f0000000200)) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) set_mempolicy(0x8003, &(0x7f0000000100)=0x3, 0x9) readlink(0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[0x0, &(0x7f0000000400)='security.capa%ility\x00', &(0x7f0000000440)='security.capability\x00'], &(0x7f0000000ac0)) [ 1352.999828][T22910] device team0 left promiscuous mode [ 1353.006083][T22910] device team_slave_0 left promiscuous mode 14:38:47 executing program 4: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000002c0)={0x5, 0x8, 0xbfe, 0x2e7, 0x68}) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000200)={r2, r3+30000000}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r4 = socket(0x11, 0x802, 0x0) r5 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r5, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:47 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1353.053608][T22910] device team_slave_1 left promiscuous mode [ 1353.312832][T22909] device team0 entered promiscuous mode [ 1353.318421][T22909] device team_slave_0 entered promiscuous mode [ 1353.333409][T22909] device team_slave_1 entered promiscuous mode [ 1353.341657][T22909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1353.357241][T22981] device team0 entered promiscuous mode 14:38:47 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) r1 = semget(0x2, 0x7, 0x100) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000080)=[{0x1, 0x6, 0x800}, {0x4, 0x6}, {0x0, 0x6, 0x800}, {0x1, 0x8000, 0x1800}, {0x3, 0x0, 0x1000}], 0x5, &(0x7f0000000540)={r2, r3+10000000}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) rt_sigsuspend(&(0x7f0000000240)={0xffff}, 0x8) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x7fffffff, &(0x7f0000ffd000/0x3000)=nil, 0x200002) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) r5 = socket(0x11, 0x802, 0x0) r6 = fcntl$getown(0xffffffffffffffff, 0x9) rmdir(&(0x7f0000000200)='./file0\x00') sched_rr_get_interval(r6, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ip6gretap0\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x8, 0x4) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000001c0)={'ip6gre0\x00', 0x4002}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000002c0)={'team0\x00\xfd\xff\xff\x87\xc0\x00\x03\x00\x02\xff', 0x202}) 14:38:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x69, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r2, 0x1}}, 0x18) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000440)='vegas\x00', 0x8377c82a1d841f) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x9, 0x1, 0x20000000, 0x6, 0x44c}, 0xc) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) io_setup(0x2, &(0x7f00000004c0)=0x0) io_getevents(r5, 0x8, 0x1, &(0x7f0000000500)=[{}], &(0x7f0000000540)={0x77359400}) tkill(r4, 0x401104000000016) 14:38:47 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000140)={0x3, 0x6, 0x4, 0x0, 0x0, [], [], [], 0x0, 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') sendfile(r1, r2, 0x0, 0x80000005) [ 1353.372423][T22981] device team_slave_0 entered promiscuous mode [ 1353.378777][T22981] device team_slave_1 entered promiscuous mode [ 1353.401485][T22981] 8021q: adding VLAN 0 to HW filter on device team0 14:38:48 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1353.469684][T22918] device team0 left promiscuous mode [ 1353.494040][T22918] device team_slave_0 left promiscuous mode [ 1353.536566][T22918] device team_slave_1 left promiscuous mode 14:38:48 executing program 4: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000002c0)={0x5, 0x8, 0xbfe, 0x2e7, 0x68}) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000200)={r2, r3+30000000}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r4 = socket(0x11, 0x802, 0x0) r5 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r5, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:48 executing program 2: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000140)=""/220) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="1b0000004a001f0fff07f4f90023a9000a04f51108000100020100", 0x1b) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) llistxattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, 0x0) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000000)=""/54) 14:38:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0xfffffffffffffffd, 0x4) [ 1353.932181][ C0] net_ratelimit: 21 callbacks suppressed [ 1353.932190][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.932209][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1353.937907][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1354.032881][T22981] device team0 entered promiscuous mode [ 1354.038485][T22981] device team_slave_0 entered promiscuous mode [ 1354.052388][T22981] device team_slave_1 entered promiscuous mode [ 1354.059701][T22981] 8021q: adding VLAN 0 to HW filter on device team0 14:38:48 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x6c000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1354.169752][T23296] device team0 left promiscuous mode [ 1354.175170][T23296] device team_slave_0 left promiscuous mode [ 1354.181207][T23296] device team_slave_1 left promiscuous mode 14:38:48 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000cc0)}, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x7, 0x40000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ipddp0\x00', 0x21}) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x7c, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x10, "1fa5d0fd5e292d020363a7cbb8075c719fc5ef913d613c949044837ed5556b85be25c26352b112a0719cce04d36cae3cb4b9879ad15904e2a080b8b4cc5e1d02", "20f89f21d1fe4c8d77724337b3c8f104fabf5289113545230c47e3dc1a0f0b8b"}) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)) timer_create(0x3, &(0x7f0000000100)={0x0, 0x29, 0x2, @thr={&(0x7f0000000380)="6d82f9a4e7148c1f5c4216b8eb8f897f36ae9d1af8393c37653777cb541a5ff67373a08c276a1ff9cf2e4fb9cd849f7c9d8f9044a00d023ef5c93b44a012801bdda02e5c1c671da4a3b2f5ecb98c454c30e6b87472b71d53cd59b9aed98c96912e046820baa0d39d018d61704cdd75dc0637511003cf931253a2510dbd2627c4d97951eae199a1009309749c3f6e800230ca096364f4ba8403f17b2d187905c0310fc6", &(0x7f0000000440)="689d7f669c3c1a8d89874b7edef0c4ede6a26111840d205dd6a3d4af8d407f9d1a3b93f2ffb324f962b3cc51d7776f1337fe499e51f11d8a35d1d183904f0e855dcf18b77a350d50a54805a1fafc8ecdee347c8999b7f1400fc3c1c759c466e8c4545f30172fcd2de9527cfd4fdf75de377af865659fc62d432575220caf16d7c3e8305a5de11bfd3ad1653e45c6d3f6d555"}}, &(0x7f0000000200)=0x0) timer_gettime(r3, &(0x7f0000000240)) accept4$unix(r0, 0x0, &(0x7f0000000280), 0x80800) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000600)='ip6tnl0\x00') [ 1354.322480][T23666] device team0 left promiscuous mode 14:38:49 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1354.427223][T23666] device team_slave_0 left promiscuous mode [ 1354.527832][T23666] device team_slave_1 left promiscuous mode 14:38:49 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@tipc=@name, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, 0x0}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000002900)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e23, 0x7, @empty, 0x3}, {0xa, 0x4e22, 0xfffffffffffffffe, @rand_addr="9fc51fa5e3927a91769a47511da02792", 0x7}, 0x0, [0x283c, 0x7, 0x3, 0x80000001, 0x7f, 0x1, 0x2, 0x1f]}, 0x5c) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000029c0)) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x196d4046}, 0x28, 0x2) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000400)=0x4, 0x4) 14:38:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000100)) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000140)={0x1, 0x3}) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x4, 0x80000001}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) [ 1354.641769][T23666] device team0 entered promiscuous mode 14:38:49 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000640)='mime\x9eJu\x8ae\x81]keyring\x00', 0xfffffffffffffffb) getuid() socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, 0x0) dup2(r0, r2) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ff9000/0x4000)=nil) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r3 = socket(0x11, 0x802, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000600)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=@del={0xf8, 0x11, 0x0, 0x70bd26, 0x25dfdbfe, {{'drbg_nopr_sha384\x00'}, [], [], 0x2400, 0x400}, [{0x8, 0x1, 0x100000000000}, {0x8, 0x1, 0x755}, {0x8, 0x1, 0x6}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) r4 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r4, &(0x7f00000002c0)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) bind$alg(r3, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000300)={0x2, 0x0, [{0xffff, 0x3, 0x0, 0x0, @adapter={0x3f, 0x0, 0x4, 0x7f, 0x3f}}, {0x3, 0x7, 0x0, 0x0, @msi={0x6, 0x7, 0xdfb}}]}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:49 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='scalable\x00', 0x9230835b1107104f) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/4096, 0x1148) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0xf7) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 1354.714093][T23666] device team_slave_0 entered promiscuous mode 14:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="ef2b49e5f33524ead72e0e1a118313a4afc9462f4f8d5f1c0fb276adcea3ccce5927735f79b6b8587bcfd5e1dbe5f26f8073e58a2dee4dd0fd08b3312f508240cadc56490a8e40048b857cb804b2c0a7fee59a463bfaac8c4e9719b8ec", 0x5d, 0xfffffffffffffffd) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x20000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x280000, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000300)=""/255) keyctl$get_security(0x11, r0, &(0x7f0000000200)=""/194, 0xc2) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400100, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000080)=0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40000, 0x0) [ 1354.791562][T23666] device team_slave_1 entered promiscuous mode [ 1354.823799][T23666] 8021q: adding VLAN 0 to HW filter on device team0 14:38:49 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:49 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x74000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1354.892231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.898962][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:38:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=""/103, 0x67}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/route\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xcf7, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) lseek(r0, 0x0, 0x7) io_getevents(r1, 0xfc, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000100)={r2, r3+30000000}) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1354.973354][T23933] device team0 entered promiscuous mode [ 1355.022296][T23933] device team_slave_0 entered promiscuous mode [ 1355.041800][T23933] device team_slave_1 entered promiscuous mode 14:38:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000000c0)='*cgrouptrusted\x00'}, 0x30) process_vm_writev(r1, &(0x7f0000001440)=[{&(0x7f0000000140)=""/39, 0x27}, {&(0x7f0000000180)=""/33, 0x21}, {&(0x7f00000001c0)=""/64, 0x40}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/11, 0xb}, {&(0x7f0000001240)=""/231, 0xe7}, {&(0x7f0000001340)=""/229, 0xe5}], 0x7, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/247, 0xf7}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3fe, &(0x7f0000000040)="0adc1f123c12a41d88b070") acct(0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff02070000000086dd60b4090000303a0002000000000000000000ffffe00000020000000000000000000001820090780009290060b680fa0000000000000000000000000603ffffffffffff00000000000000000000ffffac14ffbb0000000000"], 0x0) r3 = dup3(r0, r2, 0x80000) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000080)) [ 1355.168355][T23933] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.236589][T24083] device team0 left promiscuous mode [ 1355.258474][T24083] device team_slave_0 left promiscuous mode [ 1355.274835][T24083] device team_slave_1 left promiscuous mode 14:38:49 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1355.292197][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1355.298073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1355.303973][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1355.309743][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:38:49 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mlock2(&(0x7f0000129000/0x4000)=nil, 0x4000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10100, 0x0) read(r0, &(0x7f0000000040)=""/16, 0x10) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) [ 1355.386450][T24129] device team0 entered promiscuous mode [ 1355.438904][T24129] device team_slave_0 entered promiscuous mode [ 1355.452210][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1355.501194][T24129] device team_slave_1 entered promiscuous mode [ 1355.544754][T24129] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.566215][T24004] device team0 left promiscuous mode [ 1355.571542][T24004] device team_slave_0 left promiscuous mode [ 1355.580936][T24004] device team_slave_1 left promiscuous mode [ 1355.711439][T24307] device team0 entered promiscuous mode [ 1355.738954][T24307] device team_slave_0 entered promiscuous mode [ 1355.757884][T24307] device team_slave_1 entered promiscuous mode [ 1355.768103][T24307] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.792864][T24317] device team0 left promiscuous mode [ 1355.798229][T24317] device team_slave_0 left promiscuous mode [ 1355.822461][T24317] device team_slave_1 left promiscuous mode 14:38:50 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000) r1 = signalfd4(r0, &(0x7f0000000080)={0xfffffffffffeffff}, 0x8, 0x800) readv(r1, &(0x7f0000001580), 0x0) fanotify_mark(r0, 0x10, 0x1, r0, &(0x7f0000000040)='./file0\x00') mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x7770c9a154314cbb, 0x1) 14:38:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x34) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x9e6b, 0x0, 0x8}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x1000000000000000, 0x1}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff02}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 14:38:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e20, 0x7, @remote, 0x9}, {0xa, 0x4e20, 0x3, @local, 0x3}, 0xfff, [0x800, 0xc160, 0x2f50000000000, 0x800, 0x80000001, 0xcd5a, 0x6, 0x80]}, 0x5c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x80045432, 0xa05000) 14:38:50 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r2 = socket(0x11, 0x802, 0x0) r3 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r3, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x200000000000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x78, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x52}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}]}, 0x78}}, 0x4000) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1355.873274][T24129] device team0 left promiscuous mode [ 1355.878754][T24129] device team_slave_0 left promiscuous mode [ 1355.901729][T24129] device team_slave_1 left promiscuous mode 14:38:50 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1355.974665][T24518] device team0 entered promiscuous mode 14:38:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x100000000042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0xc0c1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\x00\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sendmsg$key(r0, 0x0, 0x44) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)=0x9) [ 1356.045277][T24518] device team_slave_0 entered promiscuous mode [ 1356.057290][T24518] device team_slave_1 entered promiscuous mode [ 1356.079772][T24518] 8021q: adding VLAN 0 to HW filter on device team0 14:38:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1000000000000008}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x3db, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5a, 0x411}, 0x4}}, 0x0) [ 1356.096201][T24702] device team0 left promiscuous mode [ 1356.115288][T24702] device team_slave_0 left promiscuous mode 14:38:50 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x7a000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:50 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1356.153599][T24702] device team_slave_1 left promiscuous mode 14:38:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x371fcda8, 0x7fffffffffffffff}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmmsg(r1, &(0x7f0000004f40)=[{{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000003400), 0x340020}], 0x1}}], 0x1, 0x0) 14:38:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000100)='map_files\x00') sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="2e0000001d008107e00f80ecdb4cb9d905631912080003003b000000120001000300000040d819a9060015000000", 0x396}], 0x1}, 0x0) sched_getattr(r1, &(0x7f00000002c0), 0x30, 0x0) fgetxattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='osx.-1\x00'], &(0x7f0000000080)=""/86, 0x56) accept$unix(r2, &(0x7f0000000240), &(0x7f0000000180)=0x6e) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) recvmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 14:38:51 executing program 1: userfaultfd(0x80800) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffeffffffff, 0x101000) r0 = socket$nl_route(0x10, 0x3, 0x0) ftruncate(r0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc002}]}}}]}, 0x3c}}, 0x0) socket$l2tp(0x18, 0x1, 0x1) 14:38:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x34) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x9e6b, 0x0, 0x8}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x1000000000000000, 0x1}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff02}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 14:38:51 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto(0xffffffffffffffff, &(0x7f0000000140)="50367f2a1c25d37f3bdcac0bace83613e8675ee46e24ebb7d3e919db816d6490dd65fce3c840c1b23fa4b908e691c1ebc7c85633b2eb73c602aac1c7762d1b410c7123980e1d46d4d04e7ab98c1bfb901956bf3e49017de40562624571a9467df89f5ae75c4fff10ee1968eddf65179b16561fb82be8c5f9e68bbc8ec48a9fcedac88f3d84e70182a6fdb71979aa1bb2414c6762aca7483782bde68adcf5da05d64c8cb7868b7c7ebe182759e7c03a1e4368b3c8822beb9285beaf69c5a30d753553c55f95a5ae0fda8693407baeb8", 0xcf, 0x44080, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0x10401, 0x0) dup2(r0, r1) 14:38:51 executing program 4: r0 = socket$inet(0x10, 0xf, 0x108000) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1356.955413][T24747] device team0 entered promiscuous mode [ 1356.961009][T24747] device team_slave_0 entered promiscuous mode [ 1357.001917][T24747] device team_slave_1 entered promiscuous mode [ 1357.023694][T24747] 8021q: adding VLAN 0 to HW filter on device team0 [ 1357.069980][T24790] device team0 left promiscuous mode [ 1357.076262][T24790] device team_slave_0 left promiscuous mode [ 1357.084226][T24790] device team_slave_1 left promiscuous mode [ 1357.093881][T24905] device team0 entered promiscuous mode [ 1357.099455][T24905] device team_slave_0 entered promiscuous mode [ 1357.106200][T24905] device team_slave_1 entered promiscuous mode [ 1357.114143][T24905] 8021q: adding VLAN 0 to HW filter on device team0 [ 1357.121507][T25086] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1357.156674][T25377] device team0 left promiscuous mode [ 1357.161993][T25377] device team_slave_0 left promiscuous mode [ 1357.177060][T25377] device team_slave_1 left promiscuous mode [ 1357.262721][T25383] device team0 entered promiscuous mode [ 1357.271768][T25383] device team_slave_0 entered promiscuous mode [ 1357.281259][T25383] device team_slave_1 entered promiscuous mode [ 1357.297090][T25383] 8021q: adding VLAN 0 to HW filter on device team0 14:38:51 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r2 = socket(0x11, 0x802, 0x0) r3 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r3, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:51 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @remote}}, 0xe, 0x9}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r3, 0x2}, &(0x7f0000000180)=0x8) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 14:38:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x6, '\x8deth0[\x8do_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="3082c957", 0x4, 0xfffffffffffffffd) 14:38:51 executing program 1: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x480000, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000001c0)={0x1190, 0xb711, 0x3a5a, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400400200) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101000, 0x0) r4 = creat(&(0x7f0000000180)='\x00', 0x10) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xffffffffffff9f49, 0x400000) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000082000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000001200)={0x9, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}) pkey_alloc(0x0, 0x0) [ 1357.308033][T25487] device team0 left promiscuous mode [ 1357.316300][T25487] device team_slave_0 left promiscuous mode [ 1357.325742][T25487] device team_slave_1 left promiscuous mode 14:38:52 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0xc3ffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:52 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1357.399049][T25500] device team0 left promiscuous mode [ 1357.408641][T25500] device team_slave_0 left promiscuous mode [ 1357.422745][T25500] device team_slave_1 left promiscuous mode 14:38:52 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000001340)={'syz', 0x0}, &(0x7f0000001380)='FM', 0x2, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000002380)='keyring\x00', &(0x7f00000023c0)={'syz', 0x3}, 0x0) 14:38:52 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x80000000000028, 0x0, 0x4) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x105000, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x7f, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffffffffffffeff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x20000) sendmsg$alg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000a00)="628671435790a82a4ddb5fbb0bdf62a709916f146370a6ecc13cee67a93d6a0f5226c536dde403337d95294394a86faaff37c03561727dd124418ea0057e50b69a58d9125237f582eade7b0f7f5293cc7ac2eedf8c33a20816dd6309bf52555e4bcc5d7ee4475e68799dcbde9a989f32e22b3b36e5f82fd8006f29abc6a72b019b85fd1fb9851693a92f9a71eade33b40a9fb0b5d93d895e1ae182b7c5b76da18a1ef4db2236bacd56e5772ae4cecc507614dc8a92c599fee07f70681decac9ba6a55bd0905b7cedd9ab3f9d0f", 0xcd}], 0x1, 0x0, 0x0, 0x10}, 0x4000814) r5 = gettid() syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10091}, 0xc, &(0x7f0000000240)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) getgid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) ioprio_get$pid(0x2, r5) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r5, 0x1004000000016) close(r4) dup2(r3, r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f000001d000)={0x1, 0x3ab, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r6) io_setup(0xa2c, &(0x7f0000000100)=0x0) io_pgetevents(r7, 0x2, 0x3, &(0x7f0000000300)=[{}, {}, {}], &(0x7f0000000140)={0x77359400}, 0x0) socket$inet6(0xa, 0x200000080003, 0xff) 14:38:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x78, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0xa24, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000003c0)=""/246) ioctl$PPPIOCSACTIVE(r0, 0x4010744d, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x7, 0x1, 0x64b, 0x401}, {0x7f, 0x4, 0x4, 0x9f4}, {0x8, 0x9ee, 0x2, 0x36f}, {0x0, 0x5, 0x7, 0x80}, {0x7, 0x9, 0x3a19a87c, 0xd0}, {0x8, 0x1, 0x100, 0x1}]}) 14:38:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x100000000006) r1 = gettid() perf_event_open(0x0, r1, 0xe, 0xffffffffffffffff, 0xa) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) syz_extract_tcp_res(&(0x7f0000000200), 0x80000000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) listen(r0, 0x9) accept(r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x0, 0x5) removexattr(0x0, &(0x7f00000001c0)=@random={'security.', 'trusted.overlay.redirect\x00'}) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000180)=0xfffffffffffffff8) 14:38:52 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 14:38:52 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x34, 0x40) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) getgroups(0x3, &(0x7f0000000480)=[0xee01, 0x0, 0xee00]) fstat(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) getgroups(0x4, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000700)={0x3e8, 0x0, 0x5, [{{0x3, 0x2, 0x22abbbff, 0x2, 0x4, 0xb902, {0x1, 0xa3f, 0x4, 0x3, 0x5, 0x5, 0xff, 0x8, 0x1, 0xfff, 0x9, r3, r4, 0x3ff, 0x7fff}}, {0x5, 0x2, 0x0, 0x2}}, {{0x0, 0x0, 0x1, 0x8ddc, 0x4, 0x3ff, {0x6, 0x9, 0xacfa, 0xfffffffffffffffe, 0x10000, 0x56, 0x1000, 0x3, 0x1, 0x7fff, 0x69, r5, r6, 0x8, 0x4}}, {0x6, 0x7, 0xd, 0x40, '/dev/udmabuf\x00'}}, {{0x3, 0x1, 0xff, 0x6, 0x4, 0xc93c, {0x5, 0x2, 0x3, 0x20, 0x5, 0x30000000000, 0x6, 0x7, 0xffffffffffffff27, 0x2, 0x7fffffff, r7, r8, 0xbbac000000000000, 0x9}}, {0x6, 0xae, 0x1, 0x4, '['}}, {{0x6, 0x2, 0x8, 0x4652, 0x10000, 0x10001, {0x0, 0xc3c, 0x7, 0x10001, 0x6, 0x9, 0x7a3, 0x9, 0xb53e, 0x3, 0x0, r9, r10, 0x800, 0x9}}, {0x6, 0x7, 0xa, 0x1ff, '/dev/rtc0\x00'}}, {{0x0, 0x2, 0x1, 0x20, 0x5, 0x8, {0x5, 0x4, 0x4, 0x8, 0x0, 0x0, 0x20, 0x5, 0x8, 0x0, 0x7, r11, r12, 0xfffffffffffffff7, 0x54c7}}, {0x1, 0x20, 0x13, 0x7f, '{]selfmime_typeself'}}, {{0x6, 0x2, 0x7, 0x400, 0x1, 0x10000, {0x0, 0x72, 0x101, 0xffff, 0x8, 0x6, 0x1, 0x4, 0x8001, 0x8, 0x6bb, r13, r14, 0x8000, 0x8}}, {0x4, 0x3, 0x1, 0xff, '}'}}]}, 0x3e8) [ 1358.423473][T25609] device team0 entered promiscuous mode [ 1358.435518][T25609] device team_slave_0 entered promiscuous mode [ 1358.442011][T25609] device team_slave_1 entered promiscuous mode [ 1358.463890][T25609] 8021q: adding VLAN 0 to HW filter on device team0 [ 1358.485393][T25680] device team0 entered promiscuous mode [ 1358.491143][T25680] device team_slave_0 entered promiscuous mode [ 1358.514855][T25680] device team_slave_1 entered promiscuous mode [ 1358.549362][T25680] 8021q: adding VLAN 0 to HW filter on device team0 [ 1358.631286][T26228] device team0 left promiscuous mode [ 1358.637768][T26228] device team_slave_0 left promiscuous mode [ 1358.649168][T26228] device team_slave_1 left promiscuous mode [ 1358.758118][T26219] device team0 entered promiscuous mode [ 1358.769508][T26219] device team_slave_0 entered promiscuous mode [ 1358.789805][T26219] device team_slave_1 entered promiscuous mode [ 1358.811796][T26219] 8021q: adding VLAN 0 to HW filter on device team0 14:38:53 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r2 = socket(0x11, 0x802, 0x0) r3 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r3, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000200)) creat(&(0x7f00000001c0)='./file0\x00', 0x19) 14:38:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x80, 0x0) write$smack_current(r1, &(0x7f00000000c0)='\\\x00', 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="f0000000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000000000000000000000000000000000000ff000000000000000000000002000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000f8ff0000000000000000000000000200000000000000000000000000000000"], 0xf0}}, 0x0) 14:38:53 executing program 5 (fault-call:1 fault-nth:0): r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:53 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket(0x5, 0x807, 0x3) 14:38:53 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0xffffffc3}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000010003b0e000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000100012000800010076746936040002006fbcdc5c91734ca5df418f3a33312cf68dccb28617fe23f0407ea7d79a7cf47d40ac6c2b54749dda61189b53c8b759df35e5bb14a0a44c3a1772f906d9abfe887816563aa371db162951f831b79127a47424069fa99d5fc5298302a9008c34888b9b14a10b620948586787fc0848fd3d3ec2d23952c9f3baa1c570"], 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x101000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x11, 0x5, 0x1f, 0x7, 0x8, r2, 0x8000}, 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) [ 1358.922594][T26445] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 14:38:53 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1359.018845][T26445] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1359.034025][T26495] device team0 left promiscuous mode [ 1359.052185][ C0] net_ratelimit: 17 callbacks suppressed [ 1359.052193][ C0] protocol 88fb is buggy, dev hsr_slave_0 14:38:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x1000000000000341, 0x80000000000) r1 = mmap$binder(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x1000002, 0x30, r0, 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x30, 0x0, &(0x7f0000000080)=[@acquire_done={0x40106309, r1, 0x1}, @acquire_done={0x40106309, r2, 0x1}, @release={0x40046306, 0x3}], 0xa8, 0x0, &(0x7f00000000c0)="88a14970bbdf8c5251833b0f8c57bd547338ef4c301480433e76d3eada4f7ed06f17d34607393c359dd6ca2ae2a88b8f0a99d728f4efe5951fda598fa6acb0d3c81a3e718078a8ece626dac8b49e266f9935d2381adc12b3cc609c4a9bcaaa7a5004e19853c3d190ed567537f0145acdf71df8f5c5749f8aedc92adba7cf3aca49386d826343c35de48a5a1b367267d75119610fe9a9700eaa9d49d01f906f1430b24798e8c07d89"}) 14:38:53 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000180), 0x0, 0x0) sched_yield() r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x20000) r1 = geteuid() setuid(r1) sendto$rxrpc(r0, &(0x7f0000000180)="11d51a96f0e1b838e3ebf268e693d138d6218a2d0ce377455573712cf90183e2f02199a211523619d77324d575f1beadda5f2a60bb760ec2f05299938ea5f67a8688aaf9b64c3fab83774db1b8149906a0b9a9dc7bc61cb8de346da7c19c309ead6ed6527a42940ce88575876657721f407103498b71beec0dde033fa81fe38fd737ba59af7ab6b9add7a688fa1928b4a061916a8ed762b474e0a392bbcf2dc1ec6f7cd57c803cd8e92ef3ed85b0a50835c90762ba6d2815a14382dcf7704ae826a794f52d7524398c7d4a07c434297b60b1380541c8c1fca637b3d2882ecd62e069d3290fa0ccbef365c0d3a84b1c", 0xef, 0x240080c0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) bind$can_raw(r0, &(0x7f0000000100), 0x10) [ 1359.064725][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1359.083435][T26495] device team_slave_0 left promiscuous mode [ 1359.101350][T26495] device team_slave_1 left promiscuous mode 14:38:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) finit_module(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0xfffffffffffffffe, 0x88000) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2795bbc8}}, 0x100000000, 0x200800, 0xffffffff, 0x3}, &(0x7f0000000100)=0x98) getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000140)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) pipe(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000002c0), 0xfefe) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r4, r5, &(0x7f0000000100), 0x20000000009) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x1, 0xffffffff80000001, 0x8001, 0x8, 0x10000, 0x6, 0x40000000, 0x7f, r2}, &(0x7f0000000180)=0x20) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004fcff", 0x58}], 0x1) 14:38:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1359.452190][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1359.458117][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1359.464045][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1359.469821][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:38:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f00000002c0)={0xb, {0x742bc753, 0x80000000, 0xd274, 0x81}}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$VIDIOC_S_INPUT(r2, 0xc0285629, &(0x7f0000000100)=0x3) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', r3}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', r4}) sendmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r5}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x7, 0x448, 0x0, {0x77359400}, {}, {0x4, 0x3, 0x4, 0x1}, 0x1, @can={{0x2, 0x1ff, 0x40, 0x3}, 0x0, 0x2, 0x0, 0x0, "72b50094c25ef41a"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0xffffff80, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 1359.612752][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1359.619029][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1360.161859][T26683] device team0 entered promiscuous mode [ 1360.172171][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1360.173566][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1360.196263][T26683] device team_slave_0 entered promiscuous mode [ 1360.226419][T26683] device team_slave_1 entered promiscuous mode [ 1360.237560][T26683] 8021q: adding VLAN 0 to HW filter on device team0 [ 1360.246811][T27117] device team0 left promiscuous mode [ 1360.252240][T27117] device team_slave_0 left promiscuous mode [ 1360.258764][T27117] device team_slave_1 left promiscuous mode [ 1360.371141][T27162] device team0 entered promiscuous mode [ 1360.382830][T27162] device team_slave_0 entered promiscuous mode [ 1360.389144][T27162] device team_slave_1 entered promiscuous mode [ 1360.401844][T27162] 8021q: adding VLAN 0 to HW filter on device team0 14:38:55 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r2 = socket(0x11, 0x802, 0x0) r3 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r3, &(0x7f0000000280)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x12940, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40001011, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) 14:38:55 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) write$binfmt_misc(r0, &(0x7f0000000440)={'syz1'}, 0x1200e) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x14) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="b93c564b86c1490d5f9ef9ec63ff2d38", 0x10) accept4(r2, 0x0, 0x0, 0x0) 14:38:55 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000001c0)=""/156, &(0x7f0000000280)=0x9c) r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x4000) ioctl$KVM_SMI(r0, 0xaeb7) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r2 = add_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000440)="af11407dd6189b02cf35d8c6a3fb8fce436c395e6ced39f6048af80966fb7ab8fd7113ebc67c6debc08f817999718e048d7531e32f4c6f31f15c2690cd467826abbed915b5dd35d71fce588315cb3f4ccd1bcdceb7b92c4fdfc586d22ddb75c04040964fab3b", 0x66, 0xfffffffffffffff8) getresuid(0x0, &(0x7f0000000140), 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) keyctl$chown(0x4, r2, 0x0, r3) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000700)=0x80, 0x4) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x0, 0x10}, 0xc) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000380)={0x0, 0x8}, &(0x7f00000003c0)=0x8) writev(r4, &(0x7f00000018c0)=[{&(0x7f0000001780)="f3cb4f39f625c379e53f507a55adeb23a8d7c7f541f0a435fe310ebfa79723c793cd4ecfd205b1949f768d830beddaa648fdacecfa7021eae4b4ebc5298c9024d4e194146965bde78a307e09b65f69ca85389a5c585192ffbda0ef82b1058aaf72e86fe79b787330d994166fc2efa118403d20b071cd40af1a501a1ce49b0f0fd2c5b90fad03ac56889d8064266d15aacb04455ca006554105a265262a6273b70d467038d9daea16da934ddf7571000cf07354440b8d5e438d2b9d6121555b61200c07fbcede04afbe3206ae", 0xcc}], 0x1) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) 14:38:55 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:55 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x10000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1360.506175][T27295] device team0 left promiscuous mode [ 1360.522411][T27295] device team_slave_0 left promiscuous mode [ 1360.535670][T27295] device team_slave_1 left promiscuous mode 14:38:55 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:55 executing program 4: syz_emit_ethernet(0x43, &(0x7f0000000140)={@broadcast, @local={[0xaa, 0xaa, 0xaa, 0xc0]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0xb, 0x0, 0x6, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864, 0x11, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xac1414aa}, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) [ 1360.633313][T27301] device team0 left promiscuous mode [ 1360.652001][T27301] device team_slave_0 left promiscuous mode [ 1360.665771][T27301] device team_slave_1 left promiscuous mode 14:38:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) setreuid(r2, r3) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x7, 0x8000, 0xfffffffffffffff7}) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000fec000/0x4000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f00000000c0)=""/33) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) 14:38:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xcc810, r0, 0x100000000) syz_emit_ethernet(0x6a, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb08004500005c0000000000019078ac7014bbac1414110504907800000600400000000000000000040000ac1414aaac141400082c00000000000000000000e000330200000000e000000100000000000000007f0000010000000000000000bbb523acfab63ec139f080e5fe173b612416746af2"], 0x0) 14:38:55 executing program 4: add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, 0xfffffffffffffffd) recvmsg(0xffffffffffffff9c, &(0x7f0000002a40)={&(0x7f0000001600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000001680)=""/108, 0x6c}, {&(0x7f0000001700)=""/112, 0x70}, {0x0}], 0x3, &(0x7f0000002940)=""/220, 0xdc}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@multicast2, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f00000031c0)=0xe8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in6=@ipv4, @in=@remote}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000003500)=0xe8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video0\x00', 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) unshare(0x8020000) restart_syscall() ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000200)={0x2, &(0x7f0000000040)=[{}, {}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000004c0)={0x2, 0x100000000}) connect$unix(0xffffffffffffffff, 0x0, 0x0) setns(r2, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)={0x3}) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x1) keyctl$read(0xb, 0x0, 0x0, 0x0) 14:38:55 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1361.037543][T27327] device team0 entered promiscuous mode [ 1361.075017][T27327] device team_slave_0 entered promiscuous mode [ 1361.086396][T27327] device team_slave_1 entered promiscuous mode [ 1361.135487][T27327] 8021q: adding VLAN 0 to HW filter on device team0 [ 1361.175536][T27303] device team0 entered promiscuous mode [ 1361.185839][T27303] device team_slave_0 entered promiscuous mode [ 1361.207859][T27303] device team_slave_1 entered promiscuous mode [ 1361.236422][T27303] 8021q: adding VLAN 0 to HW filter on device team0 [ 1361.360216][T27327] device team0 left promiscuous mode [ 1361.366853][T27327] device team_slave_0 left promiscuous mode [ 1361.434808][T27327] device team_slave_1 left promiscuous mode [ 1361.597401][T27301] device team0 entered promiscuous mode [ 1361.616872][T27301] device team_slave_0 entered promiscuous mode [ 1361.633904][T27301] device team_slave_1 entered promiscuous mode [ 1361.641641][T27301] 8021q: adding VLAN 0 to HW filter on device team0 [ 1361.650197][T27295] device team0 left promiscuous mode [ 1361.655904][T27295] device team_slave_0 left promiscuous mode [ 1361.662048][T27295] device team_slave_1 left promiscuous mode [ 1361.670895][T27303] device team0 entered promiscuous mode [ 1361.691304][T27303] device team_slave_0 entered promiscuous mode 14:38:56 executing program 0: r0 = socket$inet6(0xa, 0x7fc, 0x3) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000440)="ff", 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") 14:38:56 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x80, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x7f, 0xb74e}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x77, 0x600000000000000, [0x40000080], [0xc2]}) 14:38:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcs\x00', 0x400000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000640)={0x2000}) r3 = shmget$private(0x0, 0x1000, 0x120, &(0x7f0000ffd000/0x1000)=nil) r4 = getuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) shmctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0xffff, r4, r5, r6, r7, 0x20, 0x2}, 0x100000000, 0xa3e5, 0x2, 0x10001, r8, r9}) r10 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0xbc21) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) accept$inet(r10, &(0x7f0000000480)={0x2, 0x0, @remote}, &(0x7f00000004c0)=0x10) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) unshare(0x24020400) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000500)="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") recvfrom(r1, 0x0, 0x0, 0x205f, 0x0, 0xfffffffffffffff9) ioctl$VHOST_SET_LOG_FD(r10, 0x4004af07, &(0x7f0000000440)=r10) 14:38:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffb, 0x2000c2) bind$unix(r1, &(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_CREATE(r0, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000380)=""/145, 0x91, 0x100000001, 0x795, 0x80, 0x9, 0x3662}, 0x120) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="4ba3be8862b0e2e0e9404f7d845174ab3bfb5b268511de4716fa414561d8890a49a76d2868e184d9b68d825d8eccb59f3207ed32a71f1f1eb61bcd6b05322c0095b71b1940f6676af99cf3629d19bfe53faf290f6ff886171c1a16cefeec958ce1392884439de2a605e5cc75c8dc6dd9fe56694d840a49f00e7436e3c52236bbf2a2ce1464d64eebe9ce81b491ffd69baf5b55014d574ebef167", 0x9a}, {&(0x7f0000000100)="8b4762c5b6e985be1d956574df71f1353815fcc2831c26f3a971c85c46930579fc8c5dc65d477d8fe9070304a9ab956b1454329ad256", 0x36}, {&(0x7f0000000140)="b255d5e4d2346e3bf4e2834a5408fc50e8d7ec6cc50158da6e74699f7fec9f592cc75cb22bee8fe6520af2fbc007bfd9189f4e81887e8a5b5067cfa1d4d13005339b41aff53c942dda15f4acb63bb2d763628326879802b54bc2fa95d882a8ab1ffbada067d1db5f3ccc72780f276fddbcf6e8e1fd76f6953dc5d8beab0bffd61542c489429f1271e1d924b12fa1b85cdfacf1e5ceb4f56e85ca5f1a540497f66942435081961f422c71bb96aa2d1e15f7a06545644a3d931954b3e76842b3efc31716c47651ef5b490f0932be99c4ab3bd9180c9d2ab60ddd61c3d59f93f5cdc832", 0xe2}], 0x3) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003081000418e00000a04fcff", 0x58}], 0x1) [ 1361.707636][T27303] device team_slave_1 entered promiscuous mode [ 1361.720340][T27303] 8021q: adding VLAN 0 to HW filter on device team0 14:38:56 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x1000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:56 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:56 executing program 4: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0x400) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r4, &(0x7f00000001c0)="53e639c3c78b7563d64eaafaa19cc0f3f57b79a2c44a6452c409b2bdc88c513b26050bb3b2509fa6d5f93e30005c3e3f5ea86f2dae2f886896470dbce1b7fe821307c7f1861c1dd47fd8b4b397a4f5a6332b308d7f79cf72cd42bde51bd020d0c5ad0f63d4e15e79a9c9514c3e33adbb33b16a7d6994af0bcf01a8381b59bdb40927146bae4189be32422e924ac257f32fdb9c174c9abe9beb59e330d774", &(0x7f0000000080)=""/123}, 0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)}, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x80000) ioctl$VIDIOC_CROPCAP(r4, 0xc02c563a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, &(0x7f0000001580)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442404020000006766c744240600000200670f011c240f20c066352007000a0f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 14:38:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x9, 0x0, 0x1000}, 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x200000, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x3ff000, 0x12000) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3f, 0x20000) write$vhci(r1, 0x0, 0x293) r2 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000180), 0x4) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="9f36a22d1670eae5b8177cfe00a2abb91a5830f469", 0x15, 0xfffffffffffffffa) keyctl$setperm(0x5, r3, 0x80004) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x900, 0x0) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x2, @empty, 'batadv0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 1361.948437][T28151] device team0 left promiscuous mode [ 1361.970492][T28151] device team_slave_0 left promiscuous mode 14:38:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\x00\x00\x00\x00\x00\x00\t0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') chdir(&(0x7f0000000340)='./file0\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}, 0x800) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000100)={{0xff, @rand_addr=0x89a3, 0x4e24, 0x1, 'dh\x00', 0x2, 0x8, 0x3e}, {@dev={0xac, 0x14, 0x14, 0xe}, 0x4e21, 0x10000, 0xfffffffffffeffff, 0x2, 0x5}}, 0x44) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x30, 0x1, 0x8}}, 0x14) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000013) [ 1362.130353][T28268] device team0 entered promiscuous mode [ 1362.157825][T28268] device team_slave_0 entered promiscuous mode [ 1362.167149][T28268] device team_slave_1 entered promiscuous mode [ 1362.196451][T28268] 8021q: adding VLAN 0 to HW filter on device team0 14:38:56 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1362.246787][T28151] device team0 left promiscuous mode 14:38:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) msgget$private(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x3}, 0x1c) shmctl$SHM_LOCK(0x0, 0xb) r2 = semget(0x2, 0x3, 0x400) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000300)=""/40) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x400, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000280)=""/38) r4 = socket(0xa, 0x802, 0x0) connect$inet6(r4, &(0x7f00003ef000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r4, &(0x7f0000eeefc8)={&(0x7f0000fef000)=@in6={0xa, 0x4e20, 0x0, @loopback}, 0x80, &(0x7f0000437000), 0x0, &(0x7f000056cda0)=ANY=[@ANYBLOB="280000005baa7a7e09c86a15e6f2ff7fefffff11"], 0x14}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0x70, 0x0, 0x1, 0x4, 0x86, 0xbbf}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x4e24, 0x0, @mcast1}, r5}}, 0x48) r6 = timerfd_create(0x0, 0x0) timerfd_settime(r6, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) timerfd_settime(r6, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000000c0)) 14:38:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000000240), 0x1000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) r2 = semget(0x3, 0x2, 0x8) semop(r2, &(0x7f00000000c0)=[{0x3, 0x6, 0x1000}, {0x4, 0x1}, {0x4, 0xab8, 0x800}, {0x4, 0x65a, 0x1000}], 0x4) r3 = dup(r1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) finit_module(r1, &(0x7f0000000000)='.+}-ppp0!ppp1eth1[,user-em1bdevmd5sum\x00', 0x2) fcntl$setsig(r0, 0xa, 0x13) r4 = accept$alg(r1, 0x0, 0x0) sendto(r4, &(0x7f0000002500)="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", 0xb50, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 1362.304199][T28151] device team_slave_0 left promiscuous mode [ 1362.341646][T28151] device team_slave_1 left promiscuous mode 14:38:57 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a00010000000000000000001c0200000000000000006af9916cc90000"], 0x1c}}, 0x0) [ 1362.426669][T28268] device team0 entered promiscuous mode [ 1362.531203][T28268] device team_slave_0 entered promiscuous mode [ 1362.581237][T28268] device team_slave_1 entered promiscuous mode [ 1362.614829][T28268] 8021q: adding VLAN 0 to HW filter on device team0 14:38:57 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x100000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0xae}}, 0x0) 14:38:57 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1362.837358][T28947] device team0 left promiscuous mode [ 1362.860301][T28947] device team_slave_0 left promiscuous mode [ 1362.878354][T28947] device team_slave_1 left promiscuous mode 14:38:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x101400, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f00000002c0)={r1, 0x8}) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x204002, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @local}}, 0x4, 0x8, 0xfffffffffffffffa, 0x9, 0x8}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={r4, 0x90, 0x30}, &(0x7f0000000240)=0xc) 14:38:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) msgget$private(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x3}, 0x1c) shmctl$SHM_LOCK(0x0, 0xb) r2 = semget(0x2, 0x3, 0x400) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000300)=""/40) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x400, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000280)=""/38) r4 = socket(0xa, 0x802, 0x0) connect$inet6(r4, &(0x7f00003ef000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r4, &(0x7f0000eeefc8)={&(0x7f0000fef000)=@in6={0xa, 0x4e20, 0x0, @loopback}, 0x80, &(0x7f0000437000), 0x0, &(0x7f000056cda0)=ANY=[@ANYBLOB="280000005baa7a7e09c86a15e6f2ff7fefffff11"], 0x14}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0x70, 0x0, 0x1, 0x4, 0x86, 0xbbf}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x4e24, 0x0, @mcast1}, r5}}, 0x48) r6 = timerfd_create(0x0, 0x0) timerfd_settime(r6, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) timerfd_settime(r6, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000000c0)) 14:38:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) msgget$private(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x3}, 0x1c) shmctl$SHM_LOCK(0x0, 0xb) r2 = semget(0x2, 0x3, 0x400) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000300)=""/40) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x400, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000280)=""/38) r4 = socket(0xa, 0x802, 0x0) connect$inet6(r4, &(0x7f00003ef000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r4, &(0x7f0000eeefc8)={&(0x7f0000fef000)=@in6={0xa, 0x4e20, 0x0, @loopback}, 0x80, &(0x7f0000437000), 0x0, &(0x7f000056cda0)=ANY=[@ANYBLOB="280000005baa7a7e09c86a15e6f2ff7fefffff11"], 0x14}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0x70, 0x0, 0x1, 0x4, 0x86, 0xbbf}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x4e24, 0x0, @mcast1}, r5}}, 0x48) r6 = timerfd_create(0x0, 0x0) timerfd_settime(r6, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) timerfd_settime(r6, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000000c0)) 14:38:57 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:57 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0xffffffff, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000040)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x980912, 0x0, [], @value64}}) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@rc, &(0x7f0000000140)=0x80, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/4096) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc88f}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x81}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3f}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x20008000) [ 1362.954649][T28993] device team0 entered promiscuous mode [ 1362.978612][T28993] device team_slave_0 entered promiscuous mode [ 1363.004330][T28993] device team_slave_1 entered promiscuous mode 14:38:57 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_bridge\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="5100000000000000000000000000f30000000000000064000000000015948e1d750546fc67000000d4d893"]}) 14:38:57 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f0000000300)="2e2100000058000000000000000004005f93fd24700dcf0eb098143d1baad95ae64a3bb0ceb3744991f5ae6e334cb97f88cdc9190412650f39bf1e4df2c7f5ea9232973516b5446ef8747e8cb9c3ce3ea470bf15ba1aae0db0663a572bbefacd5788f4721ca808d8ac56", 0x6a, 0xfffffffffffffffe) sysfs$2(0x2, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x3e580, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0xf0, r3, 0x312, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x148}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x93}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x54, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_NET={0x4}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000140)=""/83, 0x53, 0x0) [ 1363.049286][T28993] 8021q: adding VLAN 0 to HW filter on device team0 14:38:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080)=0x5, 0x4) write$binfmt_script(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x32d) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000140)=0x8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1363.181633][T28947] device team0 left promiscuous mode [ 1363.207627][T28947] device team_slave_0 left promiscuous mode [ 1363.246942][T28947] device team_slave_1 left promiscuous mode [ 1363.298473][T28993] device team0 entered promiscuous mode [ 1363.317208][T28993] device team_slave_0 entered promiscuous mode 14:38:58 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x200000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:58 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7f69, 0x204140) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000780)='./file0\x00', 0x0, 0x807a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1363.347598][T28993] device team_slave_1 entered promiscuous mode [ 1363.375440][T28993] 8021q: adding VLAN 0 to HW filter on device team0 14:38:58 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x19d000) sendmsg(r0, &(0x7f0000000d00)={&(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000100)="ecc72710aa2fb86cf122604a94d567e7b94345ec6ee46d8e13ed10cb54c663ea94dd95a850aa95f5348be0301f2e75a893c3680b45f1d22e11861c43f4c3cb79cc14efd4b6dc878f838c3775383e5fe3c14342c307b536ef846fadcd5f68be7dc4f65d1557e60da274506ee7e48b0893957dbfeabc826680710c05abb108f6d07b903c27db57fc66ad7e2ba539182c470a457a8f1d17eb3306c608fc29ae37ca5243", 0xa2}, {&(0x7f0000000240)="bcf204bf069ec72bf185ee825dcf4ef47e4b36432f3b66a1840605e8a9f37da32dd5efd0fd37c5cec55459710854ccc77b5a7690442a9516441f26a9dcd0dc556beb8d2f64a1c6706e5c1b12", 0x4c}, {&(0x7f00000002c0)="2e94056e95c341a0197a26f172879ea6bd4e7ce530b1f5a27799a6e52e84c5e104c558ff70b22b095f7d514fd8c5d9a59f192aa76e745351fb495a95e9384ce3eeb5db2146611b4a4f90ae835c745405b4ab536b284c0520095931478361d7435d6b1e4de59a3f9e967c2683ff5e3f57258d7e791b3e7065675fd5fc9a4d401bde288c9dca485dfd87068dde23f86e615fd75ce2d8e1d44f683bbbaaf9e9af679240c7005a1921fc9a4833d5a308b15f5addcda665e57e9300a211aa9a44a40c8048", 0xc2}, {&(0x7f0000000400)="d233fc08857bfe711ed9470a97a4a3d043f81cbe94bf34bc007a96eb0aea78f40cdc341b031d6afcb376d0cb473becd05347329ccaefd1851b73ee4d9dd6a53fd055aad0e596475cbc1064eedb9ab91dd51e18cb32a0c1fa0a34748cf9d6d812b8af63a39800", 0x66}, {&(0x7f0000000480)="6590d9b1869d2fffe8ae9903b6852ad6a2decbb7ee2e98a2dbb83c160339a24494122ec60efda23d92d79d1dc3be78e7ef6f5f5cc86bc70c1cd0cd97fb1e0eab71817315d80f7045e4d474fd64dfc7454aad3b921b92672c09c52cca4969d92ff690c5741ec129aa797d2bfcaf21a18b03b45332066d68f524c81234b588bfe8be65441ad04b8c918e5a3afa2bf419e6cbb91491cd521613b3defcbf20d5a0f85afbf38dea91ced5ba17871019107c310996ca701815afd5efa924b5653ac5f82855eee87197f71fb2154d474b28af764294e7b67b42b3d95070e0d4954214", 0xdf}, {&(0x7f0000000580)="ab3fa196abdd98819c55d319a42b0a05e33912dee8583cc09cd137896aed87d8a262e9a6d6497e7d28f7f172b8d8ac2c0b342717e15995fef2b92a5f62fbb2f749b7451d933a694c269831166d3f06c3a63334a3c1e4deab52c40e3546168dacbddb41f91cbdaf9469747c29a3d48d7547cb1548c19b4f4451c54c3ca4a0eae9c6653a8906ba7d050e865f32a22513e446a195652244f5c80dda7f0b95f691b85fa69d2fb96e152d21447b38e9972b1cd06267b5e6cc2f25d6607d2b52583d", 0xbf}, {&(0x7f0000000640)="0ae99187781a3ed1bbba23e1143923802bb5d92cd2411d14ef3c09eb92686d2753f0f6842558e5e05f5e247460ba96b5e8cbb1191b4c5d801def3061d59d71b55de127326d5013f17e3086b85d5807c7be0869dfd9a006185445377e73159c87dde221e175fa545b05f489e58372e38cdaddb2b37e99814662ee252ea977744720f86a298b32c9e28baf7bd5eaff95205c84", 0x92}], 0x7, &(0x7f0000000780)=[{0x68, 0x1ff, 0x5, "79dffca9def28508407a8b1aa694b454b1cc20522c6a24010808646627cd684448aa49e847084b7712477fb6a1b593d22be272ba1b12bf0277363741ab559e38a2b51c93e6d199f8f38566f0142811653b"}, {0xb8, 0x10b, 0x14000000000, "72d8fbcba0a4223a3f45709c057983612471159b4ca4e4873b94e91a72daad4241546052aafe3ecd3691c80d9fe69b7494bbe51b4c378c9a681f46e3d9a5d46701745c40735646897436d5fb1aea2e3e0874f4da11690f33c71f29e1b450e6f2598ddd23f661b12029d07640143d86b49d8db8108a9ab0b995cbedb13b715b5424d2fc64c8cce0cc6e126468c3912def89d4d2bb996b065e249fff5395953f37b708628669818f05"}, {0x30, 0x0, 0x5, "d6aab59f987a167bf0f6c7522d7d8f3b8b9d304a494a1edcdcdab434709a"}, {0xc0, 0x88, 0x800, "73c43ec96de6d3260d942e99534c292d417dfadd75dff9601c81606f57f407df0e813224cc56212e22eb6aa9584146055e71cf606947f134734a0ff2696f77e4e65b86ccdfbeea2b2b93a05b2b44baddb9fdfeb87b43a76499551bb7d8bed8cc875ac5fe8c39a34e2afb486e7c07d351b671ffaa073c1de7408c654ab6c4b4c68e13ec617c382899fb6df44f3bcbedeb003d1ad8d011a832b9af651476a15d32bb09a98265d9a59411dd696f7a"}, {0xe8, 0x113, 0x66, "eb18b1264cfebb9e733a0534468bd1b0063f0cac5d858fab585cac9d5dfe3f21e83b277099e34a0e032bf2200e0b9440b720b0f4f4800b04d57a3a36ba576ced3e1cc9cb8fad0c020b832ba8b8bb474f732910721e2d21e3835dc4d4eaca6bc20ff1cd605733dafbabe672991e63317240192a3f61ddfd47599a9bd8b880aad3fa433e97147c434e0dc3d8f62dd28c39debd3357fab5e6892b651127817390160d9e4dbc6dea473214f03faa0e1a7b4a19b6e8018972b6cc51ed4ad9279e9ede2469de0d8bde90b7abcf103153791419b3e0308785"}, {0xb8, 0x0, 0x5, "aa3d354711d9d7765fd7057218c71a1265088564aea4e1ac32253f5aef45f6f9958baf5e15f509e32f5e9d19f3403929b77c155f6ef8b0c134919a8e2433734effc58b17a81ce024a4b88c0cad9290b68b1c45de9dd991c3b3c04f186978d5ab984d5141ba60ae894bf9b611ec958ade2a695207e8aa98febf716ace145998418f190a0d9517d142cd213618f2040ca1d3cd4979735d652eb792d82f6da04b3d39"}, {0xc0, 0x0, 0x1ff, "c71867f30b4803448c89b5f1591d0342337345121c2a1787f9d6c962625a4e6a2f7f0e559a9dab3b38a109961888af0eceb489077a98cb7a2540f69051c54d8312173048ccc0ca8f12364ed1e4ef297b2f797844ad8863c2d39af6fcdbf080ea5f6b2eadcdd5d1d6a23c1e925418d4032b930ac177ff5ea01c8762ba78ba8005597b7e9948bf86f7cc91fcdd34e5cf9dc4fb7c5711f8087aa925bc6488c2a487efa16c9be8fa327f67e3e7ce"}, {0xf8, 0x0, 0x7, "45ccaaf3137beef56ec9f89ace527a40aa2abab13570c6438b4821e314d9aab41681032d35a8549d32ab6f035be469f2955917baf39d60ed267ee2b550024bc2bb0971e90d40af3cbabecb4f7cacdf7df0fcd9d4a62561e2a36e49e28170d4e14a64cd101c36c2f364a02febeb2e8d62905428fa1803ea45e5b7133f19497917a98f799c90d4e392c46f22a8ed18ba7abbb2f5ba871df3d8ab5fe95cca98da1bc603082626b39120f2b201715d4b047d8c45971acd4fdd8607569112e1dfbfc3da741f92102765c4690913ad39ae860b90b547a2a5f91886caa8cbde801a1c786c28650457708d94"}], 0x568}, 0x44014) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfffffff5, 0x100000]}, 0xd}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x45) flistxattr(r1, &(0x7f0000000000)=""/4, 0x4) 14:38:58 executing program 2: r0 = socket(0x80000000000010, 0x80002, 0x7fffffff) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@mpls_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, [{0x0, 0x3}]}]}, 0x24}}, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$void(r0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000000)={{0x4, 0x73, 0x9, 0x5, 0x0, 0x100000000}, 0x3fa14169}) 14:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f0000000300)="2e2100000058000000000000000004005f93fd24700dcf0eb098143d1baad95ae64a3bb0ceb3744991f5ae6e334cb97f88cdc9190412650f39bf1e4df2c7f5ea9232973516b5446ef8747e8cb9c3ce3ea470bf15ba1aae0db0663a572bbefacd5788f4721ca808d8ac56", 0x6a, 0xfffffffffffffffe) sysfs$2(0x2, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x3e580, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0xf0, r3, 0x312, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x148}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x93}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x54, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_NET={0x4}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000140)=""/83, 0x53, 0x0) 14:38:58 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1363.509531][T29255] device team0 left promiscuous mode [ 1363.522737][T29255] device team_slave_0 left promiscuous mode [ 1363.549572][T29255] device team_slave_1 left promiscuous mode [ 1363.665065][T29294] device team0 entered promiscuous mode 14:38:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x60, &(0x7f0000000180)={&(0x7f0000000000)={0x30, r1, 0x825, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x260, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x401, 0x181000) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 14:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f0000000300)="2e2100000058000000000000000004005f93fd24700dcf0eb098143d1baad95ae64a3bb0ceb3744991f5ae6e334cb97f88cdc9190412650f39bf1e4df2c7f5ea9232973516b5446ef8747e8cb9c3ce3ea470bf15ba1aae0db0663a572bbefacd5788f4721ca808d8ac56", 0x6a, 0xfffffffffffffffe) sysfs$2(0x2, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x3e580, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0xf0, r3, 0x312, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x148}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x93}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x54, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_NET={0x4}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000140)=""/83, 0x53, 0x0) [ 1363.718091][T29294] device team_slave_0 entered promiscuous mode 14:38:58 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1363.823157][T29294] device team_slave_1 entered promiscuous mode [ 1363.912953][T29294] 8021q: adding VLAN 0 to HW filter on device team0 14:38:58 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:58 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20200, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) r1 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfffffffffffffebb, &(0x7f0000000040)={&(0x7f0000000200)=@setlink={0x3c, 0x13, 0x52d, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8, 0x1c, r1}, @IFLA_IFNAME={0x14, 0x3, 'ip6gretap0\x00'}]}, 0x3c}}, 0xfffffffffffffffd) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x223, &(0x7f00000003c0)=[@assoc={0x0, 0x117, 0x4, 0x12a}, @op={0x0, 0x117, 0x3, 0x1}, @iv={0x0, 0x117, 0x2, 0x0, "dde537c0d0a377aae42f7dad01339a18411979322b7445068d68079aa64b7ad0f36f8bd227442528452cce32b63a8330705a98b45adf6d609a3d34514d78a81bf5335d33b589842dbda76d9de93fcb5ad10b7cfeaa184bba1c47612203d601be8b766af3dcc3f32a5197a29b649a1064ebe7e7582701c3bea4231f0b9091dc170caf2335e574b76f682f95133f6de330b237d57185102136795d6e16acc09ca73fee7478d8c83741291ed70bda8798364bded34dbae20fc9e6dc42fc3b9c5329557cbe5be359475c2219d487acd3f92cf7b709d6b59c275f10ecaaf4e48177d0af5e7a1944a278c00808a00ec502b18f3868943a2334"}, @assoc={0x0, 0x117, 0x4, 0x1}, @op={0x0, 0x117, 0x3, 0x1}, @iv={0x0, 0x117, 0x2, 0x0, "de744e892f441f16b8427e9f89bfaf71101393de62fd14e51b6828e70f2018aa187defd335b28db9c669c66239846df5969f68ef5789e3"}, @assoc={0x0, 0x117, 0x4, 0x7fffffff}, @iv={0x0, 0x117, 0x2, 0x0, "1814b1bf387f8220fdb827dfcd37116eed2053008457dddc2c48f7895fb3fa1b977dd750d20c1016b0fb46343643596fd3a841937b6f0abf71478f55313ba972989fee87ec1badc79e0a71505320d1a345d1f883bd0e5871ce7598efe8b09e5a9b4e22ede7b23c948039045d9620c5e0f2bbe4d0cdc561a58b0ff63dbca9857ae9e5ade04b22614fe549472ebfcd41a54bdaaf5f6ca17a23d6b2fe0e9be9967be622ea60ca86f4a8dd9519688ec67d50ffcc99bde7b06bfc"}, @assoc={0x0, 0x117, 0x4, 0x8}, @assoc={0x0, 0x117, 0x4, 0x9}], 0x17f}], 0x492492492492805, 0x0) [ 1364.057982][T29255] device team0 left promiscuous mode [ 1364.142953][T29255] device team_slave_0 left promiscuous mode [ 1364.164655][T29255] device team_slave_1 left promiscuous mode [ 1364.197260][T29294] device team0 entered promiscuous mode [ 1364.205624][T29294] device team_slave_0 entered promiscuous mode [ 1364.212451][T29294] device team_slave_1 entered promiscuous mode [ 1364.220563][T29294] 8021q: adding VLAN 0 to HW filter on device team0 14:38:58 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x68, r3, 0x10, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xfffffffffffffff9, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00', {}, 0xffffffffffffffff}, 0x45c) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) 14:38:58 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f00000004c0)=[{&(0x7f0000000140)}, {&(0x7f0000000180)=""/232, 0xe8}, {&(0x7f0000000280)=""/111, 0x6f}, {&(0x7f0000000300)}, {&(0x7f00000003c0)=""/255, 0xff}], 0x5) readv(r0, &(0x7f0000001200)=[{&(0x7f0000000040)=""/233, 0xe9}], 0x1) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[@ANYRESHEX], 0x12) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00000eb000/0x3000)=nil, 0xdff13000, 0x0, 0x0, 0x0) mmap(&(0x7f00005a4000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0x0) 14:38:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x204000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd3, &(0x7f0000000000), 0x3c) 14:38:58 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x2000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x80247009, &(0x7f0000000000)) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x27, 0x11, 0x1, 0x9, 0x5, 0x27, 0x0, 0x103}) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000180)={0x9, 0x2, &(0x7f0000000140), {0x0, 0x7, 0x34424752, 0x5, 0x3f, 0x5, 0xb, 0xf9d8}}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x2081, 0x0) 14:38:58 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="f1ffffff16020007002e2f26696c6530f0c0a75643bfffff442a5e6c38"], 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000200)=r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x208200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x3900000000000048) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000240)) [ 1364.332179][ C1] net_ratelimit: 22 callbacks suppressed [ 1364.332188][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1364.332209][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1364.337961][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1364.361833][T29700] input input21: cannot allocate more than FF_MAX_EFFECTS effects [ 1364.433263][T29776] device team0 left promiscuous mode 14:38:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) sync() r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000002c0)=""/246) r3 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:var_t:s0\x00', 0x1b, 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r3, r1, 0x0, 0x102002702) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000480)=""/155, 0x9b) 14:38:59 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890d, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:38:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3, 0x18, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffdb4e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f00000001c0)=""/140, 0xffffffffffffffc7) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000002c0)={r1, 0x401}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @empty, 0x868}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x2000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="420700000000000000718f3f0b"], 0x10}}, 0x0) [ 1364.465801][T29776] device team_slave_0 left promiscuous mode 14:38:59 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) write$binfmt_misc(r0, &(0x7f0000000440)={'syz1'}, 0x1200e) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="b93c564b86c1490d5f9ef9ec63ff2d38", 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1364.562558][T29776] device team_slave_1 left promiscuous mode [ 1364.575823][ T26] audit: type=1804 audit(1553438339.158:34): pid=29983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/newroot/984/file0/bus" dev="ramfs" ino=212331 res=1 14:38:59 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8915, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1364.695964][T30019] device team0 entered promiscuous mode [ 1364.799253][T30019] device team_slave_0 entered promiscuous mode [ 1364.864461][T30019] device team_slave_1 entered promiscuous mode [ 1364.959214][T30019] 8021q: adding VLAN 0 to HW filter on device team0 [ 1365.059652][T29776] device team0 left promiscuous mode [ 1365.108129][T29776] device team_slave_0 left promiscuous mode [ 1365.183152][T29776] device team_slave_1 left promiscuous mode [ 1365.285440][ T26] audit: type=1804 audit(1553438339.868:35): pid=30059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/newroot/984/file0/bus" dev="ramfs" ino=212331 res=1 [ 1365.306895][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1365.306949][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:38:59 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x400000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:38:59 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xa4f, 0x400) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e21, 0x4, @loopback, 0x6}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000380)={r1, 0x7}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000180)={{0xff, @remote, 0x4e21, 0x2, 'dh\x00', 0x2, 0x6, 0x15}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 0x5, 0x9, 0x5}}, 0x44) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) r3 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000fec000/0x4000)=nil) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x84000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r4, 0x1a, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x80000001, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x80) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000000c0)=""/33) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x10000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={r5, 0x159a}, &(0x7f0000000140)=0x8) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) 14:38:59 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x84, @rand_addr, 0x0, 0x0, 'sh\x00\x00\x00\xd0\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 14:38:59 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:00 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1365.549571][T30347] device team0 entered promiscuous mode [ 1365.570067][T30347] device team_slave_0 entered promiscuous mode [ 1365.586195][ T26] audit: type=1326 audit(1553438340.168:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x50000 [ 1365.616197][T30347] device team_slave_1 entered promiscuous mode 14:39:00 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8917, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1365.692212][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1365.698070][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1365.703960][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1365.709728][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1365.715978][ T26] audit: type=1326 audit(1553438340.168:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 1365.739966][T30347] 8021q: adding VLAN 0 to HW filter on device team0 14:39:00 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x84, @rand_addr, 0x0, 0x0, 'sh\x00\x00\x00\xd0\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 1365.819990][ T26] audit: type=1326 audit(1553438340.178:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 1365.848349][ T26] audit: type=1326 audit(1553438340.178:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 14:39:00 executing program 1: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x10000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x523, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x152}}], 0xfffffffffffffdab, 0x0, 0x0) [ 1365.848498][T30526] device team0 left promiscuous mode [ 1365.871173][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1365.878579][ T26] audit: type=1326 audit(1553438340.188:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 1365.932389][T30526] device team_slave_0 left promiscuous mode [ 1365.954914][T30526] device team_slave_1 left promiscuous mode [ 1365.975959][ T26] audit: type=1326 audit(1553438340.198:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 14:39:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0acc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000001c0)=""/255, &(0x7f0000000100)=0xff) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008551d, &(0x7f0000000340)={0x0, 0x2}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9, 0x0, 0x5}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000300)={r2, 0x0, 0x6}, 0x8) [ 1366.072498][ T26] audit: type=1326 audit(1553438340.208:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 1366.094955][ T26] audit: type=1326 audit(1553438340.218:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30341 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 14:39:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000540)=0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) gettid() bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x36c) r4 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r4, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote}, 0x0) r5 = dup2(r3, r3) sendmsg$kcm(r2, &(0x7f0000002540)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x2, 0x0, 0x2, {0xa, 0x4e23, 0x8, @remote, 0x3}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000240)="b6ba326f5e88b09c65d43d145a9604a4f35d90cad257f48d24cda8bbbad258cc0b352543dfe4999a7851d0dd37dc24a7833b8965790981846315eb69a9aab86266d6dc0d095c65af813f6c0bfc9b0ff76bf738bd3a80e2421e7ca32d5d2aca5e0b7e228d416c9dd473dd29c250500ba0ebe75dda4c646f41e591ff100f288a955e", 0x81}, {&(0x7f0000000300)="10e774411682e614397a3eef4427fd9f4577af689e25168cb2fe46eb01cfc9c61e90844ae98e07240362beb2bdcef5816294596e4ff7bdb8fdcd0382ce0ef3c11aecc4afa0f891bb9993a06e9c0607b8f4f5638d28c33ef79d4affb68266a567c1ce00dc3fa691a7c90903fd0d8db0f05342ed5865ddebc9eb5916b280d2214b21867b965c5bdc9e665991265f501d77d948da9869ecf077071c840a6fe83835dc9d", 0xa2}, {&(0x7f0000000400)="b987061dca7c7efb6f70887e2d0e40ce31d34d368e3547d38baf39a9738af5d57842b6a5da42267e55da66f9ace52b36c1f1e76ea4e61ad0323a2d016527eff5ad5bb9894974191102296baf9bbc8f8dfb6175908680f525061d22a9b9a3d84611204ebd79b5d25272ec572c65cf9c6ae98e89f89cf58794ecb962132f90185d365ede7cab8bd96e25493371256dd74426588a44", 0x94}, {&(0x7f0000000500)="e6834ab7acda93bf2c81eaad14a95fcd95261eec6bcd8bb126e1a9a22a0b9e1d83041bbca5403e", 0x27}, {&(0x7f0000000580)="d54812300ab4c11c2aadb3", 0xb}, {&(0x7f0000000e00)="bc6f51c79e6bd47fb3c4af57d889e65fe33b60462620911b833a1244573751bda8154b2b8a0431f969c15331652461b0413676d2ad7c46fb801eefe77af83fcc37e4da179d210c2e072cdb96e1e9abb7cebbfcffeaef54dddba2b3e17875145c007b14df48985cf8e1b1c538efaa494a0074d64b7d7248d97860fd0d84f6f34bbd9d68168ce115804e37450950483535e15ed89851b42e0331ae6c962b2b3e06ed317ac9f976db1ba82e7ff5b3911451dcd6f58b240893617fcca9f4e3f672af95", 0xc1}, {&(0x7f00000005c0)="08470a975790b28aa00ffae0b46ee8a9da502bd20e445e961b1c1c78502b92fad69e3fbd9313c92ed3df0fa2330df6e31c68fbe24580a3603355a8dc1e13978746581b0c838be2493e388ba250c39354295d1d914ea94612ec32f73557a1f35e1429a35f2a77fb2c301be7f2b539d0e5be2a72ceff707a4726c8b28974802e131dac32c8622586b0b67bd47f73c98ba321a11f1abbb81d2ed9ce421195ba84e85800a1d4b0fdedd468f40c70b7dd197a38dabebc48fe299e81c942b2", 0xbc}, {&(0x7f0000000f00)="de68017db8c1b096daaab611870545a386e0086011efbfbfc4365f890367b4ab0f2687fb028fe1e8150ab621147e30e71fa43b9c5a71829579a299bd4b13cdbd632f0b236494b9faab590ae6675cf1baed057d601b9981fc61255d9e88dc16e378305b4651d92c660750bef46289707a4f738b71912f7f6af694a37c7a8bc297ef7f12f08fceffe3b790c46d06137df11433d2318a31cdbf536fac0fcfc8a84ed8de108404159860f3ec7ff124b7414f080773f73886486366fabccc0ed35fdbfbf05d48f6d31b2d208765c2ae9449c840432761f4e48dd33af06e3c90eec4902a0ef521d3de6b0ff5b7bf", 0xeb}], 0x8, &(0x7f0000001000)=[{0xc8, 0x117, 0x7f, "860208a37e6ad3287e9c308ec2e27a84e8adc3995aaefdfdd6b19710d2e983486cdf5d41a8ed36673ecb55a1aee21657bf64b396ff7a65d7a442c2618b1e122190930f30b801347e0c36bb8423ebe3bec0e9193bd678e49bc591c67fa14c56a404c50746cf1bfdae53de8a4daa5b937fe6b5ae352d5e5f77ff45c292338ec5e293043a74c54fa719bfaf751e88a8f45850814dbcf713746f5c78f3c6ae027303067739fa5b3d69891be4585f62698dc43db1522929"}, {0xa0, 0x1ff, 0x1000, "4b4f7737460a5e001cca42f863eb3f8e76777c61753041e1c12cd10f995f33e580c7d612727b108d548219b9872c866f7c257dfb28aff485c7405315d4ab49469b09ef7260f4ac67ef57e8c7cdf138d399f9e35757756bef0417c0e0458d775f235d614d8ba668f711f8827ee3c807f11f5bf92e6ff0f4ab12434c0c97a14f15d492162b56988fcaffa9"}, {0xe8, 0x105, 0x6, "3c4e669d1aafacc8823d5330a64b5b6c7135b2d45be9a84be74e2f2ded6e13a3c0ac335ffa3492c5d5bc2960ef58e85acc4954a344127b23deb062a9199c552917b845f407260ee57dc71b78082956234dd0946ad0f4c0643f77bc59020a18457dbd01f16ada212a82846f5bbbbfaf7b7f3a046b81b3ca99afb118d8610ab6460bdac284eac2b3b9c20a547b0e8d592e0d26e336545eb34004e1caea65b23f1a45be824bd936a25af8ca0b319c08dc18697b19d3acc616485b89cce4d08fff70e92f2d0280c6cb52d82416e70befc71a6bbc192300"}, {0xa8, 0x88, 0x1000000, "52bcc83756bba2229173049be65c2e51b1ee9d1640a013ee55f5b3c65ed716d723e5074d16cd074d8cb3de9f3c19adc3981fc9ea86c7724522303a510757e36b3e5ab8fa403b47eaf4d585976bb8c3b451a3c28b1e5fe828c44f210005311b49e6eb5c7533d722abdcdfe4e1b54f58d94c029b04b4f14049bbf5acb63d9af0d5c49927386f95fb06335b756aace19465f0d95081d72089"}, {0x50, 0x10f, 0x3ff, "5ffe5931981180d5ceb4cf1bd56b0f6fb1d57ec4d7878120dc1099e63dcb97ad9c414b5305490a9f7daf4b47898b88cb8302ad9e7a0f37582873735c23f5"}, {0xc8, 0x11b, 0x7, "f38e2d1f4a09c3b6c463a45e836b288f9cfdfbe52d09dcf1643b8c0123c2090acecd568cd9d55ba9befa74170cd92a7961e323dd81f428c3013ef96267c6893717916e3d6db5ce1b7eecb13836fc041b0d8bb8ef9d88538bb0a8997464b931f7e5c2af0c38bec5cdbcdc76b6c7b2f22441976e9d62acf4bf659f37d59748469f7e7b2675dce46bb6539d615eea249528b3a0b5b361b9c2860f2652029806610a776d822218e1e355638862d9bf85551223384bb569e5"}, {0x1010, 0x118, 0x1ff, "b043f97aa9cceec2a772ceed3a978d14a9d642e3508c37cc4d87ed2dabcef1717a6adbfd30d725589a4d5d1d8f885c7fa0b522aab50a50f35d695d2a8ab6922cdef40fed8fb1ed077b1c61e7661211787778f0d304cbce0a407231b7b1784f72d35259986e0ebebb4ea03f413e08c78d1aa78c2f33cd26b5f0967cf42443a593348fe9f4ca50b190e50e8961d8b0b8651a123508c08ef33166f8a0ff5068c035308bf1bcf58c5b323104866bfc0ceebf1d196bae5b4f39d157c3d3e51863e0c157d80fb05101e9722bfd0eeb6e6b2ba7cc91f37c2a711f94f2da7a0caebcb4f19e267d26a6dcf2c1612daae60445bbc372aebe6902d5b9dafbf41b9c74d6f8d5ae57aa9e92a9ae358146055c8d423ae878e41a1c2685acd3a35dc226c7879a29185ec8822d0c82e3838b21de02706718a9eaffd60464329ac3472ff2837f61ad0078d5ab010deb35dab86adf6d39c49113dd7afd2beeaf4739142de1bd34c7e0944ce4ff42b5a14dcf17fab2d78e88e859101ef1460a4f090f54e949e0bcb712d4a33215fbb7cfd3546ba6b44c4db619ef5784ec30baf36ce6152f90978ea34692395d3fcb765257d5c47b0c28df04be3015b8fb99e6f197be3328487407dbbb15a9f2400a040e34466fcfad1091c4c3e4355903d91503286c8d65d575a683bd1609ffa84b45f00b462b107710c9ca3faa8dc40579318c9b5ad6926418fb2a7e737ee67c2fcf929651b1bbcd8f981890434cb95692520f4d6c56de4ea22dc1b60eedc0ff88dcd84a340148e7bbef3a3bdfcbbf8144b41ca9368623283f0de7d59bcc02e1ba59c7bafd9c07b54795a39af8b6e2bb09148e2d091bfcc62ef93b75d40d5824ca1ab057b9070167794a4870b7d630358c7981efd5bc44a580c9ff0352340d4ec86b63ea576d7279d13d3b58c8f64de81f4caa2c3cb196316bde79950eff45139e1ec16e8847fc95a3a9071bbf820c610b9a8192c9077c2d847752d71189ae270957a23f38fd7466513c94f562a2d9260e30baffcbc364f4f1b624f953ce2924538ba5e837f5ef3d862d0b9dd04c11c0363e765604e62a60dfd1fefacb9b4ab992d563be9fe0418f7006bb4798df2d41cc69a1e9592597d331705a706852fc0a587cc43b4b7b424cbaced58d48026aeb71a771cb24af0ef6a46fe1d8615cf2655e37757ed7e06c286dfbd15983593504b77333c3af18397b8b406b52f1a2547464b7490f740f77890868e2b459ef2a7ea977ed53b47b2ec8ee137461cf7f585e420f5d057af79a4715e8e1a9ed520b11b3fa062631875ff5f833ea3cd19ea24ef60b8285e5a791036a2f708d7388fd70024e65fb82b529b9c96a899b68a3824f17ace751aac3ba54bc0d60ace8307af5315860b19422475522094f699894b7d4dddd040e6a7277b041a8cf1451d7bb59de47f78bfe668587cc2a749ed72d8bdd3789954c1a7ff35340e4902e108496e3a0836c22f1c729b6964bc1d1f18b203846da9de75929d3a865f6343fa5c256d61f5ba531c9b051b7f33d8ceb9747aab53061b3b7f635261fc06eaf8c6625616b97ead2cf5469448424977a45d86ad665d4490985746ae6c813a4d0ae9eaaf9e7c77405b666525d1ab6c91ef1a11aefb25b82c12155fd62e9b8284e532d8e019d125fb8938b9e1fda55fdbd7c75f034c66b7bb504c2383ca78b9bcee2f3b359ab6384398ba0e16dbffda6a4459acbacc78ab2a51f03841da20412db407299d80fc9989cbc0def693a1dbc11b3e1f67f43619442b81f069b19935e611760e67dd720880a41c000a3e28fbb3ddd1396eb5978a0b580d3fbfc2930d3463321e38f9677b91c5f5397ac77cb93bca2b8bfab9f3a43c3a420662e7bf22b412474cab12e6800da68aabd1dc45e8af0870dcee6aa61c444dc26b8eed7e4ffdb5c37a908e1f4a7b7b79e219606f0bf687a27b0dff440faa872b096f9b58ae0df122406aba2ce753363aa0c3e17396e1439019bb551648bb05031a89f18e88b5766f30c05605acc4de6d063f306599a01b0b01ff35fd487dd8f73f7c68cd5275740d6abf4eb399f3e641cfcb4c8e8f6eebf854828be63ad94ae9b186b7528e05bfe34c54a563e78065a9a314c0bb57973aac0caf71b1f269d17b3a8367e23fe65ff06ed08323d67bb743f7ffb934d7e9b32b6023573e3a20ef0e851040e120048b1661107eea7de9b3836fcb5c593b96faed7a333a6435f0ac6230deb69852b3fa4d233b4ddf89bf457c668bc50844295d9b82b9e8f0c6d0f44da216e5f6d2e9f415fc928c4f159504343ac3fba01599db289c3863f6a8af3d2369174d6ea81ed79febe938077ad1d9a3ada4d90004cb1d19d443ef27d6c5c8c8c7db4a40e6dadb9fb5871d5ad09bd7901825f92557477eeae9ec135c10d84431bf783b474092667d6128a8b4aa75732f9b87ceb24506c2faaac11c9344324b2ce03c5c86cb9a58c6a7e2fef336963fa00f932213f46d1fd182477a6d800995c57fd1b053404cda038c167097ad7b929b6d3828c7ce07bdbef3ab373adf26c7ead7b26872f1b608ee60fae99f71d2eafd1551101b5b645e37c13d892a04cfd9fbc539eb9d86ffae148b0b3fc3fe01b17b58c48082596df219a517616713b53145d61814fafe659f5c03603bf1816aecf457e04fd1aab0cb3d84b22a064a7d9243e3fd56f8e478dbe96195afef886e9476ae3093f69a723a638aa5ecdc33b513e0068553fbc4170269b4f73a6f357d5074aaa42132efef4bb87e103d29af2e6e431f05a449231d1af98b67fb6dd79c42264b2fe7473dd834e17b606cb85f21907c8f36e06cb04629036564fdf3e68a7cfbf0d1bfe3680f2a72720cf947be3ba95a2a0111bad96adc5091d84d17326e66abf4b04759f36b57dbf2c213c9058672d207d6058b3d3215287e426ed12eb57897a61440f7e1ddae6d60ece12468bcbc9c73ccb39e210b57aa8c769170aa7a797d1095f54334b19bbac3fcbd222ddf7cfc0ec0b6b078b95e60ea283b47e2daf939359f5cfcd4a1810f8f6a9e66226069621498c16fe625c72c4df39c97e00df1021f3056929fdf66462c9bf9d5d024c0c55554c8e6ba94bf5d9ed875769b89218a6bcb9da82511b29523ade7f14029cb029b809af41cd3f5384b0a5f52cea352a9071ab5b9d2fe45a721ef5e940d04cfbb3d988e9f56157820caa367e78a38c53e215836e537dd500d57449cc4b9bf4334c73b1296be339ee0099f57d9d385cbb180133669025855b63cb5346dff76a026243ff787ec69d8b8f4ab86be3e88a60e69c6884a81f03ccff98ad5a30379e268c3f29b0c823aa456406fe017baa86ccc2fa5e0a80b30dcd9e1f6d4217a403ff95ec0e935900ec527c134946aadc06aea24278874c83668520c11630a7eaab5d0fb9e025ea2ed8ff20a68fa10390d5d8ec324b42cd4345d9869c71d9167c9f9c63bfadddd924df3e1515c6fe7e791a01989d5e72254bcae6465003f892bdccf07a280c68c0dc46dc5f55f9f695c2d2e12e2eb6245a4d80179fa6500a9c050e736966e139a32aee7a73cd1dee6f2918b6debd19f2901907902c6a78fab9c9e28dbc38553fb0c3a3714f481b3c2420a23ede8e87e027609ec1cf036c8f6f831c8eac7245c59861d41d12e38130bfa31acfb460b772560214b54296153d5efdf0525454a333890bb039224e77ebc2d7065d33a73e6030bbcbd165339a79e43540286cd3150ca12d7916ea23f1e068fe0fc34a9962aec90e7dac7f9e50da9e1109262b029b2c5b6dd6ee6946ae281cfe7325be53c95f42c514af0eeeb8d62ccf5a9d14b76c2e5282beeea0efb37c80be1470a5c214e029f2df8b7ee0e7e8db7649daeda30965fdbb31d989ca05812642505f4a6ff8dab3d9ec3ed2083c5b1c9c58f42bbb44b486b6c044f7d870cf0a7b1630676fd00a379a8f5044336b7bf1bc366d0c2b4b859cdb0ee17db3c1e2b24ce2894a7512d791ccedf5ab2ec72f3fc0d0ccf6e73ec8ad67b4227175f89879a4adadff57cee3f47cbc473c08ccc1010c9ecea83d49acd3ad85206078148ee1ea50d268d7c3f7b05f0c86ad6b1bc387b70b52d1e5d0a9436aa9cb6b5ab137b240f1582a9f3aa6312688dce13e69d1d8d20072064a12e174679a0df6370933c22872efc39387434c5f39d58616a1df5fba24ff65e8039182ed0a78b50cef3380b29b1d9773c2ece15f505d0e0d32cb2183bda95db4566ee115455c9ec72792c4e224ec1d662b55e96440529a9ffaac6cd19f5f192b95e2088bd80ce561a93fecf274442677fd12f8cc8f46e169b2864ba91879ef154ca92f16d9a4650a31e9f50cbecf0b6a9d71d166c2553281ac549f7f3d5cb256ddd2b3d7a94c4aa5255df112a2fffaad0b98152e7f53c8c27f949e88181714e091720ee3f6301459f63ceb19c37d8bc22fdac6db3db28bd973ce58c3780c0abd1774bb54d05bcec9a83fe42af6e9e158c5f70ae12c79cfd7ea20bbcfce9dca6f65d20806439bbf636e2974f2a1b5d3bdbd68e4891ddca40c756730b27bc64467c7114ffc995c24fe0164b6651858a7a348344d4ebe70ac5086d369c0db07f1ad7f63195b753a80ffee9bc930460742bf63207c5fc1c5faeea2c5a3ce0850efb99286c3bf52a99948c716aadff65eb3e28ad8a71d3ae6fa9d37d60f469089fc93a54f95b6ba303695e533455f19bd3c04f6769c0ea157854df30d5f3ee7ac7314d09b2c03404b1f3703d297efde87ccaa3090ac9f167b55860042f94906ceba3f61924fd672762b39928a10b4b87f86e4ebc80c9d333b637fd5e8f92286cfa9d747cbb6d4bdbb664dbb251a3a4dc2821d94a840a8497b8a96f8e800b5f6edd12021725fbf049deec76f64c4697ccef599535a4fc44d80a38c256f3513c04af21c6a901669aa7d55b89b57528185e39e075e78705b8247c83fc1881cc2b8e93d774d8b9ff6192acb5d8839145a1905a72c54b18aa2385779e9d0c66dc9a24d5255a0d888176db8fd042264ee16becce476fddee6fc94d9bf3b2727d1cfdf5b46b6740cc5b295f0f3ead1b889aa6428fcbe7f87afe513c83d686006b6020976719372d78be26a401face0b8ef842a04129e6ab9ff6c55daea1ae36fa4364ff8b2618c391c84acfcddffc6ed346e8e2d46b851595fdf1c54dfdebfde33282ea894d38d1adfe54199469569caf4b7f1923947481932782aef3d13a25aa55896ff1960f04880e9f59421aff3e9faa2b4f09addb936a1de12cd606e5c0eeddc8090af860b613d46f562da99c91088f8914b0c22f6306c541b3556c887f31bca8e90a0b57b19cd40b75110707ea6b212ab9a42036f576dcb6fe901b57d4308e3f8e4750dff5cb7ce3df7bae71245b80f7f750a0fbe8461a5f311c5736b531769dd0234ab884cdb7f58b8d7c1a0de8de92886ff8febc25b842342407abe3a7964b255d57c2299e2242093c82c042937fd0a4c36d4b4ef364da7652fc1718486f8d419bda5252d785216ef23b2318e4f9a9503da3c393456576ba69a15d6d534c4f88ac0eb08e70f1a0f53e9c511043e4de66bad8a492929803dc7e739a3c808db6364a709e2751c72c34a2640e5394a83df62a94af19ce897654b1b22f1ed3300716f2ffb70080d13543e06f3f86dc2a55c07759b4f18fe708159e2af82c2330fc73b2354eeac05290f818311eea12d688d10ad355ebcc217bc41e708597e5ba9ff7cba6376ce1671695eb0711942ac85b2ed7dc8674e20054ee184df5748597959729274a0d4ee0b2249c960cbbed49c4c7b099224f8a75ec621"}, {0x30, 0x109, 0x80000001, "8ab875aeeea0c8b3d394926a5a812a2eac3c1a7c997d99f271f3"}, {0xb8, 0x111, 0x100, "6951265f9a45c5b890ba830b2a0d2bd52a4bd9025e2ef6dcb94f49fee7ec485f916bcd608098ecf5494073b7cc23e34dbc49ccc80747c358fe1f61d50b94c05d73c7f2934d33e0750311c3e2e2724dae6409b08a709a7b92c335830d219493424ae20f265cc12eb7288155cfe82a68341cc6d12b96f14ef0db02b62efd400ac8ef4b79767924a101826b6d21252f184c95256c93fac467a6719d7ddea6b7abdef0daf15321"}], 0x1508}, 0x20000000) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x8802) ioctl$FS_IOC_FSGETXATTR(r6, 0xc0185500, &(0x7f0000000180)={0x100323, 0x6}) timerfd_create(0x7, 0x80080000) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xcde, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000006c0)=@filter={'filter\x00', 0xe, 0x4, 0x3c0, 0x210, 0x210, 0xf8, 0xf8, 0x0, 0x328, 0x328, 0x328, 0x328, 0x328, 0x4, &(0x7f0000000040), {[{{@ip={@multicast2, @local, 0xff, 0xffffff00, 'ip6erspan0\x00', 'ip6gre0\x00', {0xff}, {}, 0x6c, 0x0, 0x9}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x6, 0xc97, 0x4, 0x3, 0x9], 0xffffffffffffffff, 0xfff}, {0x5, [0x0, 0x7, 0x0, 0xffff, 0x2, 0x2], 0x1000, 0x4}}}}, {{@uncond, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x307d, 0xb0, 0x6, 0x0, 0x7, 0x9179], 0xfff, 0x14bc0ac3}, {0x5, [0xba, 0xcc, 0x80000000, 0x0, 0x1ff, 0xfffffffffffffffb], 0x0, 0x101}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0x0, 0xffffffff, 'eql\x00', '\x00', {}, {}, 0x1d, 0x1, 0x4}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x406, 0x30}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x1, 0xc0}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x420) r8 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000002600)=r8) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r3, &(0x7f00000000c0)={0x20000014}) socket$l2tp(0x18, 0x1, 0x1) r9 = syz_open_dev$cec(&(0x7f0000002580)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_tcp_TCP_ULP(r9, 0x6, 0x1f, &(0x7f00000025c0)='tls\x00', 0x4) ioctl$VT_WAITACTIVE(r5, 0x5607) 14:39:00 executing program 1: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x2b, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff86, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x2, @empty, 0xc0f}}, [0x5be6df4f, 0x0, 0x2, 0x6, 0x0, 0xfffffffffffffffc, 0x5, 0x5f1, 0x20, 0x9, 0x1000, 0x1, 0x7fffffff, 0xfff, 0x9]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={r1, 0x1, 0x10, 0x9d, 0x8000}, &(0x7f0000000240)=0x18) 14:39:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setrlimit(0x400000000000007, &(0x7f0000000000)) r1 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000280)=@req={0x28, &(0x7f0000000240)={'nr0\x00', @ifru_flags=0x100}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000027bd7000fedbdf25010000000000000008410000004c0018000000067564700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4) [ 1366.538346][T30556] device team0 entered promiscuous mode [ 1366.546368][T30556] device team_slave_0 entered promiscuous mode [ 1366.553349][T30556] device team_slave_1 entered promiscuous mode [ 1366.561395][T30556] 8021q: adding VLAN 0 to HW filter on device team0 [ 1366.618654][T30347] device team0 left promiscuous mode [ 1366.624404][T30347] device team_slave_0 left promiscuous mode [ 1366.630448][T30347] device team_slave_1 left promiscuous mode [ 1366.639247][T30559] device team0 entered promiscuous mode [ 1366.645308][T30559] device team_slave_0 entered promiscuous mode [ 1366.652221][T30559] device team_slave_1 entered promiscuous mode [ 1366.659518][T30559] 8021q: adding VLAN 0 to HW filter on device team0 14:39:01 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x500000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0xaf01, 0x0) 14:39:01 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:01 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x9) request_key(0x0, 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) openat(0xffffffffffffffff, 0x0, 0x200a80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:01 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1366.832530][T31087] device team0 left promiscuous mode [ 1366.854497][T31087] device team_slave_0 left promiscuous mode [ 1366.878727][T31087] device team_slave_1 left promiscuous mode 14:39:01 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1367.006523][T31083] device team0 left promiscuous mode [ 1367.014960][T31083] device team_slave_0 left promiscuous mode [ 1367.034905][T31083] device team_slave_1 left promiscuous mode 14:39:01 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4017, 0x400) r2 = accept4$unix(r1, 0x0, &(0x7f00000002c0), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'veth1_to_bond\x00'}) stat(0x0, &(0x7f0000000340)) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000240)=0x3, &(0x7f00000003c0)=0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8001000}, 0xc, &(0x7f00000005c0)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socket$inet6(0xa, 0x3, 0xfb) r4 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) acct(&(0x7f0000000300)='./file0\x00') r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r6, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, 0xffffffffffffffd8) clone(0xfffffffffffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt(r1, 0x80000001, 0x4, &(0x7f0000000480)="6af3546d2e6dd46b2cd7875f2efa5881eab3665cb433e8a09e2d9e8a5684cbb296d94991f7d1d4160716da22287c221c561814503e404159ff4a313a551c01b0c23749f721007fe3f2234999c255d8d02fad230c6f1faa4f56fbaaac53b3e2ef2cc89ca58ab3edf899ff609bd67227eaddde42c3a08f82ad354266143c5e602168071350a375d8995a7518b9c7eb06460da80a7fe84c9f8475f4a42e391d3641ae5352e9eafe820d55587083d5f9bf7c8c19945764b0466eb2bb2a33f30c4a4c7b7a8e0a954e33a65c9c000000000000000000", 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'caif0\x00', 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000000)="d9a34fff2d847238de8a96cedb1af0ab", 0x10) 14:39:01 executing program 1: r0 = socket$inet(0x2, 0x3, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x1, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x7fffffff}, 0x8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e00000ab52af2d0b7566f1dc02ac14148d000000"], 0x14) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000380)={@multicast2, @local}, 0xc) 14:39:01 executing program 2: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xada, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) [ 1367.759792][T31154] device team0 entered promiscuous mode [ 1367.777853][T31154] device team_slave_0 entered promiscuous mode [ 1367.786925][T31154] device team_slave_1 entered promiscuous mode [ 1367.817871][T31154] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.846567][T31191] device team0 entered promiscuous mode [ 1367.854765][T31191] device team_slave_0 entered promiscuous mode [ 1367.861352][T31191] device team_slave_1 entered promiscuous mode 14:39:02 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)="8d8f25b5437ad459957af4a4966bef508e6954321e4c0148ed2dc548ac87367a7dacc1959c521c2550fd82d68ae6b96c48624c657ce47aae2235207f8dcde0e45ce54fc9ca5a45598a7ced439cb045b022dbb166594d1b303d5304c0073bc69d6daadc759cf3fa", 0x67, 0xfffffffffffffff9) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(r0, &(0x7f00000001c0)=""/176, 0xb0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) 14:39:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xf8e, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)=ANY=[@ANYBLOB="660000009b8382be06bc32f608416f82b6d05d41afe2f8b636bb33e2681c5d051a6858c2f9af74790b6efaa5ebb5eb13773fcea02484d8439357abb4552929deb00eb96d81a231f3c5afc77084aa1a2b94a5ecf65b87"], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) sync() r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) r2 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) pwritev(r0, &(0x7f0000001880)=[{&(0x7f0000000480)="7847f96418075f8a83c60396cb2967eb86b4f66ba511a4820a2f89d94fa647c532eec2716bda56dcedb7ac79c07204c51193fa2cb30e9823b3f9f01ee54b798c214d9e1a293f3c35f86170609698ff24059d56cefd6ada658c3b2d5821b843ea544ceea3306865eaf87d51fa2dcb0f797d5cfc7b242cdfaf3b07f10192148251dd89480b65e18a94e8793f8d7a5eb717d92610f0623a65760b02c700e2c82454927fc995ca7ca72b016845bdc57b42ac7b358bfdc4a12815166f4ad7fd1023ef0925e8bb8336aa35", 0xc8}, {&(0x7f0000000580)="8b00f3814e1674db2290406e08f6a097deebf59ba6cfc99b78de3cbbfabe870f21bd60b941697af4a8cecfa7ecc95b9716d8d83924dbe5e2ca0b344a1904437e2ce4937ada15f4508b8811afbd51a4be9ce088caadbeebb242862fca1931f8cf528c233bd92f8d6fec9f171671588735466c3266de116d35d1d9ef153c2a5962424545e6be51dadd599e346a4a60cd8cbc3a98f62d1be157a618fb51c7adeccc99258138dcd749952f17e83588cd463a9ac6f5d2573dd55b1bddfa387370987bb9f426", 0xc3}, {&(0x7f0000000000)="528d5ace48c3fce296de483d05ce52936bea4674705bfa094e4daa0f0824e68349a74aeb9a65d29336840b8ef11233fb6c10", 0x32}, {&(0x7f0000000680)="9f681fde5e9651738948910aa85429a55bd94e8521e9f794ed45b6bce5789f6fe626b4d49172cf3f16ab3f69230e12f6e9e43988541ca1c480e757caee7dd17364bd54f2d6e506b81923e9417a6c6f175c545a7d55cf80ca1cdd080225d5387a4b0e6d273635dcdd57168dd3541fe60e84f378e19cee5e48d9c8500ff4f072859291848f08c52517b3d92e66d8942de7d00ff0f67237e7830e5e054a3ef660fdbfee10636457e6a1847ce2114dfcb8bd7e5cf637c51c3f6c466bca9abb00096dc4234079bffa0dcbbbe3eb37010e2a751eeb6d60b760056db28302d06db69a0a7dbb5d52f774e13c29d4efea3ae7b14ed5e8", 0xf2}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000180)="d21b73f4ea3ff57a2536c69d9607eb02821f22491c", 0x15}, {&(0x7f0000000200)="1ce024d41a896a2b7b387e5e6ac11c3166b19f29bd5cc3422269a791bf8e4cc1862c7da9bd065a7d3adc35ea9b773c24a7c49ecaf59fc7", 0x37}, {&(0x7f0000000240)="57f34db40459a08aa018a40a185518d29733ef12a152a1cb04701e091efd7126e04a617132e7c4c245cba1cd70b5a153591ddae780697d2fa16effc7a13dd3fc0eb52e9bb5cfc55d21a967b4301626d9b7c6f5db6b16860bc1d09e96", 0x5c}, {&(0x7f0000001780)="07f4bc52e2e7767a49b05c5063710f91d2c6ee0e44b7ed8dd4e40c40cf4fbffdf6f146cb5b7abb846d88d0adb73a0a178d7263f704b034f8aaee3ed2891c4cebdca7ae16b46d7973a14b6edd8751943707aead98209e3bfb6a803409ec3eeccaf7298ba933860cefa98bd57060b8f50dac40e7229b1ca6526bae03efc926bd49577121d4fecd37e9c15ae2e4a51d416d2a38380cd3a1c526e739ed4f58ab6d600547e6f43408b531e2d5438f9b7952d1d6aa41df2b9393c2368b2a4a0f0b6398a85cb70d69174aed38045d", 0xcb}], 0x9, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r1, r2, 0x0, 0x102002702) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) [ 1367.869182][T31191] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.878285][T31087] device team0 left promiscuous mode [ 1367.886519][T31087] device team_slave_0 left promiscuous mode [ 1367.919142][T31087] device team_slave_1 left promiscuous mode 14:39:02 executing program 4: ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x248, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfff, 0x101000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000200)={0x8, 0x2000000b, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1367.980874][T31614] device team0 entered promiscuous mode [ 1368.047675][T31614] device team_slave_0 entered promiscuous mode [ 1368.058709][T31614] device team_slave_1 entered promiscuous mode [ 1368.086798][T31614] 8021q: adding VLAN 0 to HW filter on device team0 14:39:02 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x600000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:02 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) timer_create(0x2, &(0x7f0000000340)={0x0, 0x29, 0x0, @thr={&(0x7f00000001c0)="6b26c0d5d9a5055fc458d6488f15e48a0003b149a17b4e1e172382e975c6e9df5ee786139107fcd550e14e241c10dd943cda5cd82762e9bde2456f35741245428d293b9bec9722d87352bf0cd23242e50f025c04c47a672f6cc72c008f45d3c8ae6968f8a11160975fbade5399a00df6bf2139aa72430370c45719eeca72836b6d33df58dbdb0e3e9c9c66e04d4368c84b398add918725528a223712a38430b85b07c9f2ecfe959ca35fa7db338134f5efe73eba5745082ed9c32292733e9919e13090011b002d5d5cd243c17a985a6184ff6edc8c613c63a9c67c070f124f1206821608d30f05cd3752daa9422eeab447b90aea2998a09aac", &(0x7f00000002c0)="cdb6f9b8c5eb7d6063caad6f3863541243ed96089588870fcf79eaaf7f47e330d13e53209e01d4fe3829887d9abf1754f038030efde40f6eaf55355d23a7e9a88af963f8a355b9ecaf2056826f883f3bf1f5c929550da025"}}, &(0x7f0000000380)=0x0) timer_settime(r1, 0x0, &(0x7f00000003c0)={{}, {0x77359400}}, &(0x7f0000000400)) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x6f0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000106000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64bb104bd00c0002ec07000300ffffffff"], 0x3c}}, 0x0) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) timer_create(0x7, &(0x7f0000000540)={0x0, 0xf, 0x0, @thr={&(0x7f0000000440)="49b544d3c02632c74a663f14e9b58cd46bab84c064ca7b31c2c0a99258884478539a2d616f7b585bc5f2f8cad21e570f2afe1cfda44a95eca53cf146449cdc", &(0x7f0000000480)="90ce9b9ada1690b930c2028b405a"}}, &(0x7f0000000500)) 14:39:02 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891a, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000001580)={0x2, &(0x7f0000001440)=[{}, {}]}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000002c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x181841, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000001600)="22b222da09162bb8ce3fefee8daf2616fc5f208dd7e68eebb67719ac3e63a998bad109fc8acb604a933e3924cebddb955a12ee639374074212231fd362ec740661d68293ecf5808f0c44e15379430de2b05c5b6f6d03ce4f8ae1e24d8109e36afdc8a7", 0x63) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) r2 = socket(0xa, 0x3, 0x8) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000040)=0x9a, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000340)="93fd1e0c3eba2b5722dc65510c8545d4abe2fea6cfc49c5e61fc02dd050b6b95c80a5132780c436beefb5600b869fa00e1af8011732cb48f03bcde479fb7d4dcafa95b138eecc865bb3c778acf9a0eadbf606bbcec94814aa95d1f345b6fe8b471e50142c0978a6d8e225427b0ac56d948f9604757a1e1312da6050e153f79c8ddc02a39c2c43aec4b8b2bd5ad67008a711589350e62fbdef9a3d2b30d353f9c37ac9965e648c4c028f61f8e56b375434757987ff67e0b6a79adb1f1451c00850cc0dfd22e2be07384dcfe0b31e4e12526b0fae5ca71385dcc130c98db81a68b947a91daa568b4365d66183449a086013222b46c2a3e208fa5f73c92f0b66dc9b752292eb4b19826b361fd39ae454d03ea207c9ca285cbe0901e5cdde94a1afffb6ef238638f702b84c432948e30a52b2e1e5c3c0db9d2d27a95cef05f510a14299ddcf061d3786e6625cecccc1aef4bd24d267f8e8df01c30b1bdc32e49fc01a83516f1dc7d881408b7a1a0ba570068c3e463196f2f54c61f7d6798009473887628a201c13ed3cf473adb0bb57ecc6c374595b2d349e3b5bc1d78db8f7a5f36241924bbb2d9f43a5263c2087adca9cfa0e88ca167fc25266009cb1a678638b352579c0a6310eb82e9d865a3b099a52a0b3e6fe6bde086872cb74c29a76037480c8c2c7a20d48ee0659f72c31529f6d26ac36328f0ad69106903bd35e532519acb6c85ad435bba014de3a87f8a26ff57889a0741889a896696fb25416a57f69fc48471a1320fa97a409a0e77bc2c1a7c1437a5c4c2547de7ac296cfcccb29ada4420d3a5abb25c488df44b6d8b25208fdba2246a1f3127d3efd881c8d80e3a8249f05a6539b9e413f99602c948741ea7e3a6dbe6b579dbe9100a94a6ab25edc9731416dc25b39a43c1767d1f02fb945437f639152e76ced78b25827bc3895b7c169359249e9baf9ff134a847759d281e9790d6104f33249e9772971d7762901ab5a22a4d38f269b349b5307bc6be5f80adb39ff3ab44411928eee77ae22a6183eb367832aaf8cdd113578cf991a8eba85d96c23adc1cb2888337527ff854c62d7f04284970b46d9106889114e85b7698f164eb7b2c4fc634aeffd4ee9b8bab0c17676d366c690e0d42940757254b7d1c4fbf6a3b126a6d768d4d33e9f863b7aff6a5114b2c768adb4ec55db69d53b4cdfdf98cfee3cb41013fca863b23f8eed8e204d1d91bb757da35ed122f0d261224a3c58cfceb059974325573eb1463731916d6de3e7626a460ae429f22d751501be7cf512395f78615d89067dd700d0fbef214e79ae9a6e434fc5af14f96b2d52eca3c13e7b18fb8df50aff7d691719ed053ae81b28dd8472c563912527578cb54ff19bb9a7c8cb88931b04e310f3946d6a850b560327f13885404fa9cf9af9799c881e94b7b8dad89ef8b331b74f0de0fc181517413d15605eb453fcc5ca22466160ca5904596dbce9bd1a2f99a200ec8f08e6f4f8b18d2b00c13a2858741b5b74a864e2a17f2f03ac58ebeafb75c938aa87b3a8b0fa04bd215ff114813ef36227259ce01f89586f4de0bfa43e9eeed7f3982a7d05a9ecd8ee5e8491161234f7673ea455973a41eeed55b2e7c8703c5d7a91466bf0c947fda0f40cc30182ee08750bc9ba192f30e51891b3f6cd5712c953cba75fcd6f140130a24fdf202919ceb61167e07cb107ad40d7e22ca5dd0351e1f24a14da196a2b1755378404baf1982762e94372c69c25837eae0be7862413e6815f5e14e17cf7affafd0502ca48e7dcce166e3d601569faed67fbd26542bae2c22a588e72b2d9fbe97d3a8b99d0e769f9792a1a83770ee788362b72fecbdd9094159dd82af492483cc4c69b7faa1bc7c8f811b93cd31fa9ef48e85afe9c4a1edc3b8f822e4c4049251884f57a205f1206ab616a7c229ce09677f0a9dd91cb5269aa33eb665268d7c7020e39e5f87dfe424fed31f21d27c8dbad6e59c0d2f66dee021b2c282b26082ddb254c8051f1596144f792a790a0c274329c594cfded62d6107c7181dcf5c16e7d1dcbf893e298ec8b959c817f37fde905f21ebf06a7fef33ef99bf23eab0c21fae2ff06ff4d8e4ac208d523b0bd406e93f8da4bec82f59556d0b5ed0c9719ad70db710c97e280eba398ad8d52ca80a678c405d3b638092b47c4f8abb3553fa9f251570fb83f5ea400a57179f0a7d4eb66e641a576d6124214a207af064c6278bd5d72ffa41bcf3c4dcd6693a387bd5d2fd5ca3fed04a0d31f0b49aa75585fe9990873547828d22d60e3486d06eb48fc56cfc4036b2c67372dfc9e8fdc714144934dcacc23f33c1cb2ae9d49134c15e1f69ba04ad27786d537389ebf1d1df8f303f5e2652c47aed2c0a38a5b3bc77ef418c69b15c8fc891d09f5f19754c1f0c388b3cb4caf25030fb63ff5d9f11ad68102abacbac0977ac359813f796a5d96727a2c1443a66dd69358c633edd11c00bf19b3632b5479eec4b6b2d21d1151a15d31957bc844518ebf4f600fe6d21538cda43e3283c5ebae384b70f7c19e936cc075a8ed2fa27c59710bc4860059043d21c6983e5a51aa21a8c8dabedba5180d0c7f6b91334dae490b959768a3c489bb1074a4d3a7139a9d2e8a52aed39b4382aa5222901317c9d2c7315c7b5f147035c7e57b7dc60f5afafc85ef55fb36f2c4c636e25994eac525e0513870058eb4098760063c96a9b49741ba8ac981eb6b78eab8921b5a569a308ef6e07571dec70d31eb6ef47ebf3b23da6242d1c6ab74fc87791e30cb64daf3347e74621434355868c422915d18018ebd43a1965842c8e1d88f4c819528cee9caa09b834c91233933e0c3ecf74a145be8be84fe5f03e949dbd45643b52caddb23cc495a72bde3d5d3e98ae279a5b727af2bc0f1ecec9383a5eb7026d6766ed839cdd80277098c7c72c29457e3c7916f887aa7b6c4ab65262814c5af3da7dfe4e3a19dfe6f88f586910549a77dc633339fec4b84753aee373bfbe5a16b89948640c727e001ae2bf9fb6e6806565b20e52a8c3a083eb4541a38293c7b25f56e0efb91f76956a31bee2bbc7897d07b0d073a8268e78651e12cb6d4e2f5e0a268f0e50f112e7d1998b8a8b082c1f85ef77d5f9a309afaca3eb0964a5eb37ca7816884cdbabfe8b1e47153574d11abf7dc0211310d043e958579ebb68efeb550442e315bd0eab99468bae8743f87541cbf9421034f5a906a8a263d39c329093ef8f71c9c38d02a2682dd62a27f7c0ca1b5bae519bdd0af34beb75e97b4d7819ea8c6ddef219ae2f7b3249641882af77df12221bb0d416cc4900ee69ed6e80e51ae34c84ebe8587d0bc143feb77f0f3a786a49b9683bb0fb13a42b8367111fbdf44e2830fec22569a73abdb6a2e79775737dcc1c1bef98e951afc7f944b97a8c2a491e0ef023a6132e175e0d05786dcd01706d7c650d31e6eb0285d974dbbd58ec4189cd1fb0cac000cf1a15bb89a098b4f977b47bde4c9c09c431acb4095d9b221beaeac059fbf6b0ff69611b814c2c7928dee7423b5e6db76baa835b0e20c611dcc6359b11292f29f0ce9f1e3159879f785d8cc2562d6151d43637a8f89edfe5d3e9b0188b1296767bc01ac3e41d83462c3696f6e0f8baf130a5680e34ae0e7a4ea39698bc214d49d277b812911ef831d660a7f8589ddbbe99bb3d2c32d53c657cbc2cd4e59d2800dc3ffaa8bce2222ad86e35d4d0d89612a87f8962f2d2da182aa60d4e0f668f3870e3c4318eab7a306f41e4401d90efa1e19875b9104ffe62f61aa99c435f30b018dbf03fc3f6f4a322d1c8895c6d5c669198aa67f952ebcb50ab875c4b05c13e5412da74ecb7208c253f4d85660478a4748ed870d1413ae01805e9337bf92f5ba97a182d1a6e0fa974c4ad8a434440375481fc28cde1a20d69e1fe5ed7a58f2c9a26720dd916d1978584ecc413764742f45d1dce7d3b8016adc94f9faa27c7ecdc5f3e63c77e8d56bacc8cbac738b68180e06505faae969acf781141f46b170206661a3a28f32cce9c62b367dca679a5e78de0a8fee7233a15ec1eb6a3f1e3666c20fe35a273a035a78cf1217deb46ca64afdb2d3850d1b19ca132c3d77341c4e9d3a78123bded36c77c41eb5803b17aae5a5f11aaa896069d4e33feee4d0c21ea45b1f769882e108512ca7db20fa8319f82c95ebfa910d8f0a7bcb0e1da781eaa9050297733ca55150a14c20d4718666ad879ec93aaac6fb4563e10aacfabb3612a31c00746b5b8ac3421d9cb644ade22a3bfd1a8a69959c883b5d03057735895618674969ae3137ae6460b90be9091b2739b4dca3102122052a49d8ed377175c0a19a66f15ef7a8d61442eeb46318b1e881448c163a1a940a58de6b5bde8b5eae1fbe7512728be78b7bb4ca0622282ad8ac1285aee040895d2fdc5900bd0697386ab120285869c98a2ae74e40443b79ca3c9f7d38159741f58a47c341362c28a7e73bf4bbc96fee7329812bb9265726a51e1db2f31383cd95d14fe0ca64c83f1676df030a2d96c6645468b9cc90ba6dc2872e3cda5edaacdb1e6b01bdb108570992a8641e1d4e847257b8d8978ed219d33f242fb524cf5fb225824289c80894a2e0a08970dda1cb199965ba199718c4cd6e4420f05a8abd256d16438fc1563ba12e283c79c49bb2b910c123e8dbe05f040c980c7816633bf0142921051fde5a48ce78805ebbd28516ed70aa10777eba6357aeae8aaf5087f7794bf271aa1db0636b52eb7d10d156dee30d12bf5f53c36e60ac9c8f43491a0771592f22f8ebda820979a3e2b85898d8296103cd84dc5c79155294e839c3365e741599cacf11f17db07907561d71341ac136bb4ea95e2a2f0836d6de2566677f9738d7ed2946bd8848b09ce5b00d49e8dc4f0a5854c3410d20f6bd753ddef5884fce97d7f2f77c7db5d15576edb9536bed3649b62a574344cc763d71293708979e85200ca3dd6f445b41600e98913713d0eb127da162fe4a940b4b02e13786ae49885a8aebb5bd2fece4dca3e162dbd9dd48474e02db4e58470a22dd7753a62e742eeecb7ab6895406a41b391d77b3dd4c350da29b867be1d787a32b15b727e8f7f82da4dbbd916d8f581319d62a23da0505f2471f9c47ec5075dd4502bd59822be60299f4d8b9ebd5ba064ab08ae78e782a65183c14030436e62cc403da6db311f25e4b3efaacfe037c53e3efd2a94a9152ca0ce3710a82b23c8f4160b18b9ce92c8299ca07fc39dd7d49496a0cf1d324613efa15542f69aade6f8d26395a79b5354fc75efc0bbbce412f15eef769107f9e1eec137cc1b90d23196b0e2faeedb3b0778fd2430f2a70b131f6e117ba3228ca4e4653da728d620e44738256370853c1b58735e0896529a70578a9b7abeb070344fb354978345e29bf2b8e8e4dfa44def5f84659e4e100ab18401c0bc5fde74cc66dad8499c88836593ff86d39e96f8ecec5ab30296c92610880dcd0c0b15eb201c4bd907b0fa1b0587da4834f80f05895b39d4b4d66149cefa1e0b5667a534fdeee7a43ecb673d2222cadec7afba7993f74e6965cd18cc734d89688f15b33bc12c5c9f96df49ca1f6f34467ca128693c4742a93e465e59da99012c7806e9a0bdbe1fd9d766ce679fc8c827414632c538437e5efd628e35ec127e5bf0183dab8f2c493ab65110e532958e91555dd261968de0e14fa7222147936ec424a60247eff20de0c720761579f575d4887516af0a7679d1152cb4dfee3f470dc3f03576e1a0a4a76fdba6bd72c43579f4ffbb9aeeb47e2b1b73e15a3a09ce4e1fa3", 0x1000, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000013c0)='ceph\x00', &(0x7f0000001400)={'syz', 0x2}, &(0x7f0000001440), 0x0, 0xfffffffffffffffb) r5 = syz_open_dev$admmidi(&(0x7f0000001380)='/dev/admmidi#\x00', 0x8, 0x8000040000000040) keyctl$dh_compute(0x17, &(0x7f0000001480)={r3, 0x0, r4}, &(0x7f00000014c0)=""/186, 0xba, 0x0) epoll_create1(0x80000) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000300)=0x0) syz_open_dev$midi(&(0x7f0000001340)='/dev/midi#\x00', 0x2, 0x40000) syz_open_procfs(r6, &(0x7f0000000200)='net/ip_tables_matches\x00') setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ptrace$setregs(0xf, r6, 0x0, &(0x7f00000015c0)="7855d1d57db05b2762b11a162db6ee7986e8b6a6") r7 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x100010, r5, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000001680)={r7}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 1368.283216][T31937] device team0 left promiscuous mode [ 1368.312276][T31937] device team_slave_0 left promiscuous mode [ 1368.329030][T31937] device team_slave_1 left promiscuous mode 14:39:02 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891b, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1368.900646][T31948] device team0 left promiscuous mode [ 1368.906238][T31948] device team_slave_0 left promiscuous mode [ 1368.913950][T31948] device team_slave_1 left promiscuous mode [ 1368.938392][T31974] device team0 entered promiscuous mode [ 1368.944382][T31974] device team_slave_0 entered promiscuous mode [ 1368.950687][T31974] device team_slave_1 entered promiscuous mode [ 1368.958837][T31974] 8021q: adding VLAN 0 to HW filter on device team0 [ 1368.968621][T31989] device team0 entered promiscuous mode [ 1368.976442][T31989] device team_slave_0 entered promiscuous mode [ 1368.988703][T31989] device team_slave_1 entered promiscuous mode 14:39:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @bt={0xb4, 0x3, 0x6, 0xc43, 0x3, 0x2, 0x0, 0x1}}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000001000010600000000000000000000000008077252497e61284d739079b73546c71c34768b26e9f528b770ffb0b26eb78fbe2e25c2f688fb49316c6d065d4291417db86aa1f0eac748115281b6f692", @ANYRES32=0x0, @ANYBLOB="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"], 0x7859}}, 0x0) [ 1368.998518][T31989] 8021q: adding VLAN 0 to HW filter on device team0 [ 1369.011698][T31970] bridge0: port 2(bridge_slave_1) entered disabled state 14:39:03 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 1369.453220][ C0] net_ratelimit: 17 callbacks suppressed [ 1369.453261][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.465373][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.852194][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.858086][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.863984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.869742][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1370.012945][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1370.019348][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:04 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xfffffffffffffe87) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x80000000, 0x39, 0x4, 0x2, 0x18, 0x4, 0x9, 0x5, 0x401, 0x3, 0x9, 0x1000}) listen(r0, 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x2}, 0x8) write$binfmt_aout(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000009000000000000000000000000000000ffffffffffffffed00000000"], 0x20) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xff42) shutdown(r2, 0x1) [ 1370.118956][T31948] device team0 left promiscuous mode [ 1370.124701][T31948] device team_slave_0 left promiscuous mode [ 1370.130931][T31948] device team_slave_1 left promiscuous mode [ 1370.145134][T31989] device team0 entered promiscuous mode [ 1370.150717][T31989] device team_slave_0 entered promiscuous mode [ 1370.162383][T31989] device team_slave_1 entered promiscuous mode 14:39:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7fd, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x0, 0xfdfdffffffffffff}}}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000004c0)=ANY=[@ANYBLOB="71f8643957b5f5d9dae99556d90aeecaeebc5e094e2c3009b7ae252d291955b8032fc7743e0b6395c013f8fa09208e9b406c04965352b93532dbbb7583534e2da81a763f2e6d17569bdd5f82b1eb38c3848c267e6731f84c630ab4bd6d2f393a0f8bf0112db3a8bde93176e06b21ef6cb1743416709d1dbde1319ecb4493a6209d2816438b"], 0x8) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmmsg(r1, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x6, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000002c0)="da89a5bd0b15a08a06bfe1c10a7f13", 0xf, 0xfffffffffffffffc) keyctl$describe(0x6, r3, &(0x7f0000000340)=""/119, 0x77) [ 1370.170881][T31989] 8021q: adding VLAN 0 to HW filter on device team0 [ 1370.203945][T32154] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1370.224017][T32157] device team0 left promiscuous mode [ 1370.230638][T32157] device team_slave_0 left promiscuous mode [ 1370.249616][T32157] device team_slave_1 left promiscuous mode 14:39:04 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x600000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:04 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={r1, 0x6}, &(0x7f00000000c0)=0x8) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xba75) 14:39:04 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x700000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:05 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 14:39:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891c, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7fd, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x0, 0xfdfdffffffffffff}}}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000004c0)=ANY=[@ANYBLOB="71f8643957b5f5d9dae99556d90aeecaeebc5e094e2c3009b7ae252d291955b8032fc7743e0b6395c013f8fa09208e9b406c04965352b93532dbbb7583534e2da81a763f2e6d17569bdd5f82b1eb38c3848c267e6731f84c630ab4bd6d2f393a0f8bf0112db3a8bde93176e06b21ef6cb1743416709d1dbde1319ecb4493a6209d2816438b"], 0x8) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmmsg(r1, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x6, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000002c0)="da89a5bd0b15a08a06bfe1c10a7f13", 0xf, 0xfffffffffffffffc) keyctl$describe(0x6, r3, &(0x7f0000000340)=""/119, 0x77) 14:39:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffc) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={@local}, &(0x7f0000000200)=0x14) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x3000, &(0x7f0000000140), &(0x7f00000001c0)=[0x0]}}], 0x0, 0x0, &(0x7f0000000300)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 1370.572184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1370.572190][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:39:05 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffe, 0x20002) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000001c0)=""/125}, 0x18) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="ad", 0x1}], 0x1, 0x1000000) 14:39:05 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x600000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1370.629382][T32689] binder: 32688:32689 got transaction with invalid offsets ptr [ 1370.642384][T32689] binder: 32688:32689 transaction failed 29201/-14, size 0-12288 line 3193 [ 1370.662710][T32471] device team0 left promiscuous mode 14:39:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8934, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1370.712704][T32471] device team_slave_0 left promiscuous mode [ 1370.738765][T32471] device team_slave_1 left promiscuous mode 14:39:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8935, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:05 executing program 1: r0 = socket(0x400040000000015, 0x6, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x552d967d, 0x7, 0xfff, 0x8001, 0x9}) connect$inet(r0, &(0x7f0000000900)={0x2, 0x0, @loopback}, 0x10) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20001100}, 0xc, &(0x7f0000000200)={&(0x7f0000000940)={0x7d8, 0xf, 0xb, 0x10, 0x70bd2b, 0x25dfdbfc, {0xf, 0x0, 0xa}, [@nested={0x1a0, 0x26, [@generic="c56f7d3bee4ddcdb52b685b8b4b569080687c99f343a9d9fd07abd5bfa15a0295ef24de792d050c5bb72d0dbc989e8bfb775f22701c4273df286376bb3808687c2c738ac9a34a3edf160800e9bb5cc5a5efb5ee339a3a3c1597be12e255441b08f810bfe2f7470a5691fc8b20b282e5949c27488e5138b465465e86b3026cd52fa232f21731d856660da848d52598ecd268b1ab226597a8112d4107ae11bb0bf5c59effbe1c359982d04cc2d725166344326eaa6316abf4f619d7d0f45f260743bf0756e8574", @generic="1cc24eec0608a8db40975bf9b8601d5cf4783b0d6dc014c4d3cdee15c9fb0ded959811b92e3e141d644dd448fb590e594bc37feff278ffc30c2d1c358f4986708429a3d4453f19643a596cad5d2130af6aef1b55a3bed28caacd6a651747f17a8814919e29af81a005c0992551783e4ed4e00ee5c4498ad8bf7d65794a4389653ffac8e46bb6cc4fdffcaf38c11d9816a8d17fbe4e2384e91d2983a52f2b9e0a8ae84e348296d2f20c3976a01f5e38ed7a714969", @generic="cdf1eab9bd73fb5479a9fcbec1be1796fb485c067feaa2411825eaae57b95d216e"]}, @typed={0x8, 0xd, @uid=r1}, @typed={0x4, 0xb}, @nested={0xc, 0x96, [@typed={0x8, 0x8f, @pid=r2}]}, @generic="333b595b13ff30da87de98a75a75041890b45ce0bbf7b46a628f6f27d135177cfe77bfb9ef3f262662ac46f4bf2ea65dba4462d968ebb91a85d05a0746080a791ae29173ebec6a811bf5412484eea3b744878ce0f77bf7542b39f126c688705bced49dca3fed0fa7499e6f82a63d060e69fcbaffe383bd58efe3aaefbc63b2819ad0bb157d8ca8317c3bcc1beafd159c704f9c61853527572a0bb3bc5ebe43cffc19c8e6e363d5abf5c43ff4cc47f0e419aabd553bd351c17197bf18eb7de5b0eddab015af3f4746da5d33f4f73b22d894a2993385632413bc1ccc301a47", @nested={0x328, 0x77, [@generic="c0a00e2e25655c2437a7520348bfb2", @generic="6bb212f3718fdc5bc911f754731f60b6fe519e3f0dbfe6ad6d8efe0013f94acdb4f0862b64c4d6c1d6a874c7bc7e6b08948eb0aa0343ec2c41a55a6a8996ed2529edf6bf58c1721f5b4b2e557545c88dbb98702d37a4df5ff1f4125d5c8c9d1e3d", @typed={0x104, 0x69, @binary="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"}, @generic="122255e0757018bbbfa2cf9e9a8826d815530c82f4081d5deeaa948fd10aa2ab7272ff5259cb8e2725a8f1818e760357d02fc4c71b8392e54b5444e7b7d7db1a286cfe63ccd7bb3633ae7c1f33d4fc9fa792d1d409e74e6d4894b45cf5bb7d2a16202c292bedee6f4ff9590cbf4521d08844b85b40d1435205a24c725061d643e04255c90b8b9ef84e192ab1b3b196a30f19196ff2b4330bfbe6c51e09f74934cd51a48611d0360942f26b7ebcd5ca8965dc8455e13cb21d8ee55fbb052691c7610279343450977dd0627b88cb397e0ee41bcee0f236b46b947b9bd8838748ce2757aef7283166", @generic="6477484353675ac504bc6a2d0ddd2ec7ba090f3df47025e464d9da6b6e40256e8ecc90ea40d09c02a980453a47da926716975b19f42e6da304b68538f54a9e9404ff1967f7c8d56068bfaa1b3dad8271d746f7d43f911369a0f2febf63f1d74066a2434474fa57782e129ccd9fa89b6fb9951e3ab5372e2b101b387697d2db74b8780be10048ccae3594deea27dd464bb67608d00c461c357da97a3a312d15d163e229e59b9f8bff87a0a44943542043130e878dcfb819144e62f3200fb7170e3d11188ed162"]}, @generic="d7759d9c710a5fce05b0d0fa5dbf264b9a82b6b6ac3884faf4765f09be80b9be6871a7698951580a7862118a545856f4ba2e1acec584bdc0532eeb0da98f94bdc0d8f6a006efcdeb7929e62b493bc2cc9059d77cabf70f6faca5df63d511c6771b3dd2d9aca8f01efa1a848722bebab596591a3c4fb022bd8e2089321db7ff6f", @generic="a5b765562a19191e560bb99e5905ef2d80f371370df4dbb0fbd257ad364c7991784282a3", @generic="462b861dad58a482b5885f4a6b0e541d4413ca8b3bad042356d3867c70038983ae8d73bbcc008f5f6d124c8637cc44ed0c28dd76e1fc992d0c207c8159b81bb90400c40b896354785f8077039d6347e3832c764aebe8574a428e574bcb6b33cc96b9e8827db7acc4630cec6a636b8e4bd1a183a278828b6bc509bb4f84f64a564ca2ea00d582c9f40f9fb8a27c0abe29f8b4996d71c6e76f", @generic="ab49dbca4b771fdbfa331bcf910e00e2f85a4ca74ff36f9125c017adcc0cf40a9156ca74d237a7c4d88bfaab6bd550aa0f2378ea3499926b3e8c9aa8cd0d85d1cb4cfb40166858597465f698424b6a667dc9ce735d6c85b1d1bd5bc332fd0baebb2b401c31d02120b7bc8610b8e7d29db110704e42d817c888c62e9edec98f1ac76102696e1173806e8ff2333c19a0721a816f1df17b7663d3238babab9c1a94bd5d7ec3182c9d3b4616d4fb5990fef8bde8fbfc5f2dff573d399c002118071be6bc32828298bb5ba1"]}, 0x7d8}, 0x1, 0x0, 0x0, 0x20004044}, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) [ 1370.839757][T32518] device team0 entered promiscuous mode [ 1370.841904][ T12] binder: undelivered TRANSACTION_ERROR: 29201 14:39:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:05 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x4081806) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r2 = epoll_create1(0x80000) r3 = socket$tipc(0x1e, 0x4, 0x0) bind$tipc(r3, 0x0, 0x0) dup2(r3, 0xffffffffffffffff) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x1ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x2000}) r4 = gettid() kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, 0xffffffffffffffff, 0x0) close(r1) close(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@empty, @in6=@empty}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@local, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@broadcast, @in=@empty}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, 0x0) getgroups(0x1, &(0x7f0000000300)=[0xee01]) getgroups(0x5, &(0x7f0000000980)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="fa00000000000000"], 0x1, 0x1) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x0, 0x8, 0x2}}, 0x28) [ 1370.892294][T32518] device team_slave_0 entered promiscuous mode [ 1370.933600][T32518] device team_slave_1 entered promiscuous mode [ 1370.954386][T32518] 8021q: adding VLAN 0 to HW filter on device team0 [ 1371.004924][T32471] device team0 left promiscuous mode [ 1371.037595][T32471] device team_slave_0 left promiscuous mode [ 1371.092464][T32471] device team_slave_1 left promiscuous mode [ 1371.136164][T32518] device team0 entered promiscuous mode [ 1371.150263][T32518] device team_slave_0 entered promiscuous mode [ 1371.158786][T32518] device team_slave_1 entered promiscuous mode 14:39:05 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x800000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000040)) 14:39:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:05 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 14:39:05 executing program 4: bind$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000280)) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000002c0)={0x33, 0x23, 0x0, 0x11, 0x0, 0x6, 0x0, 0x146, 0xffffffffffffffff}) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x2c) setsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000300)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) select(0x40, &(0x7f0000000080)={0xfb26, 0x8001, 0x2, 0x7fff, 0x7, 0x8, 0x7f, 0x20}, &(0x7f00000000c0)={0x4, 0xab8, 0x8001, 0x9, 0x4, 0xffffffff, 0x7, 0xc259}, &(0x7f0000000340)={0x80000001, 0x100, 0x7, 0x1, 0x7, 0x7ff, 0x2, 0x20}, &(0x7f00000003c0)={r2, r3/1000+30000}) r4 = msgget(0x1, 0x200) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000180)=""/232) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0x600000000000000, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 14:39:05 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x600000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1371.184447][T32518] 8021q: adding VLAN 0 to HW filter on device team0 14:39:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1371.311919][ T763] device team0 left promiscuous mode [ 1371.344156][ T763] device team_slave_0 left promiscuous mode 14:39:05 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1371.423844][ T763] device team_slave_1 left promiscuous mode 14:39:06 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8953, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1371.546222][ T764] device team0 entered promiscuous mode [ 1371.593910][ T764] device team_slave_0 entered promiscuous mode [ 1371.614842][ T764] device team_slave_1 entered promiscuous mode 14:39:06 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0xffffffffffffff0c}], 0x39e) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x1000, 0x401, 0x7, 0x7594, 0x3, 0x2, 0x7, 0x6]}) openat$cgroup_procs(r3, 0xfffffffffffffffe, 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000100)='keyringY&%GPLselinuxem1+\\em0\x00') write(r3, 0x0, 0xffffffffffffff67) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) close(r0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x7, @broadcast}}, 0x3, 0x3926, 0x7, 0x10000, 0x5}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=r4, 0x4) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000001c0), 0x4) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x8000000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) 14:39:06 executing program 2: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0x0, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e22, 0x101, @empty, 0xee}, {0xa, 0x4e23, 0x227a, @empty, 0x4}, 0x7, [0x3, 0x20, 0x3, 0x8897, 0x40, 0x101, 0xab5, 0x9]}, 0x5c) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x4, 0x0, &(0x7f0000000000)=[@register_looper={0x40406300}], 0x1, 0x100000000000000, &(0x7f0000000140)="06"}) 14:39:06 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8955, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1371.727306][ T764] 8021q: adding VLAN 0 to HW filter on device team0 [ 1371.756463][ T974] device team0 entered promiscuous mode [ 1371.788698][ T974] device team_slave_0 entered promiscuous mode [ 1371.832461][ T974] device team_slave_1 entered promiscuous mode [ 1371.868053][ T974] 8021q: adding VLAN 0 to HW filter on device team0 [ 1371.888289][ T763] device team0 left promiscuous mode [ 1371.919248][ T763] device team_slave_0 left promiscuous mode [ 1371.928031][ T763] device team_slave_1 left promiscuous mode [ 1371.942013][ T764] device team0 entered promiscuous mode [ 1371.950385][ T764] device team_slave_0 entered promiscuous mode [ 1371.998566][ T764] device team_slave_1 entered promiscuous mode [ 1372.075276][ T764] 8021q: adding VLAN 0 to HW filter on device team0 14:39:06 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x1800000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:06 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:06 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:06 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0xffffffffffffff0c}], 0x39e) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x1000, 0x401, 0x7, 0x7594, 0x3, 0x2, 0x7, 0x6]}) openat$cgroup_procs(r3, 0xfffffffffffffffe, 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000100)='keyringY&%GPLselinuxem1+\\em0\x00') write(r3, 0x0, 0xffffffffffffff67) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) close(r0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x7, @broadcast}}, 0x3, 0x3926, 0x7, 0x10000, 0x5}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=r4, 0x4) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000001c0), 0x4) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x8000000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) [ 1372.230685][ T1318] device team0 left promiscuous mode [ 1372.246063][ T1318] device team_slave_0 left promiscuous mode [ 1372.264602][ T1318] device team_slave_1 left promiscuous mode 14:39:07 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x200, 0x0) fcntl$setstatus(r1, 0x4, 0x400) 14:39:07 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000280)={0x400, 0x8, 0x4, 0x0, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={r2}, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'gre0\x00', @ifru_flags}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x7, 0x4000000000006) socket(0x0, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x10}, 0x1c) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x8, 0x4) sendmmsg(r3, &(0x7f00000002c0), 0x3af, 0x0) recvmsg(r3, &(0x7f0000001680)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000001580)=[{0x0}, {&(0x7f0000001200)=""/20, 0x14}], 0x2, &(0x7f0000001600)=""/101, 0x65, 0x4}, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)) 14:39:07 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000003000000bd000000000000004d0000000000000095000000000000007f1093ebc81adb828a4a1bc18fb9395988a0aa1da3597dbee1da4499333ba39d07ba4024653539621de72a953eebe58c38c4068b4cfaa3907675e323c3484fd097b9f8f5c1f957ee5def5b78e3da4cb70de783299534b6b16f8d1b355f6f84910cc9826d5a533ce23333bbe845c53eb4895f7f623a16d0d689839c441814821249ed7f439c0613bddd42f30e1d3ef52408c97ef31dc37ca573b012df06e0d65c74422d4d2388f330544efe078daf962490e08005cfd31156c1b8e1"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x3d1, &(0x7f000000cf3d)=""/195}, 0x48) 14:39:07 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:07 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000300)={r1, 0x4bf3}, &(0x7f0000000340)=0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000001c0)={{0x6, 0x9}, 0x1, 0x7fffffff, 0x6c34, {0x4, 0x6}, 0x3, 0x7fffffff}) eventfd2(0x1, 0x80800) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r5, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4800}, 0x10) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000080), &(0x7f0000000180)=0x4) 14:39:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYRES16=r0], 0x0) 14:39:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x88880, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000001c0)={0xa, &(0x7f0000000180)=[0x7, 0x8, 0x2, 0x6, 0x4, 0x19, 0x8, 0x2, 0x5, 0x0]}) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x80000) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f00000000c0)={0x7fff, 0x3}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r1, 0x10, &(0x7f0000000300)={&(0x7f0000000400)=""/149, 0x95, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r1, 0x10, &(0x7f0000000380)={&(0x7f0000000200)=""/16, 0x10, r3}}, 0x10) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f0000000980), &(0x7f00000009c0)=0x4) write$binfmt_elf64(r1, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], 0x55a) socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000001140)}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) fcntl$dupfd(r0, 0x0, r0) [ 1373.027007][ T1321] device team0 left promiscuous mode [ 1373.038072][ T1321] device team_slave_0 left promiscuous mode [ 1373.083257][ T1321] device team_slave_1 left promiscuous mode [ 1373.099044][ T1322] device team0 entered promiscuous mode [ 1373.106090][ T1322] device team_slave_0 entered promiscuous mode [ 1373.113827][ T1322] device team_slave_1 entered promiscuous mode [ 1373.123702][ T1322] 8021q: adding VLAN 0 to HW filter on device team0 [ 1373.131105][ T1323] device team0 entered promiscuous mode [ 1373.137549][ T1323] device team_slave_0 entered promiscuous mode [ 1373.144646][ T1323] device team_slave_1 entered promiscuous mode [ 1373.152052][ T1323] 8021q: adding VLAN 0 to HW filter on device team0 [ 1373.172589][ T1762] device team0 left promiscuous mode [ 1373.177928][ T1762] device team_slave_0 left promiscuous mode 14:39:07 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) unlink(&(0x7f0000000140)='./file0\x00') r1 = memfd_create(&(0x7f0000000b80)='\x88])+\x00', 0x0) write(r1, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x80, 0x4) ftruncate(r1, 0x10001) sendfile(r1, r1, &(0x7f0000000040), 0xff8) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000380)='./file0\x00') 14:39:07 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:07 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7f, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000140)=r2) 14:39:07 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x1f00000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1373.203359][ T1762] device team_slave_1 left promiscuous mode [ 1373.221564][ T1821] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 14:39:07 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:07 executing program 4: mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1f, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000280)) r1 = request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='nfs4\x00', 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r1, r2) [ 1373.338559][ T1878] device team0 left promiscuous mode 14:39:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000180)=0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 1373.369383][ T1878] device team_slave_0 left promiscuous mode [ 1373.398155][ T1878] device team_slave_1 left promiscuous mode 14:39:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xff) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="10ddfff8ffff86390000dfffffd6afb200875fb15bb43e651900"], 0x10}}], 0x1, 0x0) ioctl$CAPI_GET_PROFILE(0xffffffffffffffff, 0xc0404309, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={r0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x10, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48c0}, 0x20040001) r5 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @rand_addr, @multicast1}, &(0x7f0000000080)=0xc) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) 14:39:08 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xf23, 0x8000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000000)={0x0, 0x0, 0x3015, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}) 14:39:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) prctl$PR_MCE_KILL_GET(0x22) [ 1374.124865][ T2005] device team0 entered promiscuous mode [ 1374.130452][ T2005] device team_slave_0 entered promiscuous mode [ 1374.141884][ T2005] device team_slave_1 entered promiscuous mode [ 1374.155900][ T2005] 8021q: adding VLAN 0 to HW filter on device team0 [ 1374.166763][ T2100] device team0 entered promiscuous mode 14:39:08 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:08 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1374.204714][ T2100] device team_slave_0 entered promiscuous mode [ 1374.242518][ T2100] device team_slave_1 entered promiscuous mode [ 1374.268631][ T2100] 8021q: adding VLAN 0 to HW filter on device team0 [ 1374.295835][ T2509] device team0 left promiscuous mode 14:39:08 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) fstat(r0, &(0x7f00000000c0)) r2 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x1, 0x5, 0x7, 0x3a]}) [ 1374.314254][ T2509] device team_slave_0 left promiscuous mode [ 1374.327571][ T2509] device team_slave_1 left promiscuous mode 14:39:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000000)={0x8, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000100)={0x0, 0xa, 0x0, "5a565a6e3ad7a239a3b2db016e70d29949c8f642fd9777d697e01a9b57fd5a80"}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000300)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r2, 0x702, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xc8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x40805) 14:39:09 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x2000000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1374.386387][ T2519] device team0 left promiscuous mode [ 1374.399136][ T2519] device team_slave_0 left promiscuous mode 14:39:09 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a1, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x30, 0x2, 0x2, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x14, 0x7, @ipv6=@mcast2}]}, 0x30}}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xa00, 0x10400) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x100, 0x8000, 0x0, 0xa6e, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x4e21, @multicast1}}}, 0x84) [ 1374.435493][ T2519] device team_slave_1 left promiscuous mode [ 1374.513830][ T2685] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 14:39:09 executing program 1: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x400020015) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={0x0, 0x5}, &(0x7f0000000500)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x8}, 0x28) clone(0x3ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000480)={{0x7f, @dev={0xac, 0x14, 0x14, 0x27}, 0x4e20, 0x2, 'sed\x00', 0x10, 0x6, 0x20}, {@remote, 0x4e23, 0x3, 0x76, 0x400, 0xffffffffffffffe0}}, 0x44) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000440)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xedc000000000}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000340)={0x3c, @rand_addr=0xfffffffffffffff9, 0x4e21, 0x0, 'lblc\x00', 0x2, 0x7, 0x80}, 0x2c) getsockopt$inet_dccp_buf(r0, 0x21, 0xce, &(0x7f0000000080)=""/5, &(0x7f0000000280)=0x5) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000240)) sendmmsg$unix(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000600)="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", 0xfd}], 0x1, 0x0, 0x0, 0x1}], 0x1, 0xc000) shutdown(0xffffffffffffffff, 0x0) [ 1374.557495][ T2685] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 14:39:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x7, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000000)=0xdf8, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = socket(0x10, 0x2, 0x0) r3 = dup(r2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0xfaef7e14cfee5b4a, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xe84, 0x4, "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", 0x100000000, 0x0, 0x5d7, 0x9, 0x4, 0x8, 0x8, 0x1}, r4}}, 0x120) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r2, r5, 0x0, 0x80000002) 14:39:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffffffffff) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4000, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000180)=""/77) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000035000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="0f005f00c4c279130d090000008fc860a3b20e0000000066ba6100b003eef30f2200f2af66baf80cb8ce9e8488ef66bafc0cec66baf80cb8b4cecd84ef66bafc0c66edf20f201d660fd7ec"}], 0x0, 0x0, 0x0, 0xfffffffffffffd20) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) [ 1374.732203][ C0] net_ratelimit: 21 callbacks suppressed [ 1374.732212][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1374.732631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1374.738060][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1374.744128][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000040)={0x6, 0x8, 0x33, "81db70882e4dc9af245101ea1cebf4a2806f4c8499daa18be78491b4f4921f0c931d86fe5847da4c22f8d7a6c20baec5607b58ffa7ee6a0f8084ba86", 0x29, "a2aeed8ff2e01565af9b56eeb91ff8b22901609e00e9ebd01f2d3c2f56a61de46b182f57c6364b3baac2ef2ee7717c1f87a00cd2d245d8ba2b43760e", 0x40}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1b00004f83b7d36fd4e31c0501001c00000000000000000000008ec1b455000000000000"], 0x24}}, 0x0) r2 = dup3(r0, r0, 0x80000) dup2(r1, r0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000180)={0x3c, @loopback, 0x4e23, 0x3, 'dh\x00', 0x6, 0x6, 0x7b}, 0x2c) 14:39:09 executing program 2: ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000340)={0x0, 0x2}) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x480000, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x3000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x8002) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) close(r3) 14:39:09 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x100000007fffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x490, 0x118, 0x118, 0x280, 0x280, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x1, 0x10001}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x80000000}}}, {{@uncond, 0x0, 0x128, 0x168, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d2, 0x4d4, 0x8, 0x6, 0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x3f, 0x0, 0x5266, 0x81, 0xfff, 0x1664, 0x10}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xf0, 0xa, "7f83ec9960471b114f9da5cf7e90e46ad0b6633b57b4c3d856ee77cb46db"}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x80000000}}, @common=@inet=@dscp={0x28, 'dscp\x00', 0x0, {0x9}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x100, 0xff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x3, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xea7]}}) [ 1375.123466][ T2526] device team0 entered promiscuous mode [ 1375.129070][ T2526] device team_slave_0 entered promiscuous mode [ 1375.152503][ T2526] device team_slave_1 entered promiscuous mode [ 1375.173780][ T2526] 8021q: adding VLAN 0 to HW filter on device team0 [ 1375.181726][ T2808] device team0 entered promiscuous mode [ 1375.202231][ T2808] device team_slave_0 entered promiscuous mode [ 1375.208590][ T2808] device team_slave_1 entered promiscuous mode 14:39:09 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000180)={0x157, 0x3, 0xffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x55ad2fc3, 0x40) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x202000) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x402000, 0x0) ioctl$VT_RELDISP(r3, 0x5605) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') fcntl$getown(r1, 0x9) preadv(r4, &(0x7f0000000200)=[{&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f0000000380)=""/141, 0x8d}, {&(0x7f00000004c0)=""/94, 0x5e}], 0x3, 0x38) [ 1375.232549][ T2808] 8021q: adding VLAN 0 to HW filter on device team0 14:39:09 executing program 2: r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='-selinux\x00', 0xfffffffffffffff8) r1 = request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000200)='/dev/kvm\x00', 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', r1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7, 0x400000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x253120ce}, &(0x7f0000000340)=0x8) syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0xb43, 0x800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)={r4, 0x1, "f6"}, &(0x7f00000003c0)=0x9) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000083, 0xdfef], [0x187]}) [ 1375.276980][ T2647] device team0 left promiscuous mode [ 1375.346462][ T2647] device team_slave_0 left promiscuous mode [ 1375.378818][ T2647] device team_slave_1 left promiscuous mode [ 1375.392364][ T2808] device team0 entered promiscuous mode [ 1375.398184][ T2808] device team_slave_0 entered promiscuous mode [ 1375.408736][ T2808] device team_slave_1 entered promiscuous mode [ 1375.423890][ T2808] 8021q: adding VLAN 0 to HW filter on device team0 [ 1375.440125][ T3546] device team0 left promiscuous mode 14:39:10 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x3f00000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:10 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:10 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x100000007fffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x490, 0x118, 0x118, 0x280, 0x280, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x1, 0x10001}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x80000000}}}, {{@uncond, 0x0, 0x128, 0x168, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d2, 0x4d4, 0x8, 0x6, 0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x3f, 0x0, 0x5266, 0x81, 0xfff, 0x1664, 0x10}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xf0, 0xa, "7f83ec9960471b114f9da5cf7e90e46ad0b6633b57b4c3d856ee77cb46db"}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x80000000}}, @common=@inet=@dscp={0x28, 'dscp\x00', 0x0, {0x9}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x100, 0xff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x3, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xea7]}}) 14:39:10 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001440)={0x1, 0x4, 0x7, 0x1, 0x2, 0x7ff, 0x6, 0x2c9, 0xb2f, 0x2, 0x4}, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x509480) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x92) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000400)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='gfs2meta\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/176, 0xb0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000340)=""/179, 0xb3}], 0x3, &(0x7f0000000140)=""/56, 0x38}, 0x100) [ 1375.446353][ T3546] device team_slave_0 left promiscuous mode [ 1375.461154][ T3546] device team_slave_1 left promiscuous mode [ 1375.530900][ T3762] gfs2: gfs2 mount does not exist 14:39:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080), 0x4) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f00000000c0)={0x2, 0x0, [{0x6, 0x3, 0x0, 0x0, @adapter={0x8, 0xc5, 0xffffffff, 0x3, 0x9}}, {0x1, 0x0, 0x0, 0x0, @msi={0x2, 0x400, 0x5}}]}) r3 = shmget$private(0x0, 0xb000, 0x0, &(0x7f0000ff5000/0xb000)=nil) mlockall(0x7) shmat(r3, &(0x7f0000ff5000/0x2000)=nil, 0x80000006000) 14:39:10 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4020940d, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200000, 0x0) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x200, 0x400040) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x84100, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000006000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:10 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1375.692179][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.697989][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:39:10 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1376.055402][ T3664] device team0 entered promiscuous mode [ 1376.069832][ T3664] device team_slave_0 entered promiscuous mode [ 1376.076988][ T3664] device team_slave_1 entered promiscuous mode [ 1376.091613][ T3664] 8021q: adding VLAN 0 to HW filter on device team0 [ 1376.101840][ T3770] device team0 left promiscuous mode [ 1376.102177][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1376.113042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1376.113760][ T3770] device team_slave_0 left promiscuous mode [ 1376.118858][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1376.118896][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1376.142021][ T3770] device team_slave_1 left promiscuous mode 14:39:10 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:10 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000080)) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) [ 1376.178089][ T3774] device team0 entered promiscuous mode [ 1376.202552][ T3774] device team_slave_0 entered promiscuous mode [ 1376.220476][ T3774] device team_slave_1 entered promiscuous mode [ 1376.241945][ T3774] 8021q: adding VLAN 0 to HW filter on device team0 [ 1376.274184][ T3998] device team0 left promiscuous mode [ 1376.281047][ T3998] device team_slave_0 left promiscuous mode [ 1376.293768][ T3998] device team_slave_1 left promiscuous mode [ 1376.548630][ T4063] device team0 entered promiscuous mode [ 1376.557936][ T4063] device team_slave_0 entered promiscuous mode [ 1376.568562][ T4063] device team_slave_1 entered promiscuous mode [ 1376.586188][ T4063] 8021q: adding VLAN 0 to HW filter on device team0 [ 1376.597439][ T3770] device team0 left promiscuous mode [ 1376.606124][ T3770] device team_slave_0 left promiscuous mode [ 1376.615674][ T3770] device team_slave_1 left promiscuous mode [ 1376.627524][ T3774] device team0 entered promiscuous mode [ 1376.636074][ T3774] device team_slave_0 entered promiscuous mode [ 1376.645153][ T3774] device team_slave_1 entered promiscuous mode [ 1376.656329][ T3774] 8021q: adding VLAN 0 to HW filter on device team0 14:39:11 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x4000000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:11 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc020660b, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10000, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x6, 0x800, 0x8, r1, 0x4}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x1500}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) r4 = getegid() r5 = getgid() r6 = getegid() fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getgroups(0x5, &(0x7f0000000140)=[r4, r5, r6, r7, r8]) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0xf6c) 14:39:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0xffffffffffffffff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x49c, 0x9, 0x4bb7}) 14:39:11 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000280)=""/4096, 0x8fe) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x80000009) getdents64(r0, 0x0, 0x0) 14:39:11 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:11 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x02#\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1376.815586][ T4221] device team0 left promiscuous mode [ 1376.830122][ T4221] device team_slave_0 left promiscuous mode [ 1376.844676][ T4221] device team_slave_1 left promiscuous mode [ 1376.897714][ T4220] device team0 left promiscuous mode 14:39:11 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x2000000000008040, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xffffffffffffffe0, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r1, 0x4) fcntl$setlease(r0, 0x400, 0x1) [ 1376.938736][ T4220] device team_slave_0 left promiscuous mode [ 1376.948521][ T4220] device team_slave_1 left promiscuous mode 14:39:11 executing program 2: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x1) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) ioctl$EVIOCSCLOCKID(r0, 0x40084504, &(0x7f0000ffcffc)) 14:39:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) socket$bt_hidp(0x1f, 0x3, 0x6) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) request_key(0x0, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 14:39:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='gre0\x00', 0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x7fff) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x404, 0x4) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) connect$rds(r1, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) 14:39:12 executing program 4: syz_emit_ethernet(0x46, &(0x7f00000017c0)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x21, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3800000000000000, 0x5]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x3) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) syz_emit_ethernet(0x42, &(0x7f0000000080)={@broadcast, @broadcast, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0xf, @local, @remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @mcast2}}}}, 0x0) [ 1377.652663][ T4407] device team0 entered promiscuous mode [ 1377.658290][ T4407] device team_slave_0 entered promiscuous mode [ 1377.671557][ T4407] device team_slave_1 entered promiscuous mode [ 1377.679827][ T4407] 8021q: adding VLAN 0 to HW filter on device team0 [ 1377.694180][ T4357] device team0 entered promiscuous mode [ 1377.699764][ T4357] device team_slave_0 entered promiscuous mode [ 1377.724483][ T4357] device team_slave_1 entered promiscuous mode [ 1377.734461][ T4357] 8021q: adding VLAN 0 to HW filter on device team0 [ 1377.743115][ T4221] device team0 left promiscuous mode [ 1377.756251][ T4221] device team_slave_0 left promiscuous mode 14:39:12 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x4800000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:12 executing program 2: unshare(0x200) semget$private(0x0, 0x406, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') semop(0x0, &(0x7f0000000080)=[{0x0, 0x7, 0x1800}, {0x0, 0xffff}], 0x2) setns(r0, 0x0) signalfd4(r0, &(0x7f0000000000)={0x3}, 0x8, 0x80800) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80080, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x8001, @mcast2, 0x1}}, 0x1f, 0x74e3}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x5ece}, 0x8) 14:39:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$alg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000740)="24ecac4589992b437c8ad0d237f14226", 0x10}], 0x1}, 0x0) io_setup(0x800000100000005, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) [ 1377.769548][ T4221] device team_slave_1 left promiscuous mode [ 1377.780779][ T5049] device team0 entered promiscuous mode [ 1377.786882][ T5049] device team_slave_0 entered promiscuous mode [ 1377.795240][ T5049] device team_slave_1 entered promiscuous mode [ 1377.802957][ T5049] 8021q: adding VLAN 0 to HW filter on device team0 14:39:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1b123c123f3188b070") r1 = socket$inet6(0xa, 0x80803, 0x2) connect$inet6(r1, &(0x7f0000000080), 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000000)=0xe8) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f00000000c0)=0xdc0, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/raw\x00') setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000440)=0x6, 0x4) write$binfmt_elf32(r1, 0x0, 0x0) recvfrom$inet6(r1, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffff58) r3 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x1, 0x4003) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r4, 0x10, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x2, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000003c0)={0x5000, 0x105000}) 14:39:12 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:12 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00#\x02L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000001000090c000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000001f00007ca5a6eecd435aee2a3b003e3ec749c6000193aa087a49f8d191f200617069"], 0x34}}, 0x0) r2 = socket(0x11, 0x802, 0x0) memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0), 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40002201}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x104, r5, 0x11, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x200}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4b}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffff5e8f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) ioctl$TIOCCONS(r3, 0x541d) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x10000, 0x2, 0x3, 0x8, 0x0, 0x2000000000000, 0x2000, 0xb, 0x52, 0x0, 0x5, 0x1ffda0000, 0x10000, 0x1000, 0x7, 0x7a, 0x4, 0x2, 0x80000001, 0x1, 0x66b5c1b1, 0x9, 0x2, 0x0, 0x0, 0x10000, 0x100000001, 0x1, 0x0, 0x3ff, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x3ff, 0x0, 0x100000000, 0x0, @perf_config_ext={0x8}, 0x20, 0x6, 0x3, 0xf, 0x200, 0x5, 0x1}, 0x0, 0x5, r4, 0xa) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0xfffffffffffffff7, 0x8001, 0x80, 0x5}, {0x73, 0x400, 0x1000, 0x6}, {0x7fff, 0x20, 0x0, 0x4}, {0x3f6d, 0x1ff, 0x7, 0x9}, {0x1ff, 0x800, 0x8}, {0x7, 0x5, 0x3, 0x3523}, {0x7, 0x49f, 0x3f, 0x40}, {0x4, 0x2, 0x1, 0x4}]}) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$int_in(r6, 0x800000c0045005, &(0x7f00000004c0)=0x100040000) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bond0\x00'}) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000002c0)=0x82, 0x4d6) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', 0x17fc}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1377.893248][ T5062] device team0 left promiscuous mode [ 1377.931707][ T5062] device team_slave_0 left promiscuous mode 14:39:12 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000380), &(0x7f00000003c0)=0x8) fsync(r0) ioctl$RTC_AIE_OFF(r0, 0x7002) r1 = socket(0x848000000015, 0x805, 0x0) connect(r1, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x10000, 0x3, 0x9, 0x1, @random="f8dbad0c2a2f"}, 0x80) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000001c0)={0x9, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)=0x1) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0xfffffffffffffdaf) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000340)={0xffff, 0x6, 0x4, 0xff}, 0x10) [ 1377.987126][ T5062] device team_slave_1 left promiscuous mode 14:39:12 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0'}, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000000480)=[{&(0x7f0000000080)='S', 0x1}], 0x1, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x4, &(0x7f0000000000)='syz0', 0xffffffffffffffff}, 0x30) write$P9_RGETLOCK(r1, &(0x7f00000001c0)={0x23, 0x37, 0x1, {0x2, 0x7fff, 0x4, r3, 0x5, 'hash\x00'}}, 0x23) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x6, 0x4, 0x400, 0x0, 0x8}) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 14:39:12 executing program 2: r0 = socket(0x19, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) [ 1378.105431][ T26] kauditd_printk_skb: 76 callbacks suppressed [ 1378.105446][ T26] audit: type=1326 audit(1553438352.688:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5357 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x0 14:39:12 executing program 1: r0 = socket(0x1e, 0x4, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x88082) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000800)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x401, 0x5, {"601114b7b22fcdc2973f7b1946550d92"}, 0x2ac3, 0x0, 0x9}, @in6={0xa, 0x4e23, 0xe11d, @dev={0xfe, 0x80, [], 0x19}}}}, 0x118) getpgid(0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, &(0x7f0000000140)={0x2, 0x2, 0x2, 0xffffffffffffff00, 0x1155c19061ddfcba, 0xffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)}}, 0xfffffe78) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc, 0x0, 0x300000000000000}, 0xf6) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x100008, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0x4008ae48) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000540)={0x0, 0x8000}, &(0x7f0000000580)=0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000300)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x1, 0x20, 0x0, 0x0, 0x2, 0x2, 'syz1\x00', &(0x7f0000000180)=['uservboxnet0nodev[lo\x00', 'trustedem1cpuset\x00'], 0x26, [], [0x0, 0x0, 0x81]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socketpair(0x0, 0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) 14:39:12 executing program 2: r0 = msgget(0x3, 0x400) msgctl$IPC_RMID(r0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000340)='/dev/capi20\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') getxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB='0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/user\x00') mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x100030, r1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0xfffffffd, 0x0, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000080)={0x0, 0x0, @ioapic}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, 0x0) 14:39:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) r1 = socket$inet6(0xa, 0x400000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x40}, 0x1c) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x8}, 0x28, 0x2) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0xff2b}]) 14:39:13 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1378.839536][ T5806] device team_slave_0 left promiscuous mode [ 1378.846468][ T5806] device team_slave_1 left promiscuous mode [ 1378.861199][ T5810] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 14:39:13 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000240)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e20, 0x80000001, @empty, 0x9}}}, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r2, 0x48, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in6={0xa, 0x4e23, 0x80000001, @rand_addr="f7f7d72ac9278f393efb8472de3d7250", 0xfff}]}, &(0x7f0000000180)=0x10) [ 1378.949499][ T5822] device team0 left promiscuous mode 14:39:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000100)='.\x00', &(0x7f0000000540)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x20000, 0x0) mount(&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x5010, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x7, 0x0) link(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00') r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000300)={0x10001, 0x8, 0x10000, 0x3, 0x5}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000005, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r6, 0x401870cc, &(0x7f0000000140)={0x35, 0x80000001, 0x7, 0x4}) ftruncate(r6, 0x7fff) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000240)='\xb4(\x93\x9c\xa6w\xd2\x1d\x19bbr\x00', 0xd) sendfile(r5, r6, 0x0, 0x8000dffffffe) [ 1379.005454][ T5822] device team_slave_0 left promiscuous mode [ 1379.038854][ T5822] device team_slave_1 left promiscuous mode 14:39:13 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c0884123, &(0x7f0000000000)='K') 14:39:13 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x200802) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bind$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x81, 0xfff, 0xff, 0x2, 0x6}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e24, 0xc85, @loopback, 0x715}}, 0x0, 0xfff, 0x808, 0x1, 0x23}, 0x98) r4 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$GIO_FONTX(r4, 0x4b6b, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x100, 0x4) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, 0x0}], 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, 0x0) r7 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000580)=""/201, 0x4979}) connect$inet6(r7, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r7, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) write$apparmor_exec(r6, &(0x7f0000000680)={'exec ', '!((lovboxnet0,\x00'}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x5) 14:39:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aea%\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) r1 = timerfd_create(0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000082000003, 0x8031, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x4}, [{0x2, 0x0, r2}, {0x2, 0x3, r3}], {0x4, 0x4}, [{0x8, 0x3, r4}], {0x10, 0x6}, {0x20, 0x4}}, 0x3c, 0x3) pkey_free(0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f0000000040)) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000100)={0x8, 0x3, 0x1}) 14:39:14 executing program 1: memfd_create(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000300)=""/232, 0xe8, 0x20, &(0x7f0000000040)={0xa, 0x4e21, 0x8, @ipv4={[], [], @loopback}, 0x1}, 0x1c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000280)={'batadv0\x00', {0x2, 0x4e25, @broadcast}}) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r3, &(0x7f0000000180), r0, &(0x7f0000000200), 0x6, 0x8) socket(0x0, 0xa, 0x715c) socket$bt_hidp(0x1f, 0x3, 0x6) 14:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101000, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x3de) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="0000000000080000000004000000"], 0x1}}, 0x5000000) [ 1379.837814][ T6049] device team0 entered promiscuous mode [ 1379.846022][ T6049] device team_slave_0 entered promiscuous mode [ 1379.852401][ C0] net_ratelimit: 15 callbacks suppressed [ 1379.852409][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1379.852472][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1379.879700][ T6049] device team_slave_1 entered promiscuous mode [ 1379.905954][ T6049] 8021q: adding VLAN 0 to HW filter on device team0 [ 1379.920736][ T6028] device team0 entered promiscuous mode [ 1379.931920][ T6028] device team_slave_0 entered promiscuous mode [ 1379.949474][ T6028] device team_slave_1 entered promiscuous mode [ 1379.976955][ T6028] 8021q: adding VLAN 0 to HW filter on device team0 [ 1379.991856][ T6354] device team0 left promiscuous mode [ 1379.998070][ T6354] device team_slave_0 left promiscuous mode [ 1380.004959][ T6354] device team_slave_1 left promiscuous mode 14:39:14 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x6000000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:14 executing program 1: socket$kcm(0x10, 0x7, 0x10) r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0x10, &(0x7f0000000140)={&(0x7f00000001c0)=""/75, 0x4b, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f00000005c0)=""/4096, 0x1000, r2}}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) fremovexattr(0xffffffffffffffff, 0x0) listen(r4, 0x6) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e23, @empty}, {0x1}, 0x14, {0x2, 0x4e21, @empty}, 'hwsim0\x00'}) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r7 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x40000) fcntl$getown(r7, 0x9) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0xf0ff7f}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f0000000040)={0x9bb}, 0x2) sendfile(r6, r3, &(0x7f0000000180), 0x10000014e) 14:39:14 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00000001c0)={{0x405}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r0}}, 0x18) 14:39:14 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:14 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4440c0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8929, &(0x7f0000000000)='-*lomd5sum\x00') 14:39:14 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000100)={r0, r0, 0x80000001, 0x8c, &(0x7f0000000040)="6470bf8f1fc0da5e120579eb72b421005cc0db95e43f51653444abc53f01999337844b68e9e1b6118289164bdff2255fb407303d64e899bcb2415ea543af8798d3721205ca200a4f422d4232857a7b3773c190689de77abd12e406f61b2d4721134f7dccc20308ffe3ba3cfea37131eb595fcbf7146e4070e28f8e658d05f063204de6c2523f1d9ab0dbb732", 0xfffffffffffffffa, 0x20, 0x8, 0xe6, 0x100, 0x2, 0x9, 'syz0\x00'}) [ 1380.201155][ T6585] device team0 left promiscuous mode [ 1380.213512][ T6585] device team_slave_0 left promiscuous mode [ 1380.221559][ T6585] device team_slave_1 left promiscuous mode [ 1380.252718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.258934][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1380.265540][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.271721][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:14 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:39:14 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_CAPBSET_DROP(0x18, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000180)=0x1c00) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000240)={0x0, 0x7, 0x6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) getsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000440), &(0x7f0000000480)=0x4) openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x208000, 0x0) r3 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x1, 0x400200) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000400)={0x4, 0x7, 0x6, 0x1, 0x5}) tkill(r0, 0x1004000000016) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xfff, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000300)={'nat\x00', 0x0, 0x0, 0x2, [], 0x0, 0x0, &(0x7f00000002c0)=""/2}, &(0x7f0000000380)=0x78) 14:39:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x8004510a, &(0x7f0000000080)) [ 1380.412194][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.418049][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1380.972252][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.973009][ C0] protocol 88fb is buggy, dev hsr_slave_0 14:39:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000061c0)='ppp0eth1posix_acl_access\x00', 0x2) write$P9_RLCREATE(r1, &(0x7f0000006200)={0x18, 0xf, 0x0, {{0xbf8ad77afb07bb1d, 0x2, 0x8}, 0x1000}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x805, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)={r1}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000540)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000880)=ANY=[@ANYBLOB="00032dbd7000ffdbdf25020000000800dbc3d103cf7d4db30600050006000000ff7f00000700000004000000140001000000200000000000000000000000000014000100000000000000000000000000000000010800030043f1ffffcbd425428081e6fd5572192845bdf93b548d44c48d65f67fefcaabb8de14117af527104c79da25889c7e01c303a910ebea8f8421c01860537f33ffffa3d8ec7dd2f1d0065ae9bb030611582d7108cd4fb726aaf0b1e0f78f3aec500eca516ab50105ad21987f46d84a7c0ee0ba1f31d7f3b940df04a67845e1ba2183bc0000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) flistxattr(r3, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x0) unshare(0x40000000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100ffe, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f00000002c0)={0x0, 0x1ec4, 0xffe, &(0x7f0000000040)}) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x10001, 0x5, 0xffffffffffffff19}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000004c0)={r5, 0x7151}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = geteuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r6, r7) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) getrandom(&(0x7f00000001c0)=""/129, 0x81, 0x2) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x8402) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01800008"], 0x0, 0x0, 0x0}) [ 1381.184001][ T6575] device team0 entered promiscuous mode [ 1381.196150][ T6575] device team_slave_0 entered promiscuous mode [ 1381.223158][ T6575] device team_slave_1 entered promiscuous mode [ 1381.268268][ T6575] 8021q: adding VLAN 0 to HW filter on device team0 [ 1381.305870][ T6683] device team0 entered promiscuous mode [ 1381.311615][ T6683] device team_slave_0 entered promiscuous mode [ 1381.328354][ T7094] IPVS: ftp: loaded support on port[0] = 21 [ 1381.346571][ T6683] device team_slave_1 entered promiscuous mode [ 1381.395254][ T6683] 8021q: adding VLAN 0 to HW filter on device team0 14:39:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x2}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r3, 0x10000, 0x9, 0x0, 0x81, 0x3}, &(0x7f00000002c0)=0x14) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000080)=""/246, &(0x7f0000000180)=0xf6) 14:39:16 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1381.492039][ T7088] device team0 left promiscuous mode [ 1381.497538][ T7088] device team_slave_0 left promiscuous mode [ 1381.518397][ T7088] device team_slave_1 left promiscuous mode [ 1381.556231][ T7089] device team0 entered promiscuous mode [ 1381.586406][ T7089] device team_slave_0 entered promiscuous mode [ 1381.617421][ T7089] device team_slave_1 entered promiscuous mode [ 1381.644671][ T7089] 8021q: adding VLAN 0 to HW filter on device team0 14:39:16 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x6800000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1381.751994][ T7266] device team0 left promiscuous mode [ 1381.803671][ T7266] device team_slave_0 left promiscuous mode [ 1381.847175][ T7266] device team_slave_1 left promiscuous mode 14:39:16 executing program 1: socket$kcm(0x10, 0x7, 0x10) r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0x10, &(0x7f0000000140)={&(0x7f00000001c0)=""/75, 0x4b, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f00000005c0)=""/4096, 0x1000, r2}}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) fremovexattr(0xffffffffffffffff, 0x0) listen(r4, 0x6) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e23, @empty}, {0x1}, 0x14, {0x2, 0x4e21, @empty}, 'hwsim0\x00'}) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r7 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x40000) fcntl$getown(r7, 0x9) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0xf0ff7f}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f0000000040)={0x9bb}, 0x2) sendfile(r6, r3, &(0x7f0000000180), 0x10000014e) 14:39:16 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x2, 0x2b8) listen(r0, 0x50) 14:39:16 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000100)={0x0, 0xfffffffffffff502, 0x800, &(0x7f00000000c0)=0xfffffffe000000}) r1 = socket(0x11, 0x802, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0xbe5b, 0xdb}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'tea\x00', 0xfffffffffffffffc}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:17 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x6000000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1382.540208][ T7303] device team0 entered promiscuous mode 14:39:17 executing program 1: socket$kcm(0x10, 0x7, 0x10) r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0x10, &(0x7f0000000140)={&(0x7f00000001c0)=""/75, 0x4b, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f00000005c0)=""/4096, 0x1000, r2}}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) fremovexattr(0xffffffffffffffff, 0x0) listen(r4, 0x6) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e23, @empty}, {0x1}, 0x14, {0x2, 0x4e21, @empty}, 'hwsim0\x00'}) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r7 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x40000) fcntl$getown(r7, 0x9) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0xf0ff7f}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f0000000040)={0x9bb}, 0x2) sendfile(r6, r3, &(0x7f0000000180), 0x10000014e) [ 1382.583643][ T7303] device team_slave_0 entered promiscuous mode [ 1382.623774][ T7303] device team_slave_1 entered promiscuous mode [ 1382.677701][ T7303] 8021q: adding VLAN 0 to HW filter on device team0 [ 1382.724138][ T7306] device team0 left promiscuous mode [ 1382.734157][ T7306] device team_slave_0 left promiscuous mode 14:39:17 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1382.771604][ T7306] device team_slave_1 left promiscuous mode [ 1382.790203][ T7308] device team0 entered promiscuous mode [ 1382.802039][ T7308] device team_slave_0 entered promiscuous mode [ 1382.810646][ T7308] device team_slave_1 entered promiscuous mode [ 1382.866085][ T7308] 8021q: adding VLAN 0 to HW filter on device team0 [ 1382.902445][ T7570] device team0 left promiscuous mode [ 1382.920905][ T7570] device team_slave_0 left promiscuous mode [ 1382.945856][ T7570] device team_slave_1 left promiscuous mode 14:39:17 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0x2000}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1383.012770][ T7777] device team0 left promiscuous mode [ 1383.025109][ T7777] device team_slave_0 left promiscuous mode 14:39:17 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x6c00000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1383.068776][ T7777] device team_slave_1 left promiscuous mode [ 1383.768344][ T7778] device team0 entered promiscuous mode [ 1383.777449][ T7778] device team_slave_0 entered promiscuous mode [ 1383.797599][ T7778] device team_slave_1 entered promiscuous mode [ 1383.821266][ T7778] 8021q: adding VLAN 0 to HW filter on device team0 [ 1383.848594][ T7787] device team0 entered promiscuous mode [ 1383.855000][ T7787] device team_slave_0 entered promiscuous mode [ 1383.881030][ T7787] device team_slave_1 entered promiscuous mode [ 1383.899345][ T7787] 8021q: adding VLAN 0 to HW filter on device team0 [ 1383.935047][ T7787] device team0 left promiscuous mode [ 1383.949579][ T7787] device team_slave_0 left promiscuous mode [ 1383.955888][ T7787] device team_slave_1 left promiscuous mode [ 1385.132209][ C0] net_ratelimit: 23 callbacks suppressed [ 1385.132352][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.137918][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.137980][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1385.144167][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1386.092219][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1386.098044][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1386.492291][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1386.498112][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1386.503987][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1386.509747][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$void(0xffffffffffffffff, 0x5451) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000000c0)={[0x200, 0x2, 0xfff, 0x68, 0x400, 0xf291, 0x3, 0x4, 0x0, 0x0, 0x19a, 0x8, 0x0, 0x1ff, 0x67, 0x822], 0x2, 0x20000}) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000240)=0x7) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000040)={0x2, 0x3a}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:39:23 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x6000000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:23 executing program 1: socket$kcm(0x10, 0x7, 0x10) r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0x10, &(0x7f0000000140)={&(0x7f00000001c0)=""/75, 0x4b, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f00000005c0)=""/4096, 0x1000, r2}}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) fremovexattr(0xffffffffffffffff, 0x0) listen(r4, 0x6) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e23, @empty}, {0x1}, 0x14, {0x2, 0x4e21, @empty}, 'hwsim0\x00'}) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r7 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x40000) fcntl$getown(r7, 0x9) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0xf0ff7f}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f0000000040)={0x9bb}, 0x2) sendfile(r6, r3, &(0x7f0000000180), 0x10000014e) 14:39:23 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x210, r1, 0x700, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff0001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2cf2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x79}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x84}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe3b}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x1}, 0x4001) 14:39:23 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:23 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x7400000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1389.177702][ T7795] device team0 entered promiscuous mode [ 1389.199532][ T7795] device team_slave_0 entered promiscuous mode [ 1389.207582][ T7795] device team_slave_1 entered promiscuous mode 14:39:23 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000100)='bond_slave_0\x00') r1 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0xfffffffffffffffb) keyctl$clear(0x7, r1) [ 1389.231395][ T7795] 8021q: adding VLAN 0 to HW filter on device team0 [ 1389.249411][ T7807] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns [ 1389.268994][ T7804] device team0 left promiscuous mode [ 1389.292585][ T7804] device team_slave_0 left promiscuous mode [ 1389.311702][ T7804] device team_slave_1 left promiscuous mode 14:39:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1300000043001f001007f4f9002304000a04f5", 0x13) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x2f, 0x4, 0x9, 0x6}) 14:39:24 executing program 4: statfs(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa69c, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x505400) setsockopt$sock_int(r1, 0x1, 0x7, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="08002dbd7000fedbdf251600dfd81cd1da21cf4200001000020004006a000800020006000000"], 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000) r4 = msgget$private(0x0, 0x54) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000140)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000300)="ce93ef0b747221146ec0c451ea27dd7afaaa4b36516125836d0b2285d8adc926a745e926b6f60af36e02be2cd539c7325a50495b1e5687dde2348645214555b281404feb711bd6f73c91eb66aab3a3a283ab90df4b21ee6d722c64769b", 0x0}, 0x18) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x10) fcntl$setlease(r1, 0x400, 0x0) ioctl$int_in(r2, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000000)={0x3, 0x4}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x81000008912, &(0x7f0000000100)="0adc1f123c40") setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x30b) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r5, 0x0) io_cancel(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f00000003c0)="e21c543ccd03e8de95f6fa915e2ba863d03b493572fb54ecf53f562a2827f311a06fe38d632dca86ee6a0939b17a0916376afff01181fde98ce2dec2db2f4a68638cd251bc31b60975bddfb8502f151a7e5608b41faf57af8dbc1fde11ae", 0x5e, 0xffffffffffffff7f, 0x0, 0x2, r1}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1389.952998][ T7803] device team0 entered promiscuous mode [ 1389.958580][ T7803] device team_slave_0 entered promiscuous mode [ 1389.982297][ T7803] device team_slave_1 entered promiscuous mode [ 1389.989750][ T7803] 8021q: adding VLAN 0 to HW filter on device team0 [ 1390.003775][ T7808] device team0 entered promiscuous mode [ 1390.011962][ T7808] device team_slave_0 entered promiscuous mode [ 1390.026355][ T7808] device team_slave_1 entered promiscuous mode [ 1390.037072][ T7808] 8021q: adding VLAN 0 to HW filter on device team0 [ 1390.061012][ T8244] device team0 left promiscuous mode [ 1390.098416][ T8244] device team_slave_0 left promiscuous mode 14:39:24 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000280)=""/142) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='<\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x248}, 0x1, 0x0, 0x0, 0x20004050}, 0x50) connect$inet6(0xffffffffffffffff, 0x0, 0x94) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = socket(0x11, 0x802, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x200a80, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000000)={0x1, 0x1, 0x101}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1390.193915][ T8244] device team_slave_1 left promiscuous mode 14:39:24 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1390.262889][ C0] net_ratelimit: 17 callbacks suppressed [ 1390.262914][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.275145][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:39:24 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="557546379c2e8ea3475040a1032a9f686fa3bac56c23bf27523d6054e826a7bdc045c219244a5136561f779fd490834ecf24d0e002c6b1746c6959d3731bf1b3aaf57d2169e55561dc401f7b85b1c7c71688e4aafbc89cfebdccefd8946689ebd948fd7c3ea3e1790699b9a6c770e5af41dfab9714ca34a4a4f4e1b6395af339eaa8b4c1c2", 0x85, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="58c43edf81c24a3654cd20c8d35b3142130eb654d5efb9d4d36bcbb4b2118b5d37c0b512cdc6a02a62323332f7af9c0a67f7dcd901", 0x35, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000180)='cifs.idmap\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r2, ':chain\x00'}) 14:39:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000100), 0x4) 14:39:25 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x7a00000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:25 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x111}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0x5}, 0x8) [ 1390.522829][ T8267] device team0 left promiscuous mode 14:39:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x40, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, 0xfffffe2f) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800a0f2113a0000000000804dde84a96c5513ae42c130e81129a3763293b41c369ebfe787ca597dbd482d64459a5ebb0114ec90c352e5a798c950ae919928ab36c52c12d11d5b4ccafd91f23f9b4d7adea9d838403e4e455b343d999ab9044f43aa6544e34c8daec25a3fbe9a66625a8fab0ac3c54e94f67cc94239411756c5adb0ec98d2d462c0135148ee528c6efea35890098f3965bce816e44cc538d2b9a3f4292dfc499ee881252d9ce503847c27603f3c19ce976b25ebeed5952e9c2f36f651c2"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xfffffffffffff001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x7f, 0x200, 0xffffffffffffff82, 0x3ef9, r3}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e1, &(0x7f0000000100)={r0, r0}) [ 1390.592622][ T8267] device team_slave_0 left promiscuous mode 14:39:25 executing program 1: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x4, 0x79, 0x8, 0x0, 0xffffffffffffffa1, 0x5, 0x8000, 0x0, 0x3, 0x1, 0x100000001, 0xfffffffffffffffc, 0x2, 0x9, 0xffffffffffff8000]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x7}, &(0x7f0000000400)=0x8) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00') open(&(0x7f0000000100)='./file0\x00', 0x321000, 0x3) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 14:39:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000180)={0x53, 0xfffffffffffffffd, 0x6a, 0x9, @buffer={0x0, 0x1000, &(0x7f0000000440)=""/4096}, &(0x7f0000000080)="5d4b5fd74b0a23a8a205a09104d7e9ff737055406fbe0a6bc95904dfb2acb7065c6236eb515e91b7fa3d9a39aa772a54394dd9b50a93f783733641618480357f66af050a0b8d59662024479710c6a9ad5fab89171a2bbb34ae0c8dd988523220d3f0e65f23201430daf9", &(0x7f0000000100)=""/55, 0x0, 0x10000, 0x0, &(0x7f0000000140)}) r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x96c, 0x8402) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000200)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}) [ 1390.645843][ T8267] device team_slave_1 left promiscuous mode [ 1390.652213][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.658066][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1390.663957][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.669719][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000001240)={0x0, 0x0, 0x0, 0xdc5, 0x80000001}, &(0x7f0000001280)=0x18) socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x90a3d078) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x82, 0x0, 0x1}, 0x8000}}, 0x18) r3 = shmget$private(0x0, 0x3000, 0x780001ff, &(0x7f0000ffd000/0x3000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f000000e000/0x4000)=nil) shmget(0x3, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r3, &(0x7f0000ffa000/0x3000)=nil, 0x0) r4 = getgid() fstat(r2, &(0x7f0000000240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) fsetxattr$system_posix_acl(r1, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, r4}, 0xc) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=0x8, 0x12) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1390.812351][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.818457][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(r2, &(0x7f0000000440)={0x28, 0x0, 0x2710, @reserved}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) bind$xdp(r2, &(0x7f00000003c0)={0x2c, 0x2, r6, 0x10, r7}, 0x10) r8 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x2d7a, 0x30, 0xfffffffffffffffc, 0x7ff}, &(0x7f0000000380)=0x18) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r8, 0xc008551a, &(0x7f00000001c0)=ANY=[@ANYBLOB="07000000280000e0c93ef7363cadc5000100010002000000000200000001000080000000000000000000000000000000"]) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_FILL_RING(r7, 0x11b, 0x5, &(0x7f00000000c0)=0x4, 0x4) ioctl$DRM_IOCTL_GET_MAP(r8, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x8, 0x0, 0x43, &(0x7f0000ffd000/0x3000)=nil, 0x6}) setsockopt$XDP_UMEM_COMPLETION_RING(r7, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x0, r6}, 0x10) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002500)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ffff95000a3e566241aaaaaaa2aa0000"], 0x1}}, 0x0) 14:39:25 executing program 2: socket$inet6(0xa, 0x3, 0x87) socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x1000000007) setsockopt(0xffffffffffffffff, 0xffffffffffffffff, 0x10000000002, &(0x7f0000000000), 0xfffffffffffffdbb) msgget$private(0x0, 0x400) unshare(0x40000000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20800, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x3101}) ioctl$TUNSETPERSIST(r4, 0x8927, 0x713000) fstat(r2, &(0x7f0000000240)) fstat(r0, &(0x7f00000002c0)) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='map_files\x00') getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) init_module(&(0x7f0000000380)='map_files\x00', 0xa, &(0x7f00000003c0)=']em0-\x00') 14:39:25 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @dev, 0x8}], 0x1c) [ 1391.271335][ T8794] IPVS: ftp: loaded support on port[0] = 21 [ 1391.372302][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1391.372364][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1391.489763][ T8392] device team0 entered promiscuous mode [ 1391.507311][ T8392] device team_slave_0 entered promiscuous mode [ 1391.528580][ T8392] device team_slave_1 entered promiscuous mode [ 1391.551836][ T8392] 8021q: adding VLAN 0 to HW filter on device team0 [ 1391.576551][ T8388] device team0 entered promiscuous mode [ 1391.586526][ T8388] device team_slave_0 entered promiscuous mode [ 1391.607330][ T8388] device team_slave_1 entered promiscuous mode [ 1391.630839][ T8388] 8021q: adding VLAN 0 to HW filter on device team0 14:39:26 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:26 executing program 1: inotify_init1(0x100000080800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 14:39:26 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) get_mempolicy(0x0, &(0x7f00000001c0), 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1391.712423][ T9065] device team0 left promiscuous mode [ 1391.717751][ T9065] device team_slave_0 left promiscuous mode [ 1391.730653][ T9065] device team_slave_1 left promiscuous mode 14:39:26 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0xc3ffffff00000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:26 executing program 5: timer_create(0x6, &(0x7f00000010c0)={0x0, 0x2e, 0x5804584f670db2f4, @thr={&(0x7f0000000040)="9bc4b156b27cdb6e66282cf160807e15da30359d90315a9a04816cadd4e5ca4bb028b8fb9ca1c50fbfc434385cfed1721fa880ebb50f2bf7344139adf3f886fdb74e5e3aaf375c5030e8fa1ed1c3d85141d7a9d6263f3367cbaf2f8784905926f3d3bd7a27758c6428812d296701c349117160769d9b388fef2f43ae39e9179a72d22a27b80809a257ec924e7f63678c296f209660d66fe445a237ab5b5846af2d7c4757ab76acd7ea03d87f50d7812c5dbb70f38f6be82e7054f045f4d5143e91982d6185aa7d3aae1aa3e3ad942f9a25082b0dd6cc461466f166bcb2d14e7bdb6329a09318d17b14185f0615625626e7a78694fc06e0154d44834ce51aba652e1d0666bf64e69a290799b3be707110d3acb23ca3c69ddbf4276a423ebcac67d2534d8e50ed94a2926d4ae33cb2eb050b72c839dfc4a198b40f808482dfa67aa13c84610bf426cc7c89b77fe48f2615a0fe9e9fdbb361fcb8a08cb4e33ee798789314092b0e65db248cf4f2a0a8dbaa5c4af33419fb050fb2f7a6fd096ac775be7edbba4911b629439a24c1d0a3cf6dfc4e1349a33ebad1696d7476f87b2b038be63c106ff43df9cf1feb34289afc2829341501fd72e692862ce2831664a2b6d101af52a9c9c6db675bfda507b7321355f676761e5544842d49e1b6dfd3fc10491f0f7eff0b250b5346732906e9251c9ba33784d2d62be03169ee4ebfea36c1f19c5a9820593ea1ca601249ec0f7ded986114b602caccde77030812dcf83571aa92662f5c20b4b3d0b658817126cbdccc70d0406480c5d07191bb832b17c309cd40a46b05df758d22753823c22771865a391afe5287ff96dacc3b3c806fb9c2d95254511bb721c825e591ec356253c2c8ae31a43a85a86a5c913ac9d76bf38cd315468fd5de0bc5d4e73002fcdadce61e3e6990c97509ea6b7c4718b957a086bb5a89c381ff8feab9638c463ad1cc6dda34bd624fa25c08a8ffa66fc581c0effbe6ae3d778ad60e14b3554a84daaeb32832784dede159b50aab0a378f1e51a4e57f1d2e7f27f79b70c0976119466025806ab66f556ef06bae8af1cf824d995298e3fae2fb7fad16e309e83e264117937c628fe9030887aef6bba5061f014e0e86c5c2996080047af81ae6b6a60c935b7ad6a03cfca3351ba537730b53c0a1a640f611645835fcd9e9d197d1e6813dabb154d4a071e6f4c2d2a6c11d3e7d8ca0a3619fd9633822299d7480faadf27f8c6f8c8ef817b99216f08f27cfa9e2c92615163c8192ce283bd8a774767bc371fffe9b4f25547776c0d5546bb3e2a2557e23a2a07485f041867422fc2ca7e06c41855afa6576e3fb488a45187084226a4400ef3ee870b47e81959df14617a12c1d3aef1bc8397c998906bab15fb44b4f6c3203ecc25ea30b9c4f2e6cdada5e8b4df3f8c9c06d39f96109e43790dc454aeb0cbc7a25639268c08a99bf1a697e75c286aee5f855e1113443c68cfea3c8f8e8952bb439b3cae3ef0af460acbe5214a305fc3ce1eea40432c3dad1c689a31ddc7a89559f4821ae886118607af478dc3d4a777be33b84162d43d71f57bb1d432f480becf4f9af88bf22e4efae2dbb6b2401b717a1a33017992da6865cf2e363291fd5bbea19cb6c63cd491199f675be9697e656a002579f99cc932aa08d3ecc3f40a2065405c90599350d782eda5329afb73ea1f2fc85861c52af5f7d9b61a24693daab151d98ac202d1c324ed2d8e433f33194796e191fda12cf66c8b20b2eff32807ef1a644426e7037bdad3991326dab9c93b637678d7619964625317ae547a77dbb4bc0fc24b3c4952b7162a9b22520c91fc9c8c09b10bf3008859b296e71a935ec5c822cf026e8981011d9527c201a0e78a11b0c7fed9a142bf0cb0ff7fa22232bbc08e64074f25b3beb0ceac89d4631f9aa0e388c5c1352e7e2c78dcb7521445a7662e99bf9372b164699d3b1bf91d8f5f0fc815e7e7bc8eb0fb07ccaf2eac4507821a8aa10b4135c2c68863edeffc012b78e4ee6119b41546459981bff8da84bafd6fe31886b64651122cbea7e931443783afa8bd73ff72bb6ac66f3cc115618042b1eae2490d2a90d6f1aee11d221d2c2ceafae9cb055ecdc309cfefa492fb226489654f7818745e28c230b2c9a81a6d3681d0517c2dcea9f508e0f56104c1118a678ed029915c3ee069ebb6aa1a1e3322fbb45aef9dd05b094cceeb3145fb2907e474130aeb0772026c846a860c4fd26d91cb6f7e19af7c55d28bfaf2306d0d74427a9ce1c07ef054f575cebf3ece399f60247495929ec183157d6d55ac0575d3d76f817f6d36c51613d505223063db058741ddebfc32ab90f91bb47eb4512a8bae0706872dc75a961c41fcfef27a53f1d26da6eea85dae6cf8662b96755605bd93dd74729fbbb49dd35d66577088c8634ec2b74608bbb202e65fa32897f093c28c2baaebb2fa65971188bf58428f8bb3442b7dbca162f9cf0d3440ee78e0ceb8e3b137ce5c1eee251ef3396e0a0d0b47de730218aac28d32059634bcfa1d5ac9c6db73b253b0bc4f3793ec794b13e0d9e2d9440b2f9935e50a8e54f454db700cadbdb72ca2c2bd8887800e1e4a8d820aa9d2153001579292c54c87929dfb5a46b1b8b272e9f48315790956a4bb6bd083ed29ec265632d2180349e0468ae37a4961ab50cdf849b4fc1e47df79e798a1f1dd987b847ff58087acfaefa871062c0dd499b0677d0d5030c8bb1d65564e62db539ce0b7d9dcc40b858bf42f21be3ae265d9accca2671e6d09823a9ea60ff6f94669aeb9a11de82d7a8aaf7aad27fef6fcfe662a076d154f3df258b0b7f6f06bd87413576a73e56d53b0b75b9d5a11a63df526bef264298222fb144cffa469a3a754caebd3a26487a6deec03f2b4fa7b3af709b85efbd4a9e0bd7f660121a10a72845f63250f1b72be7464f1eacb66a2b4c5125125c0602793ebab770180f86b079788cc8b6085c7487734a1197cf20b6ff94a3da45f7054d378163facfb21ec270334e03193e98c067e6a6b75ccf63812cd437d8285233bf3c9f40a64be1665fdbc8aee9e4342f1caf979156510a08665e0a3668be1f7fd1c1770ebf85363bdd93417ca06f96322bcb3ad4dc263b2b555e08eb126ca31b971544b22ed6b4d9b06ea7f4f6b63ea23ea76d7e6941bd3de68c7d90be07623fbf28facefde882d8648dada526ca30e0e5af2610d01d272ae62eefb311ec50a01bf40bfa9d5e15be403e4e3df1c90d121e85e818992f5520d811bd76aa7884037d51d266c8cbb28493de23d0264010ecb0983e6076694f42d261d60026d9a963d0b6dcca771668ebace3281c3b42f9f6d5be4ca1467d039ec1c4f65d4db7995a4ba71e53eae14c4d08e7201f500218185eb0835104d07c4e8c79ab59890fdd3212fe2f7a58f6696e91166c86306b87a2dba48be48d5e4cab413b4e93da15bcbda81c907c3a2f71b4a588b10a4be1e84bd3993aa0ed742aa15768ba701be8a0eec3c136868b9a2e7afdf3216d4e3f8d2350361aac60657a4af4657a86789106ff87bb9e0cf8f461da176d45c48f1710dd0f6e2282df60a86021ff932475fcce3c6c97857c74b74bdd63b43a6c51dd2c09f9da37fd15810d3b1bdb0a186462b0ddaa422ed379999fe98672fc578789fb5cac28487c3848bb22537941c347f89504cbd62449dfe66f0dc914974da7642f7f9fdb2c96a01831cccbff4e18437eda1c2586031c9b8d183e130d72b39874ff14c73a675d7f3a88fffc7882a50f0e4db62335a7e3631ee02377d170ddaa7ac7081a584d4d270e6095bbe33b7fe2366e01e1955cfcfc9de5fd25b9c7174ae37131451b66a1140a5028b33a2c8c5042e7358355fc35709f93ec118bb6be895a816055a968ede25bfdb0a6d22af996a1724d5fef76c1f842ccda26bd14646badc122ae1e4df55d02fcc83921a4ad83af96e19f867ce108159b86f3627c34940c2ffa07a66b62a2b0e2a03c6b9f4cd9f4f9c41f3d8c66d4ca5bbdaac3cf00cfa205ef8518c0981537d785760303bb5feac9bb84a6f74664bb201faf001f688e78d87bb3f2e7f5660710563bb9c7a839f8044b74aad5c9f5b5d7720a193d40e25090f9a10e9f9d4bf0adf04fd0841d2c1d777d659aa0302832be1cde2049a9e61ffafe4f61961e4cb361b3854dd296b754de97bff723c56490fa0d78e3ff76c1db2d43c02d37a379003ba6c11b1715cee43ebdd8636f50836057590fd3597d8f685a45e606a60105ecee2065bce440ce678d935e8424c0e34cc98fc613585b651d434ef1ebd4041f45ed0e157451ef7a286b693e3f9b8825cfb6a251ea2bef8f6bfa6a7bd9276a5632b6f2eeaed2981d34faf2bc3e2cf6fcd12ae0935dd9ee8c661849fb39eaedcc4f154f23244a4891d5a28caa2324b88c7612eef3bbc892d26fc7d829a729d6a60d1b421f432595655cb44512396e5bacb1e4740a752619866602fd25aba8eb4b02f1f34d1532a1a2922e3a3bd0e11937ebd933634c280ba6287923a6ae17d979e454119620e490a17c23c5d474ab7604bcc02ac71c9b7afae6d37d72eb8dc4de955dc50dc7fc42f49cf753cac349d230913f4fb434ceb089cdf806f740c0ef8b0b6054d19279688bdd1f7e7b8ee90a20e51065f1d69a8eba9570a7ecacd24ccf44e1847201933b91d31f24e44ee7d1a2044213c7dd8b9bd3eb59b185a4e0af9275f769dc7e777c3276a17ebf780e980aea1ec87da56d5cf29e95509b242b0f52fa81d1b2be576f8fffb3783972fae22f98293b0c3789b5f653f750abf71982ba893f4b1097684c426951665fa68931ec41930fa59b77b9a19456bceb7e9b100b8f5121dfaac2ff0d802b213bb2127cb6a6c09bb61d150143a881b352fc68f6510e705037660887f670e3feca9df47c959a030412b58972087af7d7b7bb69117e1412fce48fc5d472ff32472748b58379b50767df4a07de93859599616a6195c2dd828f1f3851fbcd014b5ea19871e92149283e741a3b5f8886db6fe012ac36bd819995b3c46c51e2992c2f9e107136dcc9515a6871785417bf17df521bf260d1ddab032edff25a8011a83214f4f56410eacf073d36fb07e48dbc8884667a1484f90a848562e53bc38031f4d5c0e40f5b1b8947e40b19bc8dd34ea5630d761a281da63eb05e2603de62bc368f47803e51712c90363c87f8b83cd3cd408610df63a33482bd783494ee9b8612fa187598e2366fe57eb9994f6625c9265a259fdecbcbf6e3c00066a7d7e5352cd777b4f56d63fd640b00f9daf7bd480da6f4749a89b1dc2347384aeecebdbf0a11261716c263891c710aa84c3b74fd58f3cf3400856ba8557d11ecaa71c1c0d069438398819c11e5db4844f8234724f10cb872eacd765bbe5f58abdddbab4bb0e38b89b0f27dab60b14e3e6738b5169f1a2cd44fcc398f5f2164b46df10f12e2a39ced23f2112d6037fd8f7c277818a073d5e4816f703ea099b69e87e4040b38166e709af9955efc5a20f0a0d034271ea0a70cb4533d9ffb497746ab90adf832f44adf191f6a306e1b3cf9faef371342da70f612b449db090eadb8b96e5abb93464f1f1bc9826bb2282bd5263384eb22372628c792630722a3d628294e199e03985507cf76f407031a4ab65dface36e024f0f96f7fadaf0dfc744c3b434924a7b32f2561dc1dc082bebff2ec82257aab89ac3623a6148469c7340ab5cc6696380a054ceaa646065e7392123052f37412ccd23ad5a7f1ec494ce3cf3a680646ef8f00340785d17a6e73e8cbb357d383036c4d9c08", &(0x7f0000001040)="90ef7723b1666bfd3de7cfaf4d04d4a16ea9284247f286a8744c0432b00074a04d9989f85d7d73d6b939e4be05ca97afb3bbd516260dc073eb4ac3a52d1b922a12c0c772d239fd63c62e11dde87da497076dc2cc5e6aa88c4b4ee6aab0f6cb6d5f4d0e96790b986a2836d0d407fd8350183f0ab49c462ae240"}}, &(0x7f0000001100)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000001180)={'team0\b\x00\x00\x00\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1391.819831][ T9173] device team0 left promiscuous mode [ 1391.831962][ T9173] device team_slave_0 left promiscuous mode [ 1391.849161][ T9173] device team_slave_1 left promiscuous mode 14:39:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @initdev, 0x0, 0x23f}, 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x2b) fcntl$setstatus(r2, 0x4, 0x42803) 14:39:26 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) 14:39:26 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000580)={'bond_slave_0\x00', @ifru_settings={0xff, 0x2137b1b3, @fr_pvc=&(0x7f00000005c0)={0x3}}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) process_vm_readv(r1, &(0x7f0000000340)=[{&(0x7f0000000100)=""/196, 0xc4}, {&(0x7f0000000200)=""/25, 0x19}, {&(0x7f0000000240)=""/250, 0xfa}], 0x3, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/112, 0x70}, {&(0x7f0000000400)=""/140, 0x8c}], 0x2, 0x0) getsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockname$packet(r0, &(0x7f0000000bc0)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'veth1_to_team\x00', r2}) [ 1392.019941][ T9351] binder: 9350:9351 transaction failed 29189/-22, size 0-0 line 2994 [ 1392.047378][ T3756] binder: undelivered TRANSACTION_ERROR: 29189 14:39:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) memfd_create(&(0x7f0000000040)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) [ 1392.622332][ T9292] device team0 entered promiscuous mode [ 1392.627914][ T9292] device team_slave_0 entered promiscuous mode [ 1392.642476][ T9292] device team_slave_1 entered promiscuous mode [ 1392.657253][ T9292] 8021q: adding VLAN 0 to HW filter on device team0 14:39:27 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff45) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1392.672649][ T9349] device team0 entered promiscuous mode [ 1392.678224][ T9349] device team_slave_0 entered promiscuous mode [ 1392.712308][ T9349] device team_slave_1 entered promiscuous mode [ 1392.719850][ T9349] 8021q: adding VLAN 0 to HW filter on device team0 [ 1392.816643][ T9339] device team0 left promiscuous mode [ 1392.898595][ T9339] device team_slave_0 left promiscuous mode [ 1392.932549][ T9339] device team_slave_1 left promiscuous mode [ 1392.954604][ T9588] device team0 entered promiscuous mode [ 1392.970677][ T9588] device team_slave_0 entered promiscuous mode [ 1392.979173][ T9588] device team_slave_1 entered promiscuous mode [ 1392.991900][ T9588] 8021q: adding VLAN 0 to HW filter on device team0 14:39:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, 0x0, 0x8) r3 = dup2(r2, r1) write$P9_RCLUNK(r3, &(0x7f0000000000)={0x7}, 0x7) 14:39:29 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) close(r0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r1, 0x0, 0x0, 0x0, 0x2) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 14:39:29 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) r1 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) connect$l2tp(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @multicast1}, 0x0, 0x2, 0x3, 0x2}}, 0x26) r2 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xffffffffffffffdb) recvmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x160) 14:39:29 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0xffffffff00000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:29 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) [ 1394.787213][ T9714] device team0 left promiscuous mode [ 1394.796428][ T9714] device team_slave_0 left promiscuous mode [ 1394.820039][ T9714] device team_slave_1 left promiscuous mode [ 1394.885527][ T9719] device team0 left promiscuous mode 14:39:29 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x11, r0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) 14:39:29 executing program 2: seccomp(0x40000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000006, 0x0, 0x0, 0xff7ffffffffffffd}]}) rt_sigsuspend(0x0, 0x0) [ 1394.905117][ T9719] device team_slave_0 left promiscuous mode [ 1394.935545][ T9719] device team_slave_1 left promiscuous mode 14:39:29 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) exit(0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r0) 14:39:29 executing program 1: [ 1395.097868][ T26] audit: type=1326 audit(1553438369.678:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10090 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 14:39:29 executing program 1: 14:39:29 executing program 1: [ 1395.405840][ T9824] device team0 entered promiscuous mode [ 1395.415016][ T9824] device team_slave_0 entered promiscuous mode [ 1395.430479][ T9824] device team_slave_1 entered promiscuous mode [ 1395.446441][ T9824] 8021q: adding VLAN 0 to HW filter on device team0 14:39:30 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:30 executing program 1: [ 1395.458220][ T9825] device team0 entered promiscuous mode [ 1395.467202][ T9825] device team_slave_0 entered promiscuous mode [ 1395.477048][ T9825] device team_slave_1 entered promiscuous mode [ 1395.490290][ T9825] 8021q: adding VLAN 0 to HW filter on device team0 14:39:30 executing program 1: [ 1395.532192][ C0] net_ratelimit: 22 callbacks suppressed [ 1395.532202][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1395.532234][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1395.537963][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1395.561253][T10178] device team0 left promiscuous mode [ 1395.567602][T10178] device team_slave_0 left promiscuous mode [ 1395.575405][T10178] device team_slave_1 left promiscuous mode 14:39:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'hsr0\x00', {0x2, 0x4e23, @remote}}) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1395.802671][ T26] audit: type=1326 audit(1553438370.388:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10090 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 1395.947662][ T9714] device team0 left promiscuous mode [ 1395.956175][ T9714] device team_slave_0 left promiscuous mode [ 1395.966139][ T9714] device team_slave_1 left promiscuous mode [ 1395.977568][ T9825] device team0 entered promiscuous mode [ 1395.990787][ T9825] device team_slave_0 entered promiscuous mode [ 1396.000502][ T9825] device team_slave_1 entered promiscuous mode [ 1396.018197][ T9825] 8021q: adding VLAN 0 to HW filter on device team0 [ 1396.027154][T10182] device team0 entered promiscuous mode [ 1396.033934][T10182] device team_slave_0 entered promiscuous mode [ 1396.040465][T10182] device team_slave_1 entered promiscuous mode 14:39:30 executing program 1: 14:39:30 executing program 2: 14:39:30 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:30 executing program 4: [ 1396.048980][T10182] 8021q: adding VLAN 0 to HW filter on device team0 14:39:30 executing program 2: 14:39:30 executing program 1: 14:39:30 executing program 4: 14:39:30 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:30 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1396.197355][T10197] device team0 left promiscuous mode 14:39:30 executing program 2: 14:39:30 executing program 4: [ 1396.236892][T10197] device team_slave_0 left promiscuous mode [ 1396.263526][T10197] device team_slave_1 left promiscuous mode 14:39:30 executing program 1: 14:39:30 executing program 2: 14:39:30 executing program 2: [ 1396.372621][T10205] device team0 entered promiscuous mode [ 1396.408147][T10205] device team_slave_0 entered promiscuous mode [ 1396.429513][T10205] device team_slave_1 entered promiscuous mode [ 1396.452436][T10205] 8021q: adding VLAN 0 to HW filter on device team0 [ 1396.467556][T10207] device team0 left promiscuous mode [ 1396.475163][T10207] device team_slave_0 left promiscuous mode [ 1396.490949][T10207] device team_slave_1 left promiscuous mode [ 1396.497583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.497931][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.658220][T10213] device team0 entered promiscuous mode [ 1396.669831][T10213] device team_slave_0 entered promiscuous mode [ 1396.676894][T10213] device team_slave_1 entered promiscuous mode [ 1396.690125][T10215] device team0 entered promiscuous mode [ 1396.696640][T10215] device team_slave_0 entered promiscuous mode [ 1396.707850][T10215] device team_slave_1 entered promiscuous mode [ 1396.718471][T10215] 8021q: adding VLAN 0 to HW filter on device team0 [ 1396.730178][T10197] device team0 left promiscuous mode [ 1396.735597][T10197] device team_slave_0 left promiscuous mode [ 1396.741648][T10197] device team_slave_1 left promiscuous mode [ 1396.750056][T10205] device team0 entered promiscuous mode [ 1396.755701][T10205] device team_slave_0 entered promiscuous mode [ 1396.763052][T10205] device team_slave_1 entered promiscuous mode [ 1396.775356][T10205] 8021q: adding VLAN 0 to HW filter on device team0 14:39:31 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:31 executing program 4: 14:39:31 executing program 1: 14:39:31 executing program 2: 14:39:31 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:31 executing program 4: [ 1396.881967][T10229] device team0 left promiscuous mode [ 1396.892246][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.898084][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.902039][T10229] device team_slave_0 left promiscuous mode [ 1396.903985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.915663][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.917249][T10229] device team_slave_1 left promiscuous mode 14:39:31 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:39:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0) 14:39:31 executing program 2: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) [ 1396.989516][T10231] device team0 left promiscuous mode [ 1397.020600][T10231] device team_slave_0 left promiscuous mode [ 1397.033615][T10231] device team_slave_1 left promiscuous mode 14:39:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200080000000013, &(0x7f0000000200)=0x400100000001, 0x298) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r2, 0x6, 0xb, 0x0, &(0x7f0000000300)) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) [ 1397.043801][ T26] audit: type=1326 audit(1553438371.628:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10242 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 1397.066597][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:39:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) timer_create(0x0, 0x0, &(0x7f0000000340)) timer_delete(0x0) 14:39:31 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(0x0, 0x40) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)=0x3f00) [ 1397.555335][T10234] device team0 entered promiscuous mode [ 1397.566391][T10234] device team_slave_0 entered promiscuous mode [ 1397.577069][T10234] device team_slave_1 entered promiscuous mode [ 1397.589756][T10234] 8021q: adding VLAN 0 to HW filter on device team0 [ 1397.600492][T10235] device team0 entered promiscuous mode [ 1397.611584][T10235] device team_slave_0 entered promiscuous mode [ 1397.620911][T10235] device team_slave_1 entered promiscuous mode [ 1397.631990][T10235] 8021q: adding VLAN 0 to HW filter on device team0 [ 1397.639749][T10244] device team0 left promiscuous mode [ 1397.645265][T10244] device team_slave_0 left promiscuous mode [ 1397.651625][T10244] device team_slave_1 left promiscuous mode [ 1397.673192][T10229] device team0 left promiscuous mode [ 1397.700002][T10229] device team_slave_0 left promiscuous mode [ 1397.706578][T10229] device team_slave_1 left promiscuous mode [ 1397.715523][T10235] device team0 entered promiscuous mode [ 1397.721200][T10235] device team_slave_0 entered promiscuous mode [ 1397.734849][T10235] device team_slave_1 entered promiscuous mode 14:39:32 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x2f3) exit_group(0x5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c40)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)="cc4c188df72da4fb2322c5bdd58bcc0aa102c8c7920845390a2465f53f6b4f9ad5037701090dc11476cd868718ca7db9c014fd17a010c35b49f76583704731d5601fb36ac4b6f9c7514e39f1f32fb91a2375cae51f77b769764e2e7a4378744a4ad84e0c54ced0697dabc90bfc708b96cc2ca07f42aab0af8bd6520bcee8d056eb090284081613d24486", 0x8a}, {&(0x7f0000000240)="24116bafafe7bc4a4e58013b9ab0c7f421afc0b8e06bbf5ebe0280c48be2c86b71d2ace428d5e90660eb7c31104aecaa211d9c055065e848b04366db5b35002674177538be", 0x45}, {&(0x7f00000002c0)="d23ef3adf12669d363c7f9c79a6e3bcbe98e056cb792d00c937a7266bf66ad29ab994ada13fbe353e4f0d56d91bfb46c6246b1b029154c409b350eefff81a327379f06e385914bbae3e2dcf7bb1193f4865abd375503086f8afc6086ab277f6ad7d8a1eda33e139145abbb844e650e77cce1863e415afb65baff1179fc7f8abd0c7044edddb6cdb3239c0f8481c129bd6b82da111953cf0c484f5e49bd49a44dc38d", 0xa2}, {&(0x7f0000000380)="04cdebae1c429c288fd76a940941668614ec44795ffaab2557db3913aa0a56b8bd7dffc9a547ea155fedc756dcb2675bbef75f05e7586e188bf4d678eabdb472986fa2f4c405cd", 0x47}, {&(0x7f0000000440)="48298100ac0b0a6629e2cd09fb1fac5251a2baf1e766f3abddc0ed6c4ac987ea786bb8b415f39b7f33b891820e4d8f9e5321c8512922470fdce6674d21e945caaae44370e959b2bdb639774f8ac71df706b61db7ccde9d820e1cbfe489b49cea4c40363fc5604d0b76fa1bc29e9905f62a5b8a8f0557ec348c001f182b347e15f2446a26e0c349016a3c9b8eb6e60abc254ed04d02fc686cb22045cc5d918977b762089367b29b8c58802e3e114d48543202a58cfe770f923a5ce2", 0xbb}], 0x5, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0xf8, 0x117, 0x2, 0xdd, "5699402fe72eef5338cc0a8433754fc0195e8f1c9133dafb598faab0adb9e3c8bcb4fb7f647ebf520095d6026fd34f3231bc25dfc3a7e267687d7e94df2d8a91326e375c66f8d90dd6ff16d94ff939b812fda3b5686575fe78230438d0ef2b9c1c3186d238d16cf34fc6bb90a0e2794a62790ced5d55a18cdc0cebb381af934c76f7d24b2a9560748134455ddfd4d57d9fefb066a84a1df81201dec3f72591f7a37ba33fbd8b34e331ecca216f3df4e35d0dd4d0e0b960f6469827f8c8067285d891e1a8c08c8f453adba79de55a120920759a771f6c0080761849a908"}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x140, 0x40}, {0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)="fd556f3b5c25fa23e13cda8cbfdce2027f7e1d37bc69d0894029298ab1c5a7e56f60634423ec2cbba8b7fcc9b42e9493c8703f3387c8bc99e84d280277c8d90f5d5dd44ac868497ddeb8eae659d06b5464e24abe3199f07a6072a35181b8ae6d4b6942fc6f27bac145a2f0703a3f93ebeb5a52aef3e4de69d9dcc8136fcbb635a10402753616b27b1e4d281584d44f0dbd1a95883be762ed6ee366471356ff747b8da745b561038fb21b75ac960d808b9b6e40acded19c4c420109623b055f05acbc84e492dcc02a661caa75404ad6cc6cfdda01bf0230ecab28f1a80a8a198ea704df2f54936e1e5c8c8c03fd789eed995ed65da99cd13e", 0xf8}, {&(0x7f0000000080)="3c23cc5f139b57c5c7ccb8e967c981f1e5952f4c6704734f8bfefbbeff190b97641cc533ce360b7f3c50e89d4f", 0x2d}, {&(0x7f00000007c0)="94b19188f0e7d99dffd2dad23678ce05cc16b62afd007a9084ffe55946119faf3095de7a759bb6de0288dab592d110bb8f7357477ae69f3e2de4935aafcd12827a5529137d8be4d1aadac6c1faf02dd0e0c3730c9d6f1fd0a16f0d436e856a10a30fc95a60e54fbde63ef2caad", 0x6d}, {&(0x7f0000000840)="e867856a25102dede4ba6ca387cd318a49af7cd47d095bba31d7e7cf3bec19134eb96d0c9765ea687a65f1cf3f01ab667e60b329643e7cabb081ae0d46fc9fee17698f10925c0cdf544b217c3cda097d9335e796044128b4737bca8b416a8722ed787fade44b7832acda498c81a515eb4b3535cd3dd7927d57be6f348da6860d26c8c71b178973b0446e5b0893d0f9c5f85b635e5bc6ff11f1c1287a7ff75ebffcd9eb6d2f8ecd34af08f34f6dad983a064d8dce74a70861bfbacbc48ef7c0f6181cafd778ca0bf13a2883fd", 0xcc}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000000017010000030000000100000000000000f0000000000000001701000002000000d8000000f79c333ffd0f82deee28f597068169b1edf6840e5806d40eaf5258692ba72cbbae6c876be8d8b8beba99854f8870a966e56925b9d3d9cf085aec1f7daae704f970820c015ee91fe64b582a5991a815dedc8a4d8e4c58f8f2b7985c5e445aa81ccabed64917e8ca6841f2e2c634292c9425b473ecb89dceacf2941a3bad0fea20415091e9345c1291e96e69d47f5a3e5cdf33b8faf90a48538b25117d7695cf83ae772750943b7afa5b770f337f999aaa51fc4d709f938714637470479e48b4bbc2a2cf8374f2065fa52e65852f47d60b8362bd7578d9068e000000001800000000000000170100000400000001000000000000001800000000000000170100000400000000800300000000008000000000000000170100000200000069000000cb6dcf2e78a3338e10e9a58c476816dbec1a96f035e78317a26610ba40a02390d2783f26e33403bac9468b4dc5c8edf65c7bedfbd0693dfa37b7b90d3b3956064e9e34523dc372b8cc6bde0266e65d746e9cbc2260051a42ba2175dc7d014ec06e4688d0b2d859b516000000f0000000000000001701000002000000d80000003514dc7503b8f632f01a8b9942aebd4dc19aeac818c2590769a2b2e0132c6ecd9fa478ce1a252731d591e124af610d1bf856deadfb9ad64f87df34dd1cab8a000dbdb1656e4b1b4651a3bb4657702eed2507907032bb058a024cb5967ae92cd8db79f879f7a60cf8be41c69639986965dc8131f094f4b8bf92c3db23bd3955d7b71a79332f1318aa301071b15e2d70db3c235c257fc1100527d85ad7d1fa260993a0ea78fb49c58d9dac31da151d106e5363809f4f9d5e054c3e7a5310685f6c1d9ffbea90e46a014f5db4fb198d43653932f87cc3912af500000000180000000000000017010000030000000000000000000000180000000000000017010000040000000100000000000000"], 0x2d8, 0x20000004}], 0x2, 0x1) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000000140)) 14:39:32 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:32 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x44200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, r1, 0x10, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0xa0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname(r3, 0x0, &(0x7f00000004c0)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 14:39:32 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0x4}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) shutdown(r0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="16858d844ea250657ec37cade0ae6822", 0x10) [ 1397.753588][T10235] 8021q: adding VLAN 0 to HW filter on device team0 [ 1397.814596][ T26] audit: type=1326 audit(1553438372.398:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10242 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 14:39:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 1397.856303][T10575] device team0 left promiscuous mode [ 1397.897641][T10575] device team_slave_0 left promiscuous mode 14:39:32 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$inet_smc(0x2b, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fadvise64(r1, 0x0, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xfffffffffffffe56) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x856, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0xfff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r3, 0x1) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f00000003c0), 0x9) io_setup(0x9c, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) [ 1397.950736][T10575] device team_slave_1 left promiscuous mode 14:39:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x581, 0x2fa) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) [ 1398.366449][T10679] device team0 entered promiscuous mode [ 1398.380918][T10679] device team_slave_0 entered promiscuous mode [ 1398.391279][T10679] device team_slave_1 entered promiscuous mode [ 1398.408332][T10679] 8021q: adding VLAN 0 to HW filter on device team0 14:39:33 executing program 5: r0 = socket(0x11, 0x802, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x3) getsockopt$sock_buf(r1, 0x1, 0x20, &(0x7f0000000040)=""/190, &(0x7f0000000140)=0xfffffffffffffdd3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1398.431025][T10652] device team0 left promiscuous mode [ 1398.436828][T10652] device team_slave_0 left promiscuous mode [ 1398.444345][T10652] device team_slave_1 left promiscuous mode 14:39:33 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 14:39:33 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1398.485443][T10785] device team0 entered promiscuous mode [ 1398.500294][T10785] device team_slave_0 entered promiscuous mode [ 1398.510348][T10785] device team_slave_1 entered promiscuous mode [ 1398.519338][T10785] 8021q: adding VLAN 0 to HW filter on device team0 14:39:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0acc1f123c123f3188b070") r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) write$UHID_INPUT(r1, &(0x7f0000000200)={0x8, "487e0a4dc08f510a05b8d443d9078b869410159f23de7a8316a1c2d634d23d6431ddda962ad7062b8d3dc4b181ef2fe0198b6aa5192ecc8e26c7655f70ca2ad75604bb5bdcaefb196f3ca7acbda607d64b241c0685a30137fe763bdb51376260c5bab74cfc0be8f3cff6d0042d2341b3f6255ccf617e38cf3d2445e7d06aacf5f3e8f3af3dfb00e413afd526b06327374d76e692066aa5dbdd0d8d57400fe1f3a5f9a835978721913c2027c05c5593c7ddd3480f036a0ee235e6d50cc08cf763e79495af6150e2d468c31055af33927bd03a4287818bd6fc194de216dac4d40f20460ca9deeab5164a464b13322eb691ddb6ade217c3e3770309d5573d6f9400eb575229fcb474a7a7222def623d1fa2fd435d85fd2ebfea48bfeb2e2ba286f0e22f3cbae05ae81a1b75402a6ec0f9ad5a73919813a1cb158d5a6fb9bc22a6b66e7f463b01e984371a244600350c8288140b5f59ba8c34d8b145ed2930f63b3a362a707fb811a548c6019fd396a38357c7584a137176e7e20d34dfa751ccf261822cd1a3d17ebd0c1254f321d3944f55bcf92a5538675568ec03be396d56c6729159eef172b74c354211384dc144c372077bc21f686d2079a25ac680a8918e70f749ef2ce917a61d3b8bf2edd30fe71606e940f7879a2ecc7c7da255219ab60bd0700211dfe38b3ab1384db3a9880e9879bb43dac620e42bd8c5c054194b492f9a2d1eb18e9f681d424d0513baaada5f5361778cb50b6f86ca65ff8c1f1dfb089c95735cedfba4b43d550a769d7edab6183f48ee9e3c013a3c01ab2543181c892da0a551f70e7d74aca87d10b751e9121bc2e6cc13795ab01447222a04bf6bca061e591fe90c973a918588c630bc7dcf4a4cca935e3295bcea88d7d3a6d408b534a2ef75eb77a2751fd1e6609781ad0bececd2ead19e0de4d478b464ecfe6ba65a775507033480c4a594af7be0742c1296ad60749574ef4bab7ded8a8524a5892cbfc7be2a5061ef6f725ff4a4ea448595541850aa22e6e3428173c3577f04dafefa997df3887e417c52a452b848d10382b703087b85bf69483f8f8ec38a7cb49122f1da62e8b1214c00851ca9ad132702e33d221b9c819e031859c6a0b20dc1f4e811d9dd98dfd84adabbafc0b199cb42de1df5e7c3f7be011f6ce53a718dfafd25e926d953524b818815dd54f9a9f93fdb83bd14da85817e8100ba804b51d4696dece380872102d2423684682361680e63a4574da9f6e0f97db4b468b7ad5fff8606aaed474cb1312ab346949f816229c53a0217b68c2fcf8e8ba2833d381b8b3228d4d456d527081b78e9716e867fb1b9d11094370d310a92bde0721bae623c062d18863bbcb54c4b50832e097b6ce277d2383512326f244f1ab1c1964bc6b267f7eacf682ef93835a24657a6d5c1d4294fd1e448f16a443b8b11a87fba635d70a876c0c8ba017a808d51d287fc832f544259488262537c12802eae381e0a70f10f2739c1babd2af6052cd587c914ab34df99730b645c55ec30dc4976bd693c44f0fcd872fea8f64fd3166d490a07b64000b047bd7f2a1042dd2f299d2944275e8c115c7df8c7ce8395bb655aaba436e0f9a2eeef0eec68d1cf55a2642bfefe81c09252f25d333604f35133436ec69f4875a4e6ee8289b2dc4ff65eb028af03cf163111942b38d84d9f42f46c5053de71ff3b4d2e06ea6e2a457ca9dc388d9e0bd9bb1c2c729eb79358ed9df0ebf9af079a8b4a1bf7a63d231ef65836beaf0ed1ecbeafd78751410ab0b1336ea138b38551c988dc4c0371ed998f44c34c2f392a315306650d96fef4b76c86d5915111bde53eeaaf13667f680b127577102942f6136caaa972d2c6dc072418f2beb45e8942ba4920a5fc3e9db95dacda62c80f44b1d221f14ce1aef93fe9251b793f20404d6c8198db46e885dd97a0e9fd9c2aa71a6299f8dfcb2a965e86dd3cc52b276481a7adde1bfbdf2849356d731ca08c47b9d63acec758c723818f063b306edd1b76a75549b05f53a2e92ec2c13d6beb896f4ef8393a0412c8baa3ef07a9688b868c2b0c9616a9bad808208e4541b9c1cb557fc26f31d92da4afae9f0b4546f143622664120c6b1b6c47c1a54a50ea80b5b188d297cd28d0f06ab396da99e77549d403743c0756e0cdad34ef6c8a2d6bdc59261f5e03541eead70bfdcb42fee90b3ac58b13971728bcd529873538ce583ed66b79a6655fb1d0eb391cf1e4f3a0152e497fdd199621e18dc9ba64b9711b567411227819de32e1e41103819b37f15f16961a125c911c3a0be768df7fd6b0c9b60d343b9956c675d7b01e9d6d2cf06c0063e5fb4c5bdeabc40cbffb47351d368cba69689b45f2e5541ebd3787c7d46ce02de29f2b1d45f700ca05c3a56db3cd174f1a54f2a6ae27b95778ccc9f3acec3ab60c77644b46eff7e341194cd0c61898e9a8045ee52c50946d7a3aea779abb6d436fd05b99abfcfa5212cb0943c8b1d5b419c246426f0fbd7b041310ef33f55a987754207f0520e6c863be8a9cb78c7be598a075e0a38010a1a03fbf699f6a17a7542649727f646680e73659e109c2c656f1fdb14faa81aa721a732ee7d5f2ca2087704da283d0c74470daa1f3c48cd3de21062f5aa0d292c1375c9c6df66d1ffced6f7b8bcbcc7028d450b1d56123b31cfb28a95b86d4a791bdfa3190949507a1bd48a119bed2884c282fc6b02204d9ab0d57cd1337e5d0ddff7dafa6be5ff1d6da0f64dae3ab4200f820ff970b853e021e2e80d91784e125e67f03c6ad003999e7f59adb2c8cbe59417569f39ac64ed3aeeb438fe1a476d5200644733547c046c7c4003d0d768602e096da76be5492a812372922bd2c8c008e4239e75f3e592bfec9219ae5593e803c427ffc79a24452d1b1583248bfc3d6d00d26152343b7877bae492fb9aba09fe6e2f98134f4e9da1686ff76172e13068b2d7d4b246be92b69fd69cdbbf2424fbd6a5eaf9c877a9cb854991e93ee835d1e09c2163c998f481a295d0f274e06812dc28a074950933e5bf1c49a75a2d76ef4174f9ae09ce83e2f933fd1175bfd2ec6f5c989cf6a00814722a852e9aa0ba43e0c2266c5514d588826eeeff4c5ae8b41b9eecbfc3271144ef4ed97bcc7bc46819457f1f6221b59157bbf9d14226c4a056556b48f640e6ed4804c6150043ddcf7aea2595f9b2a34cffb46213aa6b135d0673c62aac10229ae630af22362954339685eafe29f8174473d546e1abdf792c433afecb4778d737ff170d0c19eb0b64d05362be8b35850ca36fc9e2240a205ef1ddded2ebb2d608bda9475804d191bd9d059933ca23858ab7220aa73118025d1957045fdfa2002edb03fd9dd796d4762ce5a91a4f71ff1f1d8d49e3f7ab7e71ba9a679a2b77e27e89009019037efa6c1ed2b297161f7e864a56343fedc23bea44ef8585da7f3d93ce1e2e952c2ce18a2f5dc9e7b998b87f295c52b23b0ef7b7fdfffe7f399306f5eb7818fc18686e6e8dd26e5381b2f5e83ca7fb8632cf09197336ab914aa3e1781bed64571bbb3294436f5ea499705cbb6769a0a33d951650cbd5ec55e3846378c9d0e7e070b83b1b3800dfbc29c98dd38133eee9e65628e6438ff6a3421a1a0a2c8176bf3fbe3dd11c8f95dedee10746919cc9d5c7ff8f12cb6f8d0f23787073b0ec5de439815c20c34901335ee01f5258b17a2ec064ff9b2b44718e8ce4a4a90d594ddd6ff120e680b7cd08356251fcc0f4a25321bf9a989e2cbd333e84af1a2490b1c5e025187f442bfc9bd593ffad632c0c2ac31d6d689ba6e601d5a3c0e6e641c7a7111e2aeeb21991dc447d35dd7a6af9edb95118b8200a47826f53643db8bb4591aa60e0e8542f53c8082e24b98bbc6a8ddc708b4a972e47035cc5a8b4f4765f55b3a9ae4a8e6cd4a56fce96eaac190eea16fea791e0dbfc5554a184dee5ec983b53f7d8f722e242416ac90ce5d7a8c0343b696c46aa24b0a2e33b0e6d126aafab55babe422bb29f68c507bb61b62662c8d5f45e842687c89c1fb5ce5f5b57a1da1995cefa0ce10586c1c6c5602822f0084f5cee62a48973bd43818b0592f7e3b04814a886110632ab769429187e443ae9bcd91d74218f7314711caa5113ddf0bc3e3d246afbf0db4878c3815279ee82e5c010841a5d230ed85ebbacad46aa8400fc54cb0a7e24eaa0255b3e7808f0e8f8cf237b4445c669617e54ac00d177f8c1749dc745adc92497045e6271cb02af3d3d18e2ab72bbc98f4ffaacadba1bc57e0cc6ec9a1d59b55d12db4bf31b38a63d17ef93f32a13f2bf249d6254f8daae3b06f878d6ffaac3b5ee0d20ae2b48aec34a4bbfd6e711517bd461bef86de094e8aca9c7ea1918884255e9233b151de0e26a5ec42178c753da0ca68fd74f2a7d7e741898a1f3852c621c6c7135b8fc0aef7f2ff68acfe936e90b353f8f31100370b07a78266374359d76c1551c4971d1ca0670faec1617a984c580ae5599e5037a97eaaa39f3c76e520578533bededa3c8bbbd4fefca890ffec0f937423ec7c2cc772c3147535e565db87e1df56ec0d94465fbffe65effa36794c9f43bd156de48f9e01a0bfc02ceaed3d0516d0573cb2a710f2665625b0c531ba37897127cc88f62459826c76f57af233fa80fd9b646988b7a3f7841035b8b00e3b23234d2efc75b42de560ccbe0472c5a6adccfe2b8678c2fb0a8d1373d2309424ae96970da49342b2403f64ae969a9f91b3aa4c87e615937e46f08501bd5080e9e17a16463a48c18a9429e5d7cb3a8a3812be04e04847d2bba897defea8113a13b671251375ed75827197d122aa1a2182b172801543eda1cc1225b242718d8753e7776f91d3774c4c326aea5807e9c70e2547bfcadd97ef67ed0b1cc637e17d3d7be839fb7cd6e8aa74cd0c00fd1b586596f652ec01229658ee5c0c71ba9df4373a0fd427111590e7200fc819b1a0bbde272801c308b1207543b9b7f274fbb7e21654b063ff957957a22563d937526acf5e275a55298afe65fe549c637a65acfdcfeba5db732fd5674bd9d2ba370d63f6bcb231ddbaefad687142c762d6e9bd86b4c54b8b42d0553655e61f5ce41817bb405ec18ae075216c696cfbfca296446a6d5567a467b3845c201b8cdbd3eb04401b95057a17b84201bd356811ca1510af889f69e791b8cf5f2aa3441a5c89e445f66afc11471aa872f0e3ade8e0f1361008907bce9f0d8a206da3ae3668d01fbb0538567db879638f63bfdf28f8d151c58317ef97b21f207986265ee3e7fea890980ba9e7f36fd6515773607b91b06f5059a8f68af808c918bf26a0664926b345fcd12df0c879243ea8828a616609aaa138c678386d875cc4157f2f9c12cc81eaa1f42fecefbb6a78544ab663c547e6dff24ba4861d9b4e12db3439023f02468b54bcf83921d3eed4cd3ad4083384ada7b3d11f166c58f04d28316fb24f14eed4560b01fd3253c3bb8d7b96e58e9e4fa02d682b4a8005cfa4d9e06175eed590c56708b9d02d1f577be13050448be127286369c302f0cbe527628af46c838fbbbe7b87cbf06053b3d9ed3d17174af1ad92db8e77a1a589cde9b2549143838083eabb551762e4328bd011f3a56b86e8ba01361c7f90c67a03f8b84997aa63820a638387f838df85dac811652406f421125f02be1e1fd568f147e828960b95b23321c2d9bd397799d4dc3e716812f3d07a9abc6b62006814c557a893da914a2e17d0e8f79156cf5cef4acf3145667d8f09fdd3dbf0abc3d865df45614bb37f1dac7dd54538a5a9b3f43c6fe8a5f4a0", 0x1000}, 0x1006) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x7}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffb2, &(0x7f0000000040)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f00000000c0)={0xa3, 0x9, 0x200, 0x9, 0x7, 0xff}) dup2(r2, r1) [ 1398.646175][T10652] device team0 left promiscuous mode [ 1398.651790][T10652] device team_slave_0 left promiscuous mode [ 1398.661963][T10652] device team_slave_1 left promiscuous mode [ 1398.678912][T11101] device nr0 entered promiscuous mode [ 1398.701839][T11103] device team0 left promiscuous mode 14:39:33 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003700)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4}}, &(0x7f0000003800)=0xe8) lstat(&(0x7f0000003840)='./file0\x00', &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003e40)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003e80)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000003f80)=0xe8) r6 = getegid() r7 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004580)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000004680)=0xe8) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f00000041c0)) r10 = getpgrp(0x0) stat(&(0x7f0000004a80)='./file0\x00', &(0x7f0000004ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() r13 = getpid() fstat(r0, &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004bc0)={0x0, 0x0, 0x0}, &(0x7f0000004c00)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000004c40)={0x0, 0x0}) r17 = geteuid() r18 = getegid() r19 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004c80)={{{@in6=@ipv4={[], [], @multicast1}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000004d80)=0xe8) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000004f80)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003640)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="ce1143e969c4aedc922282785594e9296f5828f52a6d7e93e718d50a2aa946204c49af75e52d58ec7bb9c37a0388aa10919e880852b9fdf0c5aade99bb43cf8d32e66eb316048a535331bff838878443aed0b3c02515a0d55a7c22defafb31bd9be50787d382489ba69108b16516b806c2688cccb213af5d7d857e132cd713aac8d40b461663fd980f7df04e4c1811e233c1d4762b51115d2a5d7f056bab9163ad7c11ba720681db6af7bb40878fc22e08ddbe0b114fefdc75676f1dd80cfbaf992da31168f282ec0126fb2fb3097779adc69df54133528587b0d4d59424c360f6cf77ae36da6b93a22d05b4a0", 0xed}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000021c0)="1da312be50134fa234746414a0bad95fe438953c5f15d7fcdaf8d94a6d7180cb1a80689f143fdcf5429df627a8dbc0435e6c0f875ed909317e5707e40b6f52855718bbbb2e237f089dd565bc40dd5469b57a14b7ea8dfd6186c283da7391a3422a407d26f3ef0dbafa83c782686c1cfd3a65f7fd993ca2e28ab162f833d60b89c00e166ddb9340160060d47944e2690302a74422999a137b28d73a565522bc749e3d20e07e007a0102d9e43bfd25c956e115067ceae77ed499979b1ae947d6b8c36011153b5128ecca", 0xc9}, {&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="3251039c221abd794114d133cdd350f81a6f92aed6b6e1c877ab091452c212103a7245fcfa5911a207cf9e6ec35fe4b65f92ce529f54a4600dc3106c1503ad6e650b35f862f0d935d8b7f56cc9d419df063b29f9951fddb59344576444a089759310cc8e80f305cb35f0078226d3c737e8928f49899dba1d87d6adebb9baa5584cc9e0db9facb02dc688f172e503fd8640f6660480d67d2267c53d5ef75a7a0b342c969356fa296edf0316767094f5d4798028d3bf01865240892c4e965b6df80780da08", 0xc4}, {&(0x7f00000033c0)="79d756346c59e0de3d44b7d61063645a5b33ea5aca2d7372818ace79c440a96e7633582f86de5f838ece2e23ff4c18d44165b933ea26649ec652bbc6e67f0414aab5030a174efbe278d4ded351aa829ec7dcc928990867f51692c9a876e0a72164611ed66c9c1a10beb455da78d05f1610040d694dc02881e61d85cd6add710d5551f228bb5bb933bf870dfb0db028fe1ca883ac6d67169c48def6ded5495d2e6099a66979cf559d1ef213e773e289", 0xaf}, {&(0x7f0000003480)="8b62e793ff6d073336415e337867df951e9fe3c0827d331891dfcb42e8a2ce99f5bda160a55413f35bda2ea6a689541d6503009c5de3ac5dd50e600cbf6bb0cf801807442cb8163249acc6cf72288c7712e53c0802fd63ebb7ce82fd2b3b4008cd51b8d46798c2c2568b2216b5071b167badf93abf60139855c0754f2be8a3a01e7b533ea16e5d598b017ae4bdf980f7b2a85886f32e47f4f33e407c2264cb6da7e3ad990512c868674901eb14c55a269eb6fc813a6941bef13d38aa25e5476432d2d44e6950cdbc", 0xc8}, {&(0x7f0000003580)="ab837d2d47581bc0876b66c0a9d9d582356743f449da77c7d2e47d66118aaa1e276da1403179b77941b80eb6b871a5b58c2b25a50ca2babb3be266d791380fe1ccf32c898567fa264678b5cd990289e0b3d8d975a2a58bb4e76df1e23f4d8a42bb1c1e7a868e6186757a845b4f1c546f4d845b1d9974ca48a126d277bc2a648f54128ba1a0d7033edb0c63a1a9c19336648990af6225fe9ff7ae5b492ccb936d2ead5802c9f93f37bb", 0xa9}], 0x9, &(0x7f0000003900)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0x48, 0x4000800}, {&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000003a00)="456ff8458168e370f4bcf31037b57de2189b189f93b8b034d2f71efcdf210cc17fc4e3e67a4342242531b97c6fc054864a11f8f854f2c5c2b45d5244e4dc54a0c5357e095913c0e137cea08060e8855dad8f87c4e30f57d64ba01b2c6bb0e041e3043197eeb5", 0x66}, {&(0x7f0000003a80)="5ed253676d6652c02d2a68ca61e66d1a2c78f03b5a3a6ab939c6fe32fcc99d11c263522ef19ecc7be5f5c302ed999e3f45c58aa49d4618d6c8532c02bf963e481397d7ea20c7aecb6825ce0109be2174e173db0c96d556d17bf1f7869ba0dc10e5e134935702b282e8f5d4e45476023760286a4e8ff6d7db296948bfbfda18a04ba8318a482d34a4f6874cef600942b157d7ed9651f8d17c6ca3097459e8a4263b05ad0c618e636d618573f27ba2a2d1085549d1ad05a9cabc3c361be7f752a23051aafd5a06ca", 0xc7}, {&(0x7f0000003b80)="958ed2c936536d26acbbb03c76eb167fa0db018ccad47dc5b98ee6c76865205c1cbf5695fb4b798d91bd9892aa42f5f3ba97b75ec026185c3ded145c63bf104b89b2af3d26b58808ac28e9a3ce95b57605df9133cbeb803e039a5982a80cfa6a40b6ac3e82abc87ad5f7e37ec9f221f1987dbe287b0416d6fd9a86693a45604ebb2629050ef315ac9960cbd39f87400bcb5ab6f02b125720c0664e52f1744b0280590d101a606b34fd8903a5860d9f81699f2df69dd5ae1d52cede", 0xbb}, {&(0x7f0000003c40)="7cc9404bfd9ae67c41f46ac4c0adb7c45359ad4b8e57b79dfa84a2800480a5297f369d49ab15b992fef42e08185a213bdd42d94c98cf576d66488432e81d7e429163f4cb08cf2bc88a0ed308bfd670daf50adf96ce86bd228936f5a761f168122738", 0x62}, {&(0x7f0000003cc0)="8f050d2afe05313b4c0dd85d65de84a3c789b73f8ac5473b", 0x18}, {&(0x7f0000003d00)="5a95877248ec30b845143c5ffad6db27a2f6c6ccf4d463586f04786c7c70eddf8eadcbf8a554e8283ec523dfeef948dd8a03c454778d76514b48dabd7c402b587ae6d5a7d494", 0x46}, {&(0x7f0000003d80)="4342ae7ac74d3e76f73d71e178cc6dc6681407c71d94ccb2a8d62c41240a588b", 0x20}], 0x7, &(0x7f0000003fc0)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x78, 0x8000}, {&(0x7f0000004040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000004100)=[{&(0x7f00000040c0)="b2272ec39a07b895d0971428bff9a7acda22b3a621707670bb981c36f37a676242fa3fa0103715f977cd46a0326ed5b6", 0x30}], 0x1, 0x0, 0x0, 0x80}, {&(0x7f0000004140)=@file={0x664b26bfe5cec27c, './file0\x00'}, 0x6e, &(0x7f00000041c0), 0x0, &(0x7f0000004200)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0x38, 0x40000}, {&(0x7f0000004240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004540)=[{&(0x7f00000042c0)="e3388599952a27d07e1bc028a9f35b035e2f89cd85702865eef75309a7565f693aa6c31ae972d9efdedc05734f2783214c347d8d0695ba8c785e30570add875d8affaaecae082d55757391fdaa95b24a43b78868600c108b968ee2b59d48c505967b01e0bba555ea5699b5466df1c3425d9ae0427fb4d04cb998d348594f3c1b1f71d0f505f12ff9a6ad7aaa5e2af6b92bb57c11a635c223bad13cdf8b48cf9d239cd0ca4903e891d371bc8b2a91d77c8b9a515525606fb6d5e79f75f831217671ec26204e8c9db26adb7f59c9edb7cec0108d889658ad329a9cf7d1", 0xdc}, {&(0x7f00000043c0)="ed0c53795790574eb53440e022c1e1da97b2371ef0287fb3feda91bb4390ca27d7cb775db93e9562186edef7d16cd6a086e6c3cf531f534db10774c321191206823c7fe4a15d8a7d5363f4298f56b42fbdcf182b67e2732a1879a423", 0x5c}, {&(0x7f0000004440)="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", 0xfa}], 0x3, &(0x7f0000004780)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0xa8}, {&(0x7f0000004840)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000004a40)=[{&(0x7f00000048c0)="917f494fc053502c970418b2bc4990bb9b27d469f3b85fd87a3d3b60eb6942ca463d24dc4ecb8b255e9d0986e838d599ca553646057dcdd51e8e5a75bf52703ef1a7fca2c3df3104a9ce", 0x4a}, {&(0x7f0000004940)="34f2fa8b2b2c5e46f4c435bffc39566d2d6dcbfb86ab90450b6196fcb58b143593d666c847ca33a447f07dc41a78a59b2f8b42fae50d306ee89e1624ffe3c0d80e798f796177ae5361c41b7cb4fe13556999c8118903e320a581aab175f30f2c408ad9adc8ffd00c901ccb09a8d6c4ac189ad26079e0c95d18a73b4d0b2e67cc2281a6c3200435e786b7fa9044a9ac312c09b5169ae9537c3c2f9b074bd854542338bf1c3812186f331aca57cb1e792234572d14609b78a17994a1c6e8716a186d387e989120fe0deb803732c057697e5b0aa21b3881c2490126f74dbb35491119268aff948dde4a2079714caea76356", 0xf0}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0xd0, 0x800}], 0x6, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:33 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1398.771858][T11103] device team_slave_0 left promiscuous mode [ 1398.809914][T11103] device team_slave_1 left promiscuous mode 14:39:33 executing program 4: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1399.222414][T11217] device team0 entered promiscuous mode [ 1399.231628][T11217] device team_slave_0 entered promiscuous mode [ 1399.245783][T11217] device team_slave_1 entered promiscuous mode [ 1399.257678][T11217] 8021q: adding VLAN 0 to HW filter on device team0 14:39:33 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$inet_smc(0x2b, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fadvise64(r1, 0x0, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xfffffffffffffe56) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x856, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0xfff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r3, 0x1) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f00000003c0), 0x9) io_setup(0x9c, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) [ 1399.285185][T11420] device team0 entered promiscuous mode [ 1399.304717][T11420] device team_slave_0 entered promiscuous mode [ 1399.314881][T11420] device team_slave_1 entered promiscuous mode [ 1399.363872][T11420] 8021q: adding VLAN 0 to HW filter on device team0 14:39:34 executing program 5: r0 = socket(0x19, 0x0, 0xb89) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000340)={0x79}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x80000001}) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:34 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:34 executing program 4: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1399.665225][T11318] device team0 left promiscuous mode [ 1399.670553][T11318] device team_slave_0 left promiscuous mode [ 1399.676842][T11318] device team_slave_1 left promiscuous mode [ 1399.687729][T11531] device team0 left promiscuous mode [ 1399.697128][T11531] device team_slave_0 left promiscuous mode 14:39:34 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1399.714265][T11531] device team_slave_1 left promiscuous mode [ 1400.224915][T11536] device team0 entered promiscuous mode [ 1400.242209][T11536] device team_slave_0 entered promiscuous mode [ 1400.248587][T11536] device team_slave_1 entered promiscuous mode 14:39:34 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$inet_smc(0x2b, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fadvise64(r1, 0x0, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xfffffffffffffe56) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x856, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0xfff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r3, 0x1) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f00000003c0), 0x9) io_setup(0x9c, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) [ 1400.279858][T11536] 8021q: adding VLAN 0 to HW filter on device team0 [ 1400.308087][T11644] device team0 entered promiscuous mode 14:39:35 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bcsh0\x00', 0x9100}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:35 executing program 4: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1400.362057][T11644] device team_slave_0 entered promiscuous mode [ 1400.392664][T11644] device team_slave_1 entered promiscuous mode 14:39:35 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000180)={{0x3a, @rand_addr=0x71, 0x4e22, 0x2, 'sh\x00', 0x1, 0x72, 0x5d}, {@multicast2, 0x4e22, 0x4, 0x4, 0xfff, 0x9}}, 0x44) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x400, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000003480)=""/4096, 0xffffffffffffff7c}], 0x1, &(0x7f0000001200)=""/233, 0xfffffffffffffdc7}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f0000000000), 0xfffffffffffffe75, 0x4040, 0x0, 0xfffffffffffffef1) 14:39:35 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1400.446498][T11644] 8021q: adding VLAN 0 to HW filter on device team0 [ 1400.485707][T11653] device team0 entered promiscuous mode [ 1400.491611][T11653] device team_slave_0 entered promiscuous mode [ 1400.539964][T11653] device team_slave_1 entered promiscuous mode [ 1400.578737][T11653] 8021q: adding VLAN 0 to HW filter on device team0 14:39:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt(r0, 0x4, 0x0, &(0x7f0000000300)=""/193, &(0x7f0000000140)=0xc1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) 14:39:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x19, 0x0, "e46db855395503d93f8a8966b76ac6bef891fb016969a1b15039f812bf03faa1a3092a1573085cc57ec9f5665873f5bea25ac7540efa0586d841b1ee72afb88e", "7f2dd3c6adad0847fac33679668a52541b697af43dc04e4e7798056989b16c46", [0x5, 0x9]}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000280)={0x0, r0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') write$P9_RREADLINK(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x8, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000000c0)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000000)) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000300)={0xc000000, 0x6, 0x5}) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x1, 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r6, 0x0, 0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000002c0)={0x7567, 0x0, 0x400000000, 0x800}, 0x8) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 1400.614245][T11641] device team0 left promiscuous mode [ 1400.619585][T11641] device team_slave_0 left promiscuous mode [ 1400.651637][T11641] device team_slave_1 left promiscuous mode 14:39:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') write$P9_RRENAME(r0, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) lseek(r0, 0x0, 0x1) 14:39:35 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x128, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x12}}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x96}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="701090246cd4c5a9075d8647424b1416"}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1400.662180][ C0] net_ratelimit: 18 callbacks suppressed [ 1400.662188][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.673723][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1400.689275][T11656] device team0 entered promiscuous mode [ 1400.741753][T11656] device team_slave_0 entered promiscuous mode [ 1400.791158][T11656] device team_slave_1 entered promiscuous mode [ 1400.823717][T11656] 8021q: adding VLAN 0 to HW filter on device team0 [ 1400.849638][T11661] device team0 left promiscuous mode [ 1400.858284][T11661] device team_slave_0 left promiscuous mode [ 1400.876069][T11661] device team_slave_1 left promiscuous mode 14:39:35 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:35 executing program 4: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0xfffffffffffffdc7, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, 0x0, 0x0, 0x0) [ 1401.052614][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.058871][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1401.065419][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.071616][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1401.212773][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.219378][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:35 executing program 4: socket(0x10, 0x803, 0x0) unshare(0x40600) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2}) init_module(&(0x7f0000000000)='-vmnet1eth1[\x00', 0xd, &(0x7f0000000040)='\x00') 14:39:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e20, 0x3, @rand_addr="6c557f818fd96609c9fecf65397edbe2", 0x9b8}}, 0x0, 0x1, 0x0, "b9427feca7d0e2128c80d212e81a79cca3291688bcd3639bf39be8d78f4475f0d675702d152d65261fa2087cc3e31b9929bd52a6dcdd64ee6e0625cbcf30ae73ccb3620f4eee1b53783652c819ac8373"}, 0xd8) splice(r0, 0x0, r3, 0x0, 0x2000000000a, 0x0) mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) [ 1401.528683][T11764] device team0 entered promiscuous mode [ 1401.547374][T11764] device team_slave_0 entered promiscuous mode [ 1401.572548][T11764] device team_slave_1 entered promiscuous mode [ 1401.583685][T11764] 8021q: adding VLAN 0 to HW filter on device team0 14:39:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x19, 0x0, "e46db855395503d93f8a8966b76ac6bef891fb016969a1b15039f812bf03faa1a3092a1573085cc57ec9f5665873f5bea25ac7540efa0586d841b1ee72afb88e", "7f2dd3c6adad0847fac33679668a52541b697af43dc04e4e7798056989b16c46", [0x5, 0x9]}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000280)={0x0, r0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') write$P9_RREADLINK(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x8, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000000c0)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000000)) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000300)={0xc000000, 0x6, 0x5}) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x1, 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r6, 0x0, 0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000002c0)={0x7567, 0x0, 0x400000000, 0x800}, 0x8) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 1401.613221][T11769] netlink: 'syz-executor.1': attribute type 12 has an invalid length. 14:39:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000000c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5e80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tun\x00\x9c;\x98\xfc\x06\x9f\x9fU\xd1\xc2\xec\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0xaaaaaaaaaaaac41, 0x0, 0x0, 0x181) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0xd9, 0x2, 0x0, 0x1e3e, 0x8, 0x8001, 0x43, 0x486, 0x7, 0x2, 0x0, 0xffffffff00000000, 0x3}, {0x0, 0x8, 0x5, 0x100, 0x0, 0x7, 0x10000, 0x8, 0x7, 0x5, 0x800, 0x0, 0x7}, {0x9, 0x2, 0x6, 0x2, 0x1, 0x7, 0x7, 0x0, 0xffffffffffffffe0, 0x0, 0xff, 0x8000, 0x5}], 0xd7a}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) 14:39:36 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1401.742492][T11888] device team0 left promiscuous mode [ 1401.747957][T11888] device team_slave_0 left promiscuous mode [ 1401.772168][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.778071][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1401.786865][T11888] device team_slave_1 left promiscuous mode [ 1401.831352][T11883] device team0 entered promiscuous mode [ 1401.874070][T11883] device team_slave_0 entered promiscuous mode [ 1401.906064][T11883] device team_slave_1 entered promiscuous mode [ 1401.919313][T11883] 8021q: adding VLAN 0 to HW filter on device team0 [ 1401.931091][T11888] device team0 left promiscuous mode 14:39:36 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) setsockopt$sock_int(r0, 0x1, 0xea031180fac959f3, &(0x7f0000000080)=0x8000, 0x4) r1 = socket(0x11, 0x802, 0x72) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:36 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x487ffe, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x2, 0x200000) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000005c0)={0x100, 0x0, 0x6}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101040, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001000)={0x0, @in6={{0xa, 0x4e23, 0x400, @loopback}}, 0x0, 0x0, 0x4}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000880)={0x5, 0x5, 0xfa00, {&(0x7f0000000600)}}, 0xffffffffffffffd0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="7f454c46030801000500000000000000000006003f000000df010000000000004000000000000000190200000000000000000000030038000200ffff0000000057e5746480000000000000000700000001000000000000000000000000000000da130000000000000100000000000000000000000000000088e7d7f771ac80af2c2417511355631b371d9e3610100305b1b7aa7d68ebb2b400bdeac34e4f16a63283d6ea530ae4266bbfc19d1216537f1e1eacb042d9643fef881ea0c965f99cafd0809729b4156f0e577c77a0526002f9bf5482b781475364c28e3d2797ee4b3c54335e6bf3a088f8def054b8b4aba9081eb8207a25a8a288c7a67563db39ff3bff19bb6ed43372f73812b0034576a7834449faaff80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000093c9b8fd9036827857000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ea) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB]) geteuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000900)={{{@in6, @in6}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000a00)={0x14, 0x30, 0x402, 0x0, 0x25dfdbfb, {0x1a}, [@generic]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x80) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000500)=""/175) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x8201, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000280)={0x0, 0x5, 0x9, [], &(0x7f0000000240)}) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x400000b4, 0x0, 0x40000084], [0x187]}) epoll_wait(r1, &(0x7f0000000040)=[{}, {}], 0x2, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x26040, 0x0) [ 1402.032331][T11888] device team_slave_0 left promiscuous mode [ 1402.102517][T11888] device team_slave_1 left promiscuous mode 14:39:36 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:36 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:39:36 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:36 executing program 4: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="79922c9ebc5f9e6f2116f99cfac5b82cc473e902b63622dc6a61fb4bd438c29bada53212", 0x24) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa040806410000909a9b47ec02af2452e4b3327c36af2f4e21151ed860fa1d089079000000000800040000000000000044156dc545618371188456f329997f01da551ce7995ee66acf16b6243f096a8d6ff9f9f3279e6de470dc3ce15a5a7eb48c3e5a3e86632f2fdd4b238edef17b32ae1bcfddd0dda488d342836cca723c6c4297419f74ef06678d36bcd994f77fb67e90c8a08c8fd3d2cb3625582eb89c13c29c52a3ae947dae5c72ad331f566eff7722e00f6fc94fb9e7db95340a4e77852260269c984c0ce012e5e9b27290970f31e0e305"], 0x0) 14:39:37 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) clone(0x4000000003fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$rds(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x6}}, 0x10, 0x0}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1, 0x42) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:udev_tbl_t:s0\x00', 0x20, 0x0) 14:39:37 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0x19) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 1402.499644][T12606] device team0 entered promiscuous mode [ 1402.521882][T12606] device team_slave_0 entered promiscuous mode [ 1402.554579][T12606] device team_slave_1 entered promiscuous mode [ 1402.598300][T12606] 8021q: adding VLAN 0 to HW filter on device team0 [ 1402.692675][T12801] device team0 left promiscuous mode [ 1402.732310][T12801] device team_slave_0 left promiscuous mode [ 1402.738528][T12801] device team_slave_1 left promiscuous mode 14:39:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x19, 0x0, "e46db855395503d93f8a8966b76ac6bef891fb016969a1b15039f812bf03faa1a3092a1573085cc57ec9f5665873f5bea25ac7540efa0586d841b1ee72afb88e", "7f2dd3c6adad0847fac33679668a52541b697af43dc04e4e7798056989b16c46", [0x5, 0x9]}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000280)={0x0, r0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') write$P9_RREADLINK(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x8, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000000c0)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000000)) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000300)={0xc000000, 0x6, 0x5}) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x1, 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r6, 0x0, 0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000002c0)={0x7567, 0x0, 0x400000000, 0x800}, 0x8) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 14:39:37 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000080)={0x7, 0x1b, 0x1}, 0x7) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r2, r3/1000+10000}}) 14:39:37 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x8, 0x4) 14:39:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x8f6000000003fffd, 0x0, 0x8, 0x2}, 0x2c) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0]) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0xc800) memfd_create(&(0x7f0000000100)=')\x00', 0x1) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000880)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005805000000000000180200001802000070040000700400007004000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x5a8) socket$bt_rfcomm(0x1f, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\x00', 0x0) fcntl$setlease(r2, 0x400, 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 1402.765586][T12606] device team0 entered promiscuous mode [ 1402.819610][T12606] device team_slave_0 entered promiscuous mode [ 1402.861966][T12606] device team_slave_1 entered promiscuous mode 14:39:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x246402, 0x0) setns(r1, 0x8000000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @initdev}, &(0x7f0000000080)=0xc) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x8000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r2}) ioctl(r0, 0x81000008912, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000180)=""/53, &(0x7f0000000200)=0x35) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0x0, 0x3, 0x8, 0x0, 0x6}, 0x400, 0x9}) clone(0x20850003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1402.904418][T12606] 8021q: adding VLAN 0 to HW filter on device team0 [ 1402.945723][T12847] device team0 left promiscuous mode [ 1402.972944][T12847] device team_slave_0 left promiscuous mode 14:39:37 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1403.020882][T12847] device team_slave_1 left promiscuous mode 14:39:37 executing program 1: r0 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ppoll(&(0x7f00000000c0)=[{r0}, {r1, 0x680}], 0x2, &(0x7f00000001c0), &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r2) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 14:39:38 executing program 1: getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000002cc0)={'filter\x00', 0x0, 0x4, 0x0, [], 0x3, &(0x7f0000002b00)=[{}, {}, {}], 0x0}, &(0x7f0000000380)=0x78) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in6=@ipv4, @in=@remote}}, {{@in=@local}, 0x0, @in=@local}}, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20000805) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x7fffe, 0x0) write$UHID_INPUT(r1, &(0x7f00000005c0)={0x8, "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", 0x1000}, 0x1006) bpf$MAP_CREATE(0x0, 0x0, 0x0) msgget$private(0x0, 0x21) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0xc) msgctl$IPC_RMID(0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') chdir(&(0x7f00000000c0)='./file0\x00') setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040), 0x4) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setns(r2, 0x0) clone(0x10062101, &(0x7f0000002f80)="f669ca823df90380ccdd2f8b72fcc45ae07d003740db0533146ee45a6738d9de5e6115b600977f4c0e016fd31f5aec29936ed007ce76ac46f6157528b3fad8e006c8a01e7e38615cfd12b215f938d4da082cfad9de2cddfd63b3f93743b93013b244941974c74a550b49ba8beef1eb5e67859bbf546eacb22b88308b2cbd161ef91c9af96351b7c1e8329a7b78489254b6e93b4655b3f5a5d4862cb366124b6c5b0366c7f82d9cf2dbb4dcba6462ef9d62cc729f32a26d3e9eb6af36f98635b37edcf74bfa", 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/net\x00') 14:39:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x19, 0x0, "e46db855395503d93f8a8966b76ac6bef891fb016969a1b15039f812bf03faa1a3092a1573085cc57ec9f5665873f5bea25ac7540efa0586d841b1ee72afb88e", "7f2dd3c6adad0847fac33679668a52541b697af43dc04e4e7798056989b16c46", [0x5, 0x9]}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000280)={0x0, r0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') write$P9_RREADLINK(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x8, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000000c0)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000000)) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000300)={0xc000000, 0x6, 0x5}) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x1, 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r6, 0x0, 0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000002c0)={0x7567, 0x0, 0x400000000, 0x800}, 0x8) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 14:39:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0xfffffffffffffe1c) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7b, 0x0, [0x200000485, 0x5]}) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x5, 0x0, [{}, {}, {}, {}, {}]}) [ 1403.794616][T12937] device team0 entered promiscuous mode [ 1403.801205][T12937] device team_slave_0 entered promiscuous mode [ 1403.825352][T12937] device team_slave_1 entered promiscuous mode [ 1403.845033][T12937] 8021q: adding VLAN 0 to HW filter on device team0 [ 1403.869083][T13116] device team0 left promiscuous mode [ 1403.885230][T13116] device team_slave_0 left promiscuous mode 14:39:38 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1403.904332][T13116] device team_slave_1 left promiscuous mode [ 1404.036161][T13167] device team0 entered promiscuous mode [ 1404.041760][T13167] device team_slave_0 entered promiscuous mode [ 1404.123602][T13167] device team_slave_1 entered promiscuous mode [ 1404.133984][T13167] 8021q: adding VLAN 0 to HW filter on device team0 14:39:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x37}, 0x8) [ 1404.217396][T13485] device team0 left promiscuous mode [ 1404.242544][T13485] device team_slave_0 left promiscuous mode 14:39:38 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) getpeername$inet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:39:38 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = syz_open_dev$usb(0x0, 0x80000000000, 0xfffffffffffffffe) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000200)={0x0, 0xffffffffffffffc0}, 0x2) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x10) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x180000000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000000)=0x5) r2 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x1000000e000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x02', 0x1ff) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x2010, r1, 0x8) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000140)=""/121) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) [ 1404.283081][T13485] device team_slave_1 left promiscuous mode [ 1404.286109][T13499] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 14:39:39 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1404.336602][T13496] device team0 left promiscuous mode [ 1404.349943][T13496] device team_slave_0 left promiscuous mode [ 1404.373149][T13496] device team_slave_1 left promiscuous mode 14:39:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1000, 0x2}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={r1, 0x23, "e1bebd397d008227cb1764ce5df5d26138c076efc44460bae988d22de86d5abced0b55"}, &(0x7f0000000180)=0x2b) r2 = getuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r2) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_eee={0x4d}}) [ 1404.922810][T13497] device team0 entered promiscuous mode [ 1404.938205][T13497] device team_slave_0 entered promiscuous mode [ 1404.947785][T13497] device team_slave_1 entered promiscuous mode [ 1404.959742][T13497] 8021q: adding VLAN 0 to HW filter on device team0 [ 1404.971580][T13499] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 1405.002767][T13644] device team0 entered promiscuous mode [ 1405.008369][T13644] device team_slave_0 entered promiscuous mode [ 1405.124895][T13644] device team_slave_1 entered promiscuous mode 14:39:39 executing program 5: r0 = socket(0xd, 0x800, 0x3ff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:39 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1405.296396][T13644] 8021q: adding VLAN 0 to HW filter on device team0 14:39:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20001, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x1f, 0x100, 0x3ff, 0x67}, 0x10) 14:39:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2000000000000346, &(0x7f0000000180)=[{0x1, 0x76a, 0x8bd, 0x5}, {0xfffffffffffffffe, 0x0, 0x8}, {0xbc9, 0x7, 0xa5, 0x4}, {0x80df, 0x9, 0x8001, 0xffffffffffff4f26}, {0x1000000000119, 0xae, 0xbe2}, {0x6, 0x3, 0x400, 0x7}, {0xffff, 0x10001, 0xcf, 0xc19}, {0x8, 0x7, 0x502, 0x4}, {0x7, 0x7fffffff, 0x0, 0x7fffffff}]}, 0xffffffffffffff4a) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x100000001, 0x401, 0x7, 0x2}, {0x3, 0xfff, 0x1f8, 0xff}]}, 0x10) sendto$inet6(r0, &(0x7f0000000080)="bc", 0x1, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)='\x00', 0x1, 0xffffffffffffffff, 0x0, 0x0) 14:39:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x67, "1ed2e1b8f85861afeab78b5a4a8c46192af9f628ebe7b3e740193c1bbc7872f0bc19944732e6cd04b10b4a5c88273612a1ed1cad7a789639d1f3b467cb3c8a01b029e96abd0e5f95e386e803cae7c7d38e7f1b3c19fab56ee1455f94ad6ee4f5d4c7a82181bc0b"}, &(0x7f00000002c0)=0x6f) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xfe, "bbbaf1fe45c4d9b94ebd92d342450473e5440953fe93497bf226b280dc0eddee2ce89f9925ef12b606509c05e87d58a433e800004b2385702fcc824e600cd1049fb98d7880a4d8ce0e39293f6cdd862178940791b388e5aa88606f8b7ceed8b3f2d739d21bff7cc2b9e9bfee02e030858e38793e617fa3aa289e11231386166fb04f75b053d06d08da089fb9ece480fbd301608a2e23a4c316499e49f6d5618b1c4c5d9cb82d56f0b3fa5ba006556d4d330470154769221187e890629066f53e049d47cfa1e58e7c1e5847b7ed1f00073fac837bd67ab09f2f99b2dd574b93d842bd9fd25bdf048ed6cb4e49c2fb01765d87005d407a963b7619e914e0a0"}, &(0x7f0000000300)=0x106) r4 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) signalfd(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_elf32(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="3a63661def7583357579a607bb5bddcf192a3172c517c3b16946d2d8a9a57fbc2c457b65bc8b32be55d778fa0000eb6d81d34417fd2823d4e6dc199b9dfee6a80c5a49277d4600000000000000000000000000000045f4400a45fa63ad437a54260330bc2e6cb9a47371e852c293664b0a49890cc500281e49f85c93ec8262c14f09faaf075fa2d5e82693461688db0c3414b422bf7ea82991fe9135dc6bdee4a380f4c304f1cb075b7dad4bafe0e9b052ee6473264551a92aadd7c72b77e0601a3cf0adb7", @ANYPTR, @ANYRES16=r0, @ANYRESHEX], 0xe1) recvmmsg(r4, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x0, &(0x7f0000000440)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x0, &(0x7f0000000640)=""/240, 0xf0}}], 0x2, 0x0, &(0x7f0000006400)={0x77359400}) [ 1405.384044][T13717] device team0 left promiscuous mode [ 1405.400977][T13717] device team_slave_0 left promiscuous mode [ 1405.422864][T13717] device team_slave_1 left promiscuous mode 14:39:40 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'\xc8\xc6\x1f\x8b\x00`\x00\xbc\xa9\x00\x00\x00\x00\x00\x0f\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x50000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)=0x1) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1405.494141][T13644] device team0 entered promiscuous mode 14:39:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 14:39:40 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20001, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x1f, 0x100, 0x3ff, 0x67}, 0x10) [ 1405.562282][T13644] device team_slave_0 entered promiscuous mode 14:39:40 executing program 4: r0 = inotify_init1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) prctl$PR_GET_NO_NEW_PRIVS(0x27) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4) r3 = dup3(r0, r2, 0x80000) setsockopt$inet6_tcp_buf(r3, 0x6, 0x21, 0x0, 0xffffffd0) [ 1405.622417][T13644] device team_slave_1 entered promiscuous mode [ 1405.635154][T13644] 8021q: adding VLAN 0 to HW filter on device team0 [ 1405.645881][T13735] device team0 left promiscuous mode 14:39:40 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1405.690716][T13735] device team_slave_0 left promiscuous mode 14:39:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x2000, 0x7c0002b1, &(0x7f0000ffc000/0x2000)=nil) r2 = shmat(r1, &(0x7f0000ff4000/0x1000)=nil, 0x6000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ff3000/0x3000)=nil) shmdt(r2) [ 1405.733739][T13735] device team_slave_1 left promiscuous mode 14:39:40 executing program 4: r0 = inotify_init1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) prctl$PR_GET_NO_NEW_PRIVS(0x27) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4) r3 = dup3(r0, r2, 0x80000) setsockopt$inet6_tcp_buf(r3, 0x6, 0x21, 0x0, 0xffffffd0) [ 1405.932186][ C0] net_ratelimit: 22 callbacks suppressed [ 1405.932196][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1405.932570][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1405.938033][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1405.944018][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x8000) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000100)={0xae, 0x8, {0x54, 0xfffffffffffff7c3, 0x7ff, {0x100, 0x7a00000000}, {0x2, 0x9}, @cond=[{0x6, 0x4464, 0x5, 0xe8b, 0x401, 0xbfd}, {0x5, 0x9, 0xfffffffffffffffd, 0x6, 0x9479, 0x2}]}, {0x57, 0x2, 0x620, {0x7a41, 0x4}, {0x0, 0x2}, @const={0x5, {0x0, 0xffffffff, 0x9, 0x4}}}}) [ 1406.283382][T13825] device team0 entered promiscuous mode [ 1406.293983][T13825] device team_slave_0 entered promiscuous mode [ 1406.304245][T13825] device team_slave_1 entered promiscuous mode [ 1406.317311][T13825] 8021q: adding VLAN 0 to HW filter on device team0 [ 1406.345143][T14016] device team0 left promiscuous mode [ 1406.350955][T14016] device team_slave_0 left promiscuous mode [ 1406.359258][T14016] device team_slave_1 left promiscuous mode 14:39:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) setfsgid(r2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78, 0x0, 0x200, {0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}}}, 0x78) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x262, 0xfffffffff7fffffe, 0x0, {{0x100008001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8}}}, 0xfffffffffffffef8) write$FUSE_ATTR(r1, &(0x7f0000000200)={0x78}, 0x78) 14:39:41 executing program 2: r0 = gettid() process_vm_readv(r0, 0x0, 0xfffffffffffffdc9, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x10000, 0x20) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f00000001c0)=0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x6, 0x0, 0x3, 0x98, 0x683cf0a2}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={r4, 0x4}, 0x8) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f00000005c0)='syz0\x00') r5 = syz_open_dev$admmidi(0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000600)=""/226) r6 = semget(0x0, 0x1, 0x302) semtimedop(r6, &(0x7f0000000300)=[{0x0, 0x219b}], 0x1, &(0x7f0000000340)={0x0, 0x1c9c380}) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x3e}], 0x1, &(0x7f0000000200)={0x0, 0x989680}) read$alg(r3, &(0x7f0000000000)=""/213, 0xd5) r7 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r7, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x8000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, 0x0, 0x0) 14:39:41 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2d, 'io'}, {0x2f, 'memory'}]}, 0xc) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4) [ 1406.388828][T14092] device team0 entered promiscuous mode [ 1406.395807][T14092] device team_slave_0 entered promiscuous mode [ 1406.408131][T14092] device team_slave_1 entered promiscuous mode [ 1406.418746][T14092] 8021q: adding VLAN 0 to HW filter on device team0 [ 1406.481719][T14016] device team0 left promiscuous mode 14:39:41 executing program 5: r0 = socket(0x11, 0x804, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1406.528240][T14016] device team_slave_0 left promiscuous mode 14:39:41 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000005c0)={0xf010000, 0x0, 0x0, [0xffff8000], 0x0}) 14:39:41 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000040)={0x80000000, 0x8}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180)=0x4800) r1 = msgget(0x2, 0x1a0) msgctl$MSG_STAT(r1, 0xb, &(0x7f00000001c0)) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000200)={0x3, r0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) sched_getscheduler(r2) chdir(&(0x7f00000002c0)='./file0\x00') getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x1, 0x10}, &(0x7f00000003c0)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={r3, 0x4}, &(0x7f0000000440)=0x8) flock(r0, 0x8) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'ip6gre0\x00', r4}) modify_ldt$write(0x1, &(0x7f00000005c0)={0x5, 0xffffffffffffffff, 0x0, 0x369, 0x92, 0x752, 0xffffffffffffffff, 0x1f, 0x8, 0x1}, 0x10) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000600)) io_setup(0x2, &(0x7f0000000640)=0x0) io_destroy(r5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000680)={0x2, 0x1, 'client0\x00', 0x1, "c7ad03242a6b6b3d", "536c2af2e0dde49355e719e3970ae87e37acecb48e7021095078c90feda3da26", 0x8001, 0x6}) ioctl$TIOCCONS(r0, 0x541d) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000980)={0x0, 0x1, &(0x7f0000000740)=""/226, &(0x7f0000000840)=""/181, &(0x7f0000000900)=""/83, 0xf000}) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f00000009c0)=0x1) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000a00)={0x0, @src_change}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000ac0)={r3, @in6={{0xa, 0x4e23, 0x401, @mcast2, 0x7}}}, &(0x7f0000000b80)=0x84) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000bc0)=0x900, 0x4) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000c00)) [ 1406.574741][T14016] device team_slave_1 left promiscuous mode 14:39:41 executing program 5: r0 = socket(0x9, 0x100001, 0x20001000000000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) [ 1406.635644][T14480] device team0 left promiscuous mode [ 1406.641049][T14480] device team_slave_0 left promiscuous mode [ 1406.663539][T14480] device team_slave_1 left promiscuous mode [ 1406.892232][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1406.898129][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1406.997208][T14092] device team0 entered promiscuous mode [ 1407.008927][T14092] device team_slave_0 entered promiscuous mode [ 1407.015568][T14092] device team_slave_1 entered promiscuous mode [ 1407.029488][T14092] 8021q: adding VLAN 0 to HW filter on device team0 [ 1407.037491][T14642] device team0 entered promiscuous mode 14:39:41 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000080), 0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) ioctl$sock_ifreq(r1, 0x893e, &(0x7f0000000000)={'yam0\x00', @ifru_hwaddr}) dup3(0xffffffffffffffff, r0, 0x80000) unshare(0x40000000) 14:39:41 executing program 5: r0 = socket(0x11, 0xf, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000200)=0x4) io_setup(0x3f, &(0x7f00000001c0)=0x0) io_getevents(r3, 0x0, 0xfffffffffffffdb0, 0x0, 0x0) close(r1) socket$vsock_stream(0x28, 0x1, 0x0) r4 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) io_submit(r3, 0x1404, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140), 0x700000000000}]) 14:39:41 executing program 4: syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x0, 0xfffffffd}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4500b091e5fb29cbdd2e7b4a6bcd1aee7b49d540820202a45fcbf9c9c86a32e1286ec7ad5269a445251954d4895f2b460900006602899f17bf3243d03db2717aeb5719ee70dd179bc6dd3954c3031659eab8d6efefa19fbc9994b538b6dfbd9a444a0ae36b231be666702002f91846b4c756915faf2b7b097d23b2529aa0f0"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000480)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB='7\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00']}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000040)) [ 1407.052166][T14642] device team_slave_0 entered promiscuous mode [ 1407.058568][T14642] device team_slave_1 entered promiscuous mode 14:39:41 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f00000005c0)={0x0, 0xfffffffffffffffc, 0x8a, 0x8001, @scatter={0x5, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/165, 0xa5}, {&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f0000000200)=""/217, 0xd9}, {&(0x7f0000000300)=""/104, 0x68}, {&(0x7f0000000380)=""/47, 0x2f}]}, &(0x7f0000000440)="bf1bff19dc40c633bcdc2eb4829884ce4d85c4afc0a3e8c5401b2d7369fce12a26af6d3532a39c2a8d0e55bdc2c303595252c3d5dfd27790f06a479fbb3627f01c8a566181bbf74ae119691f5c7f3394fff892b1199680bc8c7b58d2ad344c44084e25939d913a5b432079f5964d8b8bacbc569b668e7a0e9ab1dbf40f0f2e2b92aeea7918ba62d994e7", &(0x7f0000000500)=""/91, 0x4, 0x10000, 0x1, &(0x7f0000000580)}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x22000, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000640)={0xb, {0x1e, 0x5, 0xffffffffffff8000, 0x1000}}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000700)={r2, r1}) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) [ 1407.150261][T14642] 8021q: adding VLAN 0 to HW filter on device team0 [ 1407.196070][T15030] device team0 left promiscuous mode [ 1407.213903][T15030] device team_slave_0 left promiscuous mode 14:39:41 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1407.243649][T15030] device team_slave_1 left promiscuous mode 14:39:41 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) write$binfmt_misc(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x1200e) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, 0xffffffffffffffff) tkill(r1, 0x14) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1407.292187][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.298074][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1407.299253][T14912] IPVS: ftp: loaded support on port[0] = 21 [ 1407.303961][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.315879][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1407.322366][T15092] device team0 entered promiscuous mode [ 1407.330118][T15092] device team_slave_0 entered promiscuous mode [ 1407.368991][T15092] device team_slave_1 entered promiscuous mode [ 1407.394820][T15092] 8021q: adding VLAN 0 to HW filter on device team0 [ 1407.418753][T15123] device team0 left promiscuous mode 14:39:42 executing program 5: r0 = dup(0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x804, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40004) r2 = socket(0x2011, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0x100000000}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @empty, 'ifb0\x00'}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="4a00000050660be2d3d269df66635b65517ad6c4b3d84300291c3dcc80b8f317e0b972c555060453a30fcf8e3d7c5ce882a5414f2eff4df20169cbdce827e3470000000000000000000000000000aacae847c3489d1cec9ae83d8e0fab028f4c930bf33448f273f4d38da2510d5be7aa19a3b4b2191f521fdd1d2537e1ed6cd6a8d792ba4924ed0f9f328099f4a509f3629c944ed3893dd9557f4a06e3a58179d011385cf18fa37954e722f452958da665c526c27714a44948abf29d037d3ce63af679ad4a"], &(0x7f0000000100)=0x52) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x1ff, 0x7}, &(0x7f0000000180)=0xc) [ 1407.461170][T15123] device team_slave_0 left promiscuous mode [ 1407.482024][T15123] device team_slave_1 left promiscuous mode 14:39:42 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0, 0x138}, 0x20) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0x4008af03, &(0x7f0000000100)=0x40) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 14:39:42 executing program 5: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c, 0x80800) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:42 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20140, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='J', 0x1}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000a00)="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", 0x480, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000001c0), 0x4) [ 1408.083780][T15126] device team0 entered promiscuous mode [ 1408.089698][T15126] device team_slave_0 entered promiscuous mode [ 1408.104125][T15126] device team_slave_1 entered promiscuous mode [ 1408.117100][T15126] 8021q: adding VLAN 0 to HW filter on device team0 [ 1408.153640][T15030] device team0 left promiscuous mode [ 1408.159021][T15030] device team_slave_0 left promiscuous mode [ 1408.172345][T15030] device team_slave_1 left promiscuous mode [ 1408.188326][T15092] device team0 entered promiscuous mode [ 1408.197041][T15092] device team_slave_0 entered promiscuous mode 14:39:42 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1408.203579][T15092] device team_slave_1 entered promiscuous mode [ 1408.211484][T15092] 8021q: adding VLAN 0 to HW filter on device team0 [ 1408.280977][T15547] device team0 left promiscuous mode [ 1408.301400][T15547] device team_slave_0 left promiscuous mode [ 1408.309299][T15547] device team_slave_1 left promiscuous mode [ 1408.366474][T15549] device team0 entered promiscuous mode [ 1408.375220][T15549] device team_slave_0 entered promiscuous mode [ 1408.381682][T15549] device team_slave_1 entered promiscuous mode [ 1408.398886][T15549] 8021q: adding VLAN 0 to HW filter on device team0 [ 1408.418700][T15549] device team0 left promiscuous mode [ 1408.427409][T15549] device team_slave_0 left promiscuous mode [ 1408.433883][T15549] device team_slave_1 left promiscuous mode 14:39:44 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/140) getsockopt$inet6_dccp_int(r0, 0x21, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:39:44 executing program 4: r0 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) madvise(&(0x7f000090b000/0x3000)=nil, 0x3000, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x400000, 0x0) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x80800) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) semget(0x2, 0x0, 0x4) r3 = semget(0x0, 0x3, 0x2) semop(r3, 0x0, 0xd7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000780)={0x0, @in={{0x2, 0x0, @initdev}}, 0x95, 0xfff, 0x0, 0x0, 0x2}, 0x98) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYRESHEX], 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getpgrp(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8400ae8e, &(0x7f0000000180)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4024}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0) 14:39:44 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:44 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket(0x1, 0x80000, 0xfffffffffffffff9) 14:39:44 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:44 executing program 5: r0 = socket(0x7, 0x4, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1410.313467][T15566] device team0 left promiscuous mode [ 1410.325137][T15566] device team_slave_0 left promiscuous mode [ 1410.350078][T15566] device team_slave_1 left promiscuous mode 14:39:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) r2 = openat$cgroup_int(r1, &(0x7f0000001680)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0x1e4) 14:39:45 executing program 5: r0 = socket(0x11, 0x2000000080800, 0x9) shmget(0x0, 0x3000, 0x890, &(0x7f0000ffd000/0x3000)=nil) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0xb, 0x7fff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xf}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r1, 0x9, 0x8f, "c84da21194474eddb9f30268e0ea17645dd3948e592bf57a9dad7229ea01bc722f81487da44782f9a4bf7bab6a3c17b2f76164ad287aca810e8db3f84b95cdf0d66e79e6cf659d8acf550ac3c3c3a399ff9cd8fdfaa4bae757f987f1d13ab80b6feb030a25ce0b00fe1851b282811f6910cc05dbad0702986dbdc2ecc36413032cfb19285c72e5d3e1cebd4da60170"}, 0x97) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x24501, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0xd9) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20044010}, 0x4) 14:39:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00') fstat(r0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[@ANYBLOB="77a00b9680537a41938f9f64bc24b84d3aa678f7b01e307aa6dd7d9f1b7ca1e881c4efd1651bf13337700900000069eac8b200763b1c30c8f9006dedd205db1d2cd0d1d6d0e0e3f8070076e68cfc33c8920959b49e968607eaa70aa52c03ee4d1c9beed78c1d4ee74324dd8aac1dcd7a9132b3d4510300009800000000f37466348f4801ca1820e3db0de7495e1a7b421e615e19c93b7987eaa8aa691ec1c1968d00e8d06920d0b1d6a26c3d6f29548d1c60cbfcf2f0a6b3f0d6b362cc956a845580491162bac2c593424d343151cb03e92d1c0499baca2aa8b98c9f42de8575079c2b74b0676465bad782b208f48dbb74d3da569c94ba06febf84769dce3d8f6ed5e601cf30ec16caf92b224dbcba6cb9e2108e9b5c542d32c49947cbe749dcd75f1c01a323703ca7cfbe663f1b0000084fce76eb33990cae43499ef8740931b0e1da4841ef5a2506f84f70d9be484502609dbbab0cff3d5d62e3189ad61203425b8e8a8688c1cf44a967112ca657318cbb10f494156ee791168326b5130cc9c02f0cfc9bfb3689f5fbede8078f1c7490987dc84e6e61864ac56d3ebbc033"], 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\x00\x00\x02', {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'nr0\x00', {0x2, 0x0, @multicast1}}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x101204, 0x0) write$cgroup_int(r4, &(0x7f0000000040)=0x400, 0xc8ccd46eb7efdb73) pkey_alloc(0x0, 0xffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) msgget$private(0x0, 0x104) msgctl$IPC_STAT(0x0, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x61, 0x20000004, 0x0, 0x0) close(r5) socket(0x19, 0x80802, 0x7) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r7, &(0x7f0000000480), 0x10000000000001ed, 0x0) 14:39:45 executing program 5: r0 = socket(0x100010013, 0x6, 0x4047) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:45 executing program 5: r0 = socket(0x11, 0x802, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000040)='team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}, 0x30) ptrace$peek(0x2, r2, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0xd0, r3, 0x30, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x119}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf746}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6586dd8d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaff}]}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x1}, 0x24000800) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/155, 0x9b) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept(r0, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, &(0x7f0000000500)=0x80) [ 1410.969173][T15564] device team0 left promiscuous mode [ 1410.976465][T15564] device team_slave_0 left promiscuous mode [ 1410.987112][T15564] device team_slave_1 left promiscuous mode [ 1411.052205][ C0] net_ratelimit: 18 callbacks suppressed [ 1411.052214][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.063898][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1411.243265][T15671] device team0 entered promiscuous mode [ 1411.249184][T15671] device team_slave_0 entered promiscuous mode [ 1411.263603][T15671] device team_slave_1 entered promiscuous mode [ 1411.271987][T15671] 8021q: adding VLAN 0 to HW filter on device team0 [ 1411.287556][T15684] device team0 entered promiscuous mode [ 1411.295858][T15684] device team_slave_0 entered promiscuous mode [ 1411.309052][T15684] device team_slave_1 entered promiscuous mode [ 1411.319935][T15684] 8021q: adding VLAN 0 to HW filter on device team0 [ 1411.341966][T15562] device team0 left promiscuous mode [ 1411.355619][T15562] device team_slave_0 left promiscuous mode [ 1411.419797][T15562] device team_slave_1 left promiscuous mode [ 1411.452859][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.459429][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:46 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:46 executing program 4: r0 = socket(0x11, 0x2000000080800, 0x9) shmget(0x0, 0x3000, 0x890, &(0x7f0000ffd000/0x3000)=nil) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0xb, 0x7fff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xf}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r1, 0x9, 0x8f, "c84da21194474eddb9f30268e0ea17645dd3948e592bf57a9dad7229ea01bc722f81487da44782f9a4bf7bab6a3c17b2f76164ad287aca810e8db3f84b95cdf0d66e79e6cf659d8acf550ac3c3c3a399ff9cd8fdfaa4bae757f987f1d13ab80b6feb030a25ce0b00fe1851b282811f6910cc05dbad0702986dbdc2ecc36413032cfb19285c72e5d3e1cebd4da60170"}, 0x97) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x24501, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0xd9) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20044010}, 0x4) 14:39:46 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1411.466908][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.473478][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:39:46 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x101000, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x40) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000100)={@local, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@remote, 0x23, r2}) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x6001, 0x4) r3 = socket(0x11, 0x802, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, r4, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x6e}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:46 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1411.612238][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.618100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1411.672640][T16101] device team0 entered promiscuous mode [ 1411.702724][T16101] device team_slave_0 entered promiscuous mode [ 1411.710010][T16101] device team_slave_1 entered promiscuous mode [ 1411.764826][T16101] 8021q: adding VLAN 0 to HW filter on device team0 14:39:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast1, 0x4e23, 0x1, 'sh\x00', 0x37, 0xb60, 0x33}, 0x2c) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x0f\x00\x00\x00\x0f\x00', &(0x7f0000000100)=@ethtool_ringparam={0xe}}) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x800}, 0x2) [ 1411.846155][T16104] device team0 left promiscuous mode [ 1411.861671][T16104] device team_slave_0 left promiscuous mode [ 1411.873518][T16104] device team_slave_1 left promiscuous mode 14:39:46 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0x5) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040)="441f0804000000000000006491ee54be8e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_opts(r1, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:39:46 executing program 4: r0 = socket(0x11, 0x2000000080800, 0x9) shmget(0x0, 0x3000, 0x890, &(0x7f0000ffd000/0x3000)=nil) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0xb, 0x7fff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xf}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r1, 0x9, 0x8f, "c84da21194474eddb9f30268e0ea17645dd3948e592bf57a9dad7229ea01bc722f81487da44782f9a4bf7bab6a3c17b2f76164ad287aca810e8db3f84b95cdf0d66e79e6cf659d8acf550ac3c3c3a399ff9cd8fdfaa4bae757f987f1d13ab80b6feb030a25ce0b00fe1851b282811f6910cc05dbad0702986dbdc2ecc36413032cfb19285c72e5d3e1cebd4da60170"}, 0x97) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x24501, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0xd9) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20044010}, 0x4) 14:39:46 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000040)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000180)={&(0x7f00000000c0)="b3a9bcd8789e1b133259d5a39e5717354291f9d6d0e42f32330d7206b6cfcd6b5f7a6cced9552b62ccacbbc84a7ff588fb7db98873e7de69821bfd31cf03b55a872911c134f603fc14b399ffa72d8a6f7fea96c0511ebaa998aff041177c1bbd3aaa960329656072ec9694064f70d925d25b2acd47e9e95d1a7e6f53f7087ff802630e344c8289e2", 0x88}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x37, 0x9, 0xb, 0x11, "d716377ab42765fe41f91deb2c66bb4ccd2d2dec3c6361ad2acafc726a7f847bb7f5a6de570f7560e4e47d452c475b449505c7c6e0ff0aaecf57106d2c2a2034", "44cd945b7be9b2d31584b46941b9caac5c71c93a0bce6ad0c5437160ea3ed5aa", [0xfff, 0x7]}) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=@flushpolicy={0x108, 0x1d, 0x1, 0x0, 0x0, "", [@algo_aead={0xd8, 0x12, {{'morus1280-avx2\x00'}, 0x450, 0xe0, "c729fffbf32bf206209cc8dec69d758469f7f236a00d394e737afa39822dfd8e273fa4f7520786c8f78a7e3b4c55c60467cda6a0c62149f5a12e9e4d079349c37d692ae9ff99e1bea3a9f628f7f0d7adf04745e66d8db5b2219ff7fbff0d22b15ee9703de2e6b8e52386da98c7b5a9b64c2c8532ab97efff326fe04fb2c1e2bd2af36a4331b0d93b867b"}}, @coaddr={0x14, 0xe, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @policy_type={0xc, 0x10, {0x1}}]}, 0x108}}, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f00000001c0)='erspan0\x00') [ 1412.172174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1412.172654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1412.442984][T16123] device team0 entered promiscuous mode [ 1412.450950][T16123] device team_slave_0 entered promiscuous mode [ 1412.470397][T16123] device team_slave_1 entered promiscuous mode [ 1412.496346][T16123] 8021q: adding VLAN 0 to HW filter on device team0 [ 1412.519280][T16152] device team0 entered promiscuous mode [ 1412.534950][T16152] device team_slave_0 entered promiscuous mode 14:39:47 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1412.541640][T16152] device team_slave_1 entered promiscuous mode [ 1412.557379][T16152] 8021q: adding VLAN 0 to HW filter on device team0 [ 1412.583028][T16120] device team0 left promiscuous mode [ 1412.592917][T16120] device team_slave_0 left promiscuous mode [ 1412.622812][T16120] device team_slave_1 left promiscuous mode 14:39:47 executing program 2: r0 = socket$kcm(0x10, 0x20000, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xfc44, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008102e00f80ecdb4cb904014865160b00030020000000000009000e00da1b40d819a9060015000500", 0xfffffcbd}], 0x1}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x8) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x1ff, 0xb, 0x3}) 14:39:47 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x200000000003ffc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 14:39:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="580000000000000014010000090000000000000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="257ea2450000000096ca7ce91e547dc09c734777ddc70d30a15257546e1084478507ed0611bf7c2e6a81a37f26cc5aa43dd5"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x58}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 1412.766688][T16529] device team0 left promiscuous mode [ 1412.787766][T16529] device team_slave_0 left promiscuous mode 14:39:47 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1412.849359][T16529] device team_slave_1 left promiscuous mode [ 1412.859150][T16550] atomic_op 000000008754e3cc conn xmit_atomic (null) 14:39:47 executing program 4: r0 = socket(0x11, 0x2000000080800, 0x9) shmget(0x0, 0x3000, 0x890, &(0x7f0000ffd000/0x3000)=nil) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0xb, 0x7fff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xf}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r1, 0x9, 0x8f, "c84da21194474eddb9f30268e0ea17645dd3948e592bf57a9dad7229ea01bc722f81487da44782f9a4bf7bab6a3c17b2f76164ad287aca810e8db3f84b95cdf0d66e79e6cf659d8acf550ac3c3c3a399ff9cd8fdfaa4bae757f987f1d13ab80b6feb030a25ce0b00fe1851b282811f6910cc05dbad0702986dbdc2ecc36413032cfb19285c72e5d3e1cebd4da60170"}, 0x97) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x24501, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0xd9) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20044010}, 0x4) 14:39:47 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000001480)='/dev/audio#\x00', 0x5, 0x2c040) getsockname$unix(r1, &(0x7f00000014c0)=@abs, &(0x7f0000001540)=0x6e) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x56aa, 0xd, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) recvmsg(0xffffffffffffff9c, &(0x7f0000001380)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000140)=""/218, 0xda}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f00000012c0)=""/134, 0x86}, 0x40010100) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001580)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000001440)=@get={0x1, &(0x7f00000013c0)=""/85, 0x5}) 14:39:47 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x440}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc8, r1, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x50}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xf9, "6e3c61b52d1dbfbd176fa6af3fec16b5ff24f92be5725a677817cfc981933539608e4e838437e080a8a9278845128372f9ce7eaa165e654176644fd6bb8a2029a55c74585c2bc1879b805a221de7330a790cbb93d7c5f338f71d4499d79fd7c8bd04aa26a959d2b80de4693411b54d6b49726f874f9f6c9a9f6ff7d48f4fde1e49af219677e597bf195c3e0bc0a07b1d90b04aa8ab87dc7526d008486862493fb8b69cdd512fd0833c90f5778f9850ced64f87c532243557b56f59a6627e8195b130a9fa879c7a4d9135ae3e78314a00e11f007d526c3c9af48db7ead4800f8645771741addfcf6916041c811776f0a2bb4c060ca2c140ec7e"}, &(0x7f0000000380)=0x101) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000003c0)={r3, 0x20, "3936501a53d2f52d3662d721aef450466ef0f36a37776c8498ed850189d091ee"}, &(0x7f0000000400)=0x28) lsetxattr$trusted_overlay_nlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0x7}, 0x28, 0x1) bind$tipc(r0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000500)={0x5, 0x0, [{0xc0000007, 0xffffffffffffffff, 0x80000000, 0xd2}, {0xc0000000, 0xb5a0, 0xff, 0x4, 0x9}, {0xb, 0x81, 0x5, 0x9, 0xffffffff}, {0xf, 0x2, 0x7f, 0xf3df, 0xfffffffffffffc00}, {0xd, 0x34, 0x5, 0x80000000, 0x5}]}) preadv(r0, &(0x7f0000001b80)=[{&(0x7f0000000580)=""/177, 0xb1}, {&(0x7f0000000640)=""/68, 0x44}, {&(0x7f00000006c0)=""/250, 0xfa}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/213, 0xd5}, {&(0x7f00000018c0)=""/34, 0x22}, {&(0x7f0000001900)=""/158, 0x9e}, {&(0x7f00000019c0)=""/206, 0xce}, {&(0x7f0000001ac0)=""/161, 0xa1}], 0x9, 0x10) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000001c40)=""/167, &(0x7f0000001d00)=0xa7) write$vnet(r0, &(0x7f0000001f00)={0x1, {&(0x7f0000001d40)=""/245, 0xf5, &(0x7f0000001e40)=""/144, 0x3, 0x7}}, 0x68) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000001f80)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001fc0)=0x0) capget(&(0x7f0000002000)={0x20071026, r4}, &(0x7f0000002040)={0xdc, 0x5, 0x1fc00000000000, 0x3ff, 0x1, 0x4}) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000002080)="64c88e45a671d4d1f3a45813fafe929127f96493ad18d154f9a452c3d373ac29f5e0a22271ca5ea655d0cbca0fe31196e2ad713d6657522694784ae574722e65092537733fcfca595d56c1cf58b6e16036d7cb5eb97f98e638e4b91ccc0b17bb5b8712929bd01f7a2ae9420f8a10a70860e0ddbb65f5b94daae78b8d7582e6b353dd479175aa2241717e9017bc4d16") ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000002140)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000002180)=0x6, 0x4) getrusage(0xffffffffffffffff, &(0x7f00000021c0)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000002280)=""/90) bind$vsock_stream(r0, &(0x7f0000002300)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) flistxattr(r2, &(0x7f0000002340)=""/112, 0x70) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000023c0)={{0x6, 0x2c68, 0x12, 0x575, 0x7fffffff, 0xa25d}, 0x3, 0x200, 0x81, 0x4, 0x3, "adfd2b4a195ca5a81874133dc382b1de0a6c6d3ffbeae01904b2fdc76a594ee199ab9ee7eebc8a28894f8c41454d03ae65cf16b0b5a4a955fb3279b3679b76afcbc29f6f396d05f87b96e022421b7386f009d7747274cab061805058f0572323d6ea34686a366e305f7f431a9fe7cd6802f50c0229b4f9b387ba16e6ce8e92c0"}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000024c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000002580)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002540)={&(0x7f0000002500)={0x2c, r5, 0x800, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000002680)={&(0x7f00000025c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002640)={&(0x7f0000002600)={0x28, r5, 0x1, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000015}, 0x0) pivot_root(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000002740)='IPVS\x00') 14:39:47 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r3, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x938d3677d2955515}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000085}, 0x4000001) sendmsg$can_bcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "940e2da48fefad9d"}}, 0x48}}, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000004100)=""/16) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000004140)=0x4) sendmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="c68a758f6397f2ed2f478a29398e2512c0b61ae5fda04c01e82df1bc458105cb43169ef8602a63e02a114b6a8f7718e4dad96e0c702363d491c56d38c1c4dd8100afcada44f63182e2fb39ee4f85ab670e258dac351fe0d856f3453eeb33dc519f9c87ea3ae776db7b31487846fa0c1be2f9e70effb0489d29c201120dd5512ddd388934c1e362d2df64ac2b658d536a056cceca136ea997ed205a348cd418f2baf01f1c69782ebe9448af0ea4c280eafb3bd3c02225066c43c67032f357eb7ac23f86447c7955359e0b4880c05c3e7a36e538b356344ff556c76aa202d10a", 0xdf}, {&(0x7f00000001c0)="32b1da0b87518c5c41e20fbe7d6f6710c2721d98ba3f39bb32cbe0ac965d1d4f3d10455e8c3745569a3a9f71ecefdc8ef4cfde45309d8c173546b46217749f01fb67e8ac061b1798e395659b7d3745f67d396f10f5267f994bb97087f3afc4fd1c8a7ff6136dab0637e10272265dd1589f21fd68cc1bb64b65705d7fe52aab29c474799e22", 0x85}], 0x2, &(0x7f0000000700)=[{0x90, 0x10f, 0x4a, "fa975c3da3b1358083cc85aa12ada57c1af56324d6f74f6ca721ad1a6feb0aba2183ec8e3d9b768ab5268f71901ac4095a467e3ff0047740e01928e776ee3367d43b605336db9753f0bc0995f91a723be32161f402021bccc64157713e4fe3bf094231726ff6f9cc0e1a334d93c21017eee205af002f7fe60b3906a4ff"}, {0x48, 0x19b, 0x308e7fe4, "9dfb4137b3f7f62c269f93ea0f86f59c5329745f3b832c748107a3e3a4cf9ffa9c3ccf5737fc3d1e31eb25a8d462042cc0"}, {0x30, 0x19b, 0x800, "673eefd44f365991042952919b0c4acf290cfbc58fca3f51ece747e803b9"}, {0xb8, 0x10e, 0x100000000, "e1c50ec215c59f0a03d614637b3e69fead067dcb41e1dac26e880e40ad9967a65e191f1ec8e0ee8729910eb8134928215ce5493000eca366e7c82bebfc351d35b5fe3c4fe4e9339c72842fefab1c31b8c46f60281bddafb7919cae2291600c9f027c08192283814a23f5140ff11df31e90fa7310c622dc22951e9a5c8720791f9f1b5ed57ec186d0260934bc54fefef4f7c41b08646c1cc4d75dab94049bcfcbafecbf21ac"}, {0x100, 0x104, 0xffffffff, "6625d86789dc2b3a5f71f51f98c2a6aa673f573ad91e955163a7725909072557b71dd782e0ea56b81d26b4ab1b8af005b2211169a001ef582370bbb4fcccb7ae536662d6fa9881157fa6356500b72f2e7bdb16c648e98de3139787290215f731a7dc2df76f1be1b6a3e76c7afef876aff42a3fecdb36075a5cb9417fc7a0482ca47aa39e14db4d9a8d6173112b39a7fa79fc074799cd075ab14d38896ae160c85e7a73b6ee06bf18f58f7f688d66b39a3d2f85de23b23aec5b43d12ea55de5b7b1b022853417e7a5201a4581b712cb0e8e7b052d324a0e6b5f31952411aeafeaafb9df6730c53fc5c02a81759c6e27"}], 0x2c0}, 0x3}, {{&(0x7f00000004c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000540)="e32db5089771cc0d9daa566bc12eb2f5f33e29506e28bb24445193275865420eca56560915e00f7903540c67cf8febfe0904b2a86134d19eeb99", 0x3a}, {&(0x7f0000000580)="ab28f256413e76e8cc96ecab89dee2b891743836d15e80e5664385c9b36bcf84662147e2574fb190fc9bdcc7893e447afb9c9ad54e4131869dfa9d4649300978d858a5717e3516afe9e3055a9553f03e517c268f416200c036efca699b26ed360bfd87418d6d3c897c8d11c3ef0af2faa7f76460a0bbfac6bffe75a8756a837fc80d0444d0d0ceea65239e10372fd359cbdf3427f3d8ab0519d6b0f6338b1c915a2fe364e9ec09c3506361b24af0192d91ce26", 0xb3}], 0x2, &(0x7f00000009c0)=[{0xe8, 0x1, 0x9, "865f915fa7e1cde3817d8617db228c76785ee46acadea0c6cfba4eeea3bc44b2f2e1a7d1950f9cffce2fae8b4a4e86507c566437068f715f6d81fdd3506100a06c6b5eb7adf5c3d454b86c4602570d852f961c17587b1aa5ffc4f7d14b1d7efe7b7a381f9f7629995904fb94e97025c5d88b8c78ffff2fd2917a5253f9ed3de96004eca24cf760abd1888c52c1b705e405449007f9d8e10b10486bf88401cbb9f0f580aaa26b572849aac3d2de01224ff04c032e2e1ebb65aba45d44b4aa5c84f1f21ea6598be0a8d6fdc659d162b7e94b20103aa8"}, {0x38, 0x117, 0x10001, "fa1f45d3213061446c148772baf742de5da2f7c9107c5641c959a7934568641bdba932c5"}], 0x120}, 0x382}, {{&(0x7f0000000b00)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'hwsim0\x00'}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000b80)="f846e3cef819c9b94dd55169c3a19191814eee042f936f744c74d0fbecea7d4aa1ec87f43c0e4e6ece0356ff252c10c27c7754bdd9216f98be69df4d777cd100450d84b117cbd2947ba1883f2c2d702c5dc8c698c115283fe57c987d2a1b9a56ce550844b2a1f356a806550d794b02f6a6ff9fc2e0a32677ec1bdbb88f2e37e648384ecad7a734168263e4834a652eb77c01eb3c8e8c308d8549d0a6b51194e5867ecf4b61478125cdf3efd6808e8df4f59bbc6745d09b0ca2016b2fc2a4c682b8ddd52358c6ca0e538062e9927bb9021b1024ba55349d8acb8731a32084fafc85af1be61e85dbd36b6034c4009ff8a6091f", 0xf2}], 0x1, &(0x7f0000000c80)=[{0x98, 0x0, 0x5, "e78818e125edb83a38756268cac0d90dbf51e6d1f2e9e8cecabfedd9f2e2c4f284f67b6d58b25592f521bf3d8efd8dbb1069a06dfb9a54c967ac7a76d8dc5eb68cb7a44a5bd63b5f394bba4adf57ab5be69cdee6d4536c65b97650c0537b21d4ff053bfac895c870a0738e6ccc14d48f52a0e640b576c6b07444b7a9a7c178d703b0eb69d3f47a4c"}, {0xe0, 0x106, 0xffffffffffffffe1, "787f3300625ffe8384ce2da69a44408a2119feab0ea932418993e5b55161c5b39a7b130bdd4fda6c30daeb56468eefd1235cc4a8e5707352abbf5a9ae9e66bc3be4f0f1e3953df13265c6d72396d6419077b8ceed621f023b3281a4014c78a7cca8f7ec7e525b61e465131e9c7eda02f890ca5a607707eb0c290478c5008b36cf864e70ea9c9534ce76e75e0f037bc09fe2b035aed7a557eeac6d5d810507c650e4c6389963690d32474857c162d60ef421b4d594e53c0a2ff9d0fa79d726fa08b714122580de3d54edfe2c1b5cc"}, {0x1010, 0xba, 0x5f, "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"}, {0x20, 0x104, 0x9, "e887536e96615c9ead"}, {0x1010, 0x11f, 0x6, "2183355a609ffb031e6cc256962154967f061b2968d4429c27cce92474b230fbcc70856d028c8b8afc8895d5aa61012a4839e96fa404e3fec3c17c536d537aa89b942bf5377898ce9973793aff6cc615ab9e5ec4b531e98b2e83ebbff5f1723b3d9d6ded21c17d90ef7528652bfe7bc52ab51cec70931932419d0065223f564863207662fbcaeddf16a67a7550a4fa6b86977e1b5fcd18d43f7f2aadd6985ceb900afbf4586dbcb3bb143feeee29b984f5591ab96c3d43a3f63d80e52f17d70cb013aa733bbf61c983ab2f7b2ef2287f78743a7f5325e29617f1ce40131f1b58044443d253ff607740f6900be297ae47b9b2d482f99c74f5a6fdafac92ebced084bee195c41ce5e5be8b8b5fc8caa7ae62975c050acee6d07430e51e0226dc408fff6c1d9f55e540dcffbe234df3a1d78729b5a6480939fceba7c0cebdfed4249b3a0761cf16ffab72cc1d9eb031df32165a0d179f1276857ea9ebd2797bdc5d8a0fdbb55f598cc905eaa5cf2038837cd2a4a560591b016bd6b6948f8ef5c35c5a9dcbd706bbd76e59efa68e1567101933cd2380e3dbde5a893df50105948b0e4457647c2b51e2ded4236c169e117557599e63a51c53ce2fbdd8d29f2bb16f890b011c9501271c3ef1de2040b79d3b91a0d8ed4186a5fcc6e2a07cedd15e1391afaba6ec2cfa4dd108e1f7684173db9cfb09f692fe6b977d7dec8ea144353d58b2f6343c7252c718876cc807cc410e35d2cc8ad465df4acb7477e25ef4c31db0fe0ba97f35b7be265fd59a71d2f47d97633bc19ed87973ba9411ae277c0fb4e4dfefdcfa48fa212e06d42f143c546030c248c3e53b6f458579bde804f6ae0f00b64cb56eb69a1594f2410081f4ce125c64a539448aa1f6b495ef0e1982503350ed5811a8ede4a5fdf36c8b3ff190200b95440c70dceab99a30d54314e18f10abae5ec35bf87ba977cd0377f46dcca937ada31b1aae14dc1162c0e26208104db3f4c68c85669ae4bda5e63dfd9da777993e28ee8c291b5a5edbf14443800de69eb2173be90b7484136d5c16cc91ccca99292dc605b945ce8d51338ecd019e5f6ca7f7fe4e00bb1e5292bcda7dcafdba33b1ccb0a079b5f6bd550851f81ea44ebe487c40c693c6a9cd76a3f311511c439625388afca5184ed6182e15ad91ee4c81dba70d149e39f1b3b1241d91be2b576d96b472d697bcf0c82bb580c1ff0a25e4efa4de870120540410041cb1ce9e5d72981251bf3c9c6b89c4d76002a8d00ea25cd0c2d8996fe2d3b354125b0d2328bb79a2fe5ab226e191a5b33b493dc5b4bb459da5db86db952b674e74f345c0c22606bb75626d6e002820b9d5f1704929334689587b733bdde1fb0790039a8b8d1f589a27e5a06705bb733976ccf36104d2360afff5470089b34d818059aa90271a6cd6971fc5e9ce0e50625d1b611dda0ef18ea9f2569c24a3b1be492ddf76f5b80b0a9c1aa2ceeadc2a645c062f3986c634ce61b1c896f3e79b754908965a35ee9736bec76b908d8b6ef391c46f65aef241cb24b7f6f2ea56b70f9757216c8a478bd23a0c7f35b66e9f40c561c7fb830964cbf0e4295ed47834f3bd4d020d3ff7b0797843674bebc87cf3631074ec4f5b7d41928777fbc3cb5e5f4932f6256772dd1d6f9b510d2a76e4627b8f6bc10707aa559d4755d355e865d4c8779e9df677040882e04bcc600fe84f526ba255c17873bb292cfd8303f269203bc9bf82a68dd87fcde21c6aef73d10a211354cddb7b776a4215ca4565f928ff79675c146d9a16437bdcdf019bb989909661e9ba3cd57830318f9a6e609c11c857cae70a5488b10da8580633ad86639320523d2c2aea7f979002b5878b90c26862faada6d2c5ee235b8bcc23f4cfd9dfb8c9167df8e805d220c93befa3fae884c0239139ffd71f08d1ddfcc4803b8946dd98f580d9313e8a203ac79e88482a7abd905f812f35d5146c6a9a201c298085ecdcf150cb8874f03f0c0a1019626c6f04b52db7827493083e37a0c6d1dcfa740dda2043a74319ea320dd442c1db9a01f33abbc22f9ebb1d2c3403459b809ee695c782c381e51be3908401a0d0711405012009ffc7598bc57b66c9690dc8caca23e39ace24025d9b586752fe3da3c7e4662e367c89551e76c5f43cacd60aad6349b62d11cfb337bc1f02b7742d0207fe84dc22abe14290ee929ffe9b978155e6bac714113e9b1109881c93e315a98ef497baddcb4c8284a67d306aba43ffca3834565bb17909d0ee18a28b56d642515a39635a3d9765be9df1e5b30afdf45d469f21406c47f065c9fa287a206731f9d373bc0fea39e43cdba5c308b27bb2ad8680edcae647630337c635018e08b89fca8e8236273f62bf32b7aa9c979c8855fd34741adbaac440b8c0342a8a1c89ec91cb2e47ab8b331554f6b1428ab1611c6063ba363ecc946aac025593d8bdcf745b3398d5c1ba325f9326f8d0ec694c657716750c585b459b1d4df2618d346c2713fc190902410220cd36a9747c7521054373d1f03e8434abbbbe1ac891943cde75dbe7532488d4bbba9c6ace1883155259692631e42455fdb91b9022028e00a191b0794abb9e171bdfeca5868257e6b4af07eb88b947c4edc7bc4876cfb36bff43a0906ac84b904d4bcaf7a4260f60d2e7bb221e96120f95ef2d8c5414a70fbdb411872c95f4f8fd0e21015b28a7cbc51926b1e939d5b87bccde5a4a94423d1b10812d949dab36865ec29258f55de1975794a4ff2f0f4535dffcf3993f92840c1520c5ad1ab3c9cd1195bdf9abc5a6cfca29c1af20ddcabd368ebe50cad3dbdcdaf0c23c6573a2a9d6179c75af023e55603725e9a04a2f239e9f3109ea4ed5bc692d432d8fcdee4ed955edb833692ee034ee1d5db1455bec52da0aec36581023f97d2e9420dc4051d7f0c16063113322743c5daad50aa3b74c3e9d0a9f89981b537a7326f93eaf1b781fe4f92fca58cbc4744a486ebefcb273463ea4c3261eca1ade3e68110e653bb2bcf8f44dda60cf48f9cda13a7b824c6c4d826cd129175e57c3decd00d8a3fe288f2b27eb95fdf6777c25986b310602862ab5e571d135bf5cd4037c35bc5a5ff8fd48148d940c764f66dcdf0da67c249f014ee82e37ae3cd1baeee29695cee227c4affd9734f0cbac376131f50a1993c83910dd61dcbf7a428638ace9041aa562f99771cb7d81625cc7baa884c977da6f0b182b7e67a109e3e26e4d28030962db483cc8a572a3d3f0de481fd7540da60e0d8077d5bc56bfac6335c8e8e45bafe3041c959e97757087b4b36d61b447ec532d83991e33858e560c121e65086937de450f8a74ecef0f31c987cc813ed9cd686b81712d9bf16cc7de7e4c8971dfc9e81dbbba19e52b613eebcf7cec45b921f9cd85898989b8d6aa2f4df1290e373ce8d71c9af0e67b71c87df5c3f155d65c19b8b12eb6ec368ea6f1c6e137824de5ee2bb1373c5786e5c7485cbdc4faa9221b417318c8f9934f16e0d0a52a9df3c8ee96a574f88f0a96f8f3d984f5a62abe0fb319c3a5a7f1a5dc3363f726ee0827b5c99538852ca1d8a0f3707281a180e683bc442bb3099891e38a5b5854ba50d69c02630e8960fff99d88e29e5c6e39e85ecee27b5b2a7eb9f4b68b62d2a1211f3ccb072b3c7c8b20e96d1356a6b3a2923da255e76979734f6149f018e1035d1d04f0a3329b5d88e6c67cf5b369952b07d70f4ef9d849a8583d75f717996f8db2235524b4db5c7c265be43b2f91e45e32a4f30af113290925df6d80ef592c979112ba2ee89bbcac2c1307da23fbcdc6847b86e2bb248802cfec3ba3ee01a1704f7cfeb1e1f80eb7fb03f039359f3435c02c2dcf745d5a22a0c405b16ecc2a355cdf1435c1f229c8db49e3820a20ace960167002779d10ed6159d6c1d95d98a5524d3bdb0458a29d682102cbce292cf08e526aae060abaecfeaca470a62fdb0179e4ccd1d2c0c080e8f7c06969fed0deefd8eaea9246379cd0b48b6a79332a5060ad0dcc7ab04bf52af056e7816dec35e9594ca96808fcf7cda72219fc5bc059048cd5132164eadcd0171cf174e258ddcd291d1b219a3d666cc934c91eb772f7065013d8f36b7c1d99378594cf6ba7169bc0a3cdfa70321c288a90ad2414ed934136c088a888889a90d992dae1a4a019eabe95544c1c214b03392526402b6404a5c98b1056a7139833987308252dda6ed9bafd6fdf7dea7b7fd9813cc3a67efd1edee7e8e85989bc608c93819eb3854b2e2a649ebf4babff730b96d5ac1958e9d237320bf25e1981b5df4e99b32e33f5be0bff6991f08f304359e7e303517611dfb903a2ea5e90a0b347096134a0d9fe1dba58e599cb531097c9c8659407f298cd857e5fe32150cd94c38d0f5f1f5de96014c6d17121a1f0d15e544e0e6f7513ebb2ee852e94a9d497c017949a9edca7ddc1d001c72afd7bc05b7374462f322f7acf8c2ba581993603f4abd2258cf05b55d5328f331dea36124fc2e867718cc75367c7cf0a76fb5206959de754d8b67fd1e38ca8f122fbd7fcd9caabbbe501be1edb61c8f0aaa507117f2ed88fd5566cdbb41784e9a04f6cd5a98f8aa294ba8c922edfb24b3cf910d66415b1cea704b0a211e8d8fb1263af9ccd0c82dbcb4b175de8584d397bf8d8127ae6b9d079e0dc655919ed2f7a60e86df1833d9b549f8272bdbce062a0a88a3433931c833786373d0c89770045803064b9f8772d5ed535dd31f019d8c3942f597a4bd38641f153ae3e88f5fdf30fb2276a85666df7c4b0369cf0cb2a14bf0911d42a23773a5f03665561f48fe981a8813c31bdc3769f558baa93a3c187aae67380c5dc73160d210765ba1f71dc1d6aea8f5e240650dd510863a2ad3f7f1314276837435553a67620a0102fd7066dc8fa28ae99431431bb0ba6f7ad0ddcfeccef18cb3f8d14c3cfe73bf782622d1011d146484d8f02cd5dbcee8d0bf066bde8a35b3d5ff54aab564d36fcd9227d58229a671139c5bb3b46e7639a906083adf3892ea8ee267ce435d5f33da5695ac7fb1137a127e5357e85a6f06a6f9542129380e1f9a86a75c3783d6f2d9c5e4c1b2764b57056c30235a41524f471d18a02e1bcf73b962bb3aa035f41d0af6583c2073bf050f7ecde2bc38ae1497b531675c49276043895a0ed83bb350681bcba450262f9b72d74ed4c3ebd69f84b531f8935ef8a9e655e9c74bd10e38f2d6f149841af3be659e466afdba785c49d41c2aab12e779fbe4464393e66cf3514cfe06fe5737bb745b3ca6791280f253fc481db058911bd49371fbc0e7cdca7bed80a57bf27628d116ec0443d9e74679c03fc6314067c196ed97f5d2233ef7ec029da9ccf386643a4d08211ffbd1405064f1dd05eb8384e65117b3a0d2a740b8cb35c5ba9cd53da63d4283a031136bb2e4f0f62d87a401030fd3ca1593abe75540fe5aee83c106c9b3d240255a71c2278d8575df18b79663efdc8b3d7b6fdfdef8434399eafc97a166176cb08ecb88e092b5d5cd58221aa2071cdbb901da4cf78f5b3fee3b516b3a08c34225f417816682164457936f6163b64fa248a4b46e1f991d34feeeee702cbc433d252ef00fd67f00444f2bcfa0e6c9ad5b95e19307bc1915075d21cb3de0cb6091470db569a5f288ee981b99d9f2e7f12cecde78904b42946295c41bacf80c0d77547b80f7f694683f0cb3fec3f01287ce24ba35893d97920664ea365a11fbfb7d16686d59cbd403defc4386faa98f876f8329fce44dd0cbde6ca8767d1917a433645b321211868b2284ac29993687897f721"}, {0x1010, 0x13d, 0x100000001, "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"}, {0xc8, 0x1ff, 0x400, "12f93066a6e170d117353323a5b79ecab6f1f518cc04e24c6fee9e28ff246b7a17d7efd8196e29842d90c559a6451a66f2202600e0ac1dd7d37f66e44c144652b56856ce3b3cda4e3df46ced25fa9410c887966fc04678665718f636689b8466c0579c2ad5043fd3d2899ed41eea5c6830c3656d3ac659ecf7580b6ad2b5300dacf0b0010d98659085b1bbc5908e1f08243cf062f18643456ee33db3474c23d8428d1b1ae019267172dc1bee8fc3f557efd68e157cd9ceb5"}, {0x70, 0x0, 0x1, "0b366678eac7aeaa5623b769537bef2feddb9c7a9714de40306f6b08ee39ba37f64feaa618634e7512ae8745e154273cba14639b0a568b34863ddc618d33e6c634e11dfe56b60b05afde959c3000bbb6370c6ccb6c5c51491d7908408ff6"}, {0x48, 0x110, 0xfffffffffffffff9, "ede0bd96e2198cc6449e23d58307198313381d9ff2707078259980c8e133fbd797d3008f34d00198ad34d156dbde1dea9a"}], 0x3348}, 0x8}], 0x3, 0x0) close(r0) modify_ldt$write(0x1, &(0x7f00000040c0)={0x143, 0x100000, 0xffffffffffffffff, 0x5, 0x707c, 0xe9, 0x200000, 0x5, 0xa45, 0x800}, 0x10) 14:39:48 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000580)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x28f1, 0x5, 0x7, 0x1000000000000001, 0x4, 0x0, 0x4}) [ 1413.405711][ T3429] ion_buffer_destroy: buffer still mapped in the kernel 14:39:48 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x81, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2000002, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) [ 1413.703259][T16531] device team0 entered promiscuous mode [ 1413.736135][T16531] device team_slave_0 entered promiscuous mode [ 1413.773421][T16531] device team_slave_1 entered promiscuous mode 14:39:48 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x202) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x1, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000080)={r2, @in={{0x2, 0x4e23, @multicast1}}, 0x20000, 0x7, 0x200, 0x4, 0x20}, &(0x7f0000000180)=0x98) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000003c0)=""/139) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f00000001c0)) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x81}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000005, 0x10, r1, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='cgroup.max.depth\x00', 0x2, 0x0) [ 1413.821995][T16531] 8021q: adding VLAN 0 to HW filter on device team0 [ 1413.858523][T16744] device team0 entered promiscuous mode [ 1413.871396][T16744] device team_slave_0 entered promiscuous mode [ 1413.922747][T16744] device team_slave_1 entered promiscuous mode 14:39:48 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1413.974305][T16744] 8021q: adding VLAN 0 to HW filter on device team0 14:39:48 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)=0x7fffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:48 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1414.208377][T17260] device team0 left promiscuous mode [ 1414.214197][T17260] device team_slave_0 left promiscuous mode [ 1414.246390][T17260] device team_slave_1 left promiscuous mode 14:39:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00ff00000000000000001e0000003f000000000000000000000000"], 0x1c}}, 0x0) close(0xffffffffffffffff) unshare(0x40000000) [ 1414.296346][T17296] device team0 left promiscuous mode [ 1414.301756][T17296] device team_slave_0 left promiscuous mode [ 1414.346758][T17296] device team_slave_1 left promiscuous mode 14:39:49 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x5, 0x2, 0x3, 0x3}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000240)={{0x3, 0x1, 0x8001, 0x3, 0x3}, 0x74, 0x6, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x5, 0x20, 0x1}) [ 1414.843094][T17362] device team0 entered promiscuous mode [ 1414.885629][T17362] device team_slave_0 entered promiscuous mode [ 1414.912572][T17362] device team_slave_1 entered promiscuous mode [ 1414.930668][T17362] 8021q: adding VLAN 0 to HW filter on device team0 [ 1414.943404][T17375] device team0 left promiscuous mode [ 1414.953564][T17375] device team_slave_0 left promiscuous mode [ 1414.968404][T17375] device team_slave_1 left promiscuous mode 14:39:49 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1414.997444][T17378] IPVS: ftp: loaded support on port[0] = 21 14:39:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) get_mempolicy(0x0, &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) r1 = socket(0x11, 0x802, 0x0) r2 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180)}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) [ 1415.452759][T17482] device team0 entered promiscuous mode [ 1415.465895][T17482] device team_slave_0 entered promiscuous mode [ 1415.509418][T17482] device team_slave_1 entered promiscuous mode [ 1415.519778][T17482] 8021q: adding VLAN 0 to HW filter on device team0 [ 1415.533999][T17589] device team0 left promiscuous mode [ 1415.539368][T17589] device team_slave_0 left promiscuous mode [ 1415.547439][T17589] device team_slave_1 left promiscuous mode 14:39:50 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000010c0)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) sendto$packet(r0, &(0x7f00000000c0)="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", 0x1000, 0x4000000, &(0x7f0000001200)={0x11, 0xfd, r1, 0x1, 0x8, 0x6, @dev={[], 0x15}}, 0x14) getpeername$tipc(r0, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:50 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1415.938273][T17591] device team0 left promiscuous mode [ 1415.943862][T17591] device team_slave_0 left promiscuous mode [ 1415.950157][T17591] device team_slave_1 left promiscuous mode 14:39:50 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1416.165019][T17617] device team0 entered promiscuous mode [ 1416.170898][T17617] device team_slave_0 entered promiscuous mode [ 1416.185622][T17617] device team_slave_1 entered promiscuous mode [ 1416.197416][T17617] 8021q: adding VLAN 0 to HW filter on device team0 [ 1416.256170][T17762] device team0 left promiscuous mode [ 1416.284311][T17762] device team_slave_0 left promiscuous mode 14:39:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b060501ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1416.328387][T17762] device team_slave_1 left promiscuous mode [ 1416.332183][ C1] net_ratelimit: 22 callbacks suppressed [ 1416.332191][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1416.335830][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1416.341373][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1416.347134][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1416.431951][T17904] device team0 left promiscuous mode 14:39:51 executing program 5: r0 = socket(0x11, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001180)={0x70, 0x0, &(0x7f0000000100)=[@free_buffer={0x40086303, r2}, @register_looper, @reply={0x40406301, {0x1, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x38, 0x28, &(0x7f0000000080)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x1}, @fda={0x66646185, 0x0, 0x4, 0x20}], &(0x7f00000000c0)=[0x38, 0x30, 0x18, 0x0, 0x78]}}, @decrefs={0x40046307, 0x2}, @exit_looper, @clear_death={0x400c630f, 0x0, 0x2}], 0x1000, 0x0, &(0x7f0000000180)="6918b4e8dbbef44067a5fc6f80a54686d3acab09c22c18c6a8548a7e3c1a5830a168c2558bd7c0c981939e607a8385825bb5dc9fd7f15baa1b15f088f6b0acebf5fcac6311320ef97c6012c8cb40b8798dc26f29910162b31a3ff99d4c9a9762a2a3e0fae2f78933f4f55585b1b316a774fcbee9d2591a01363f202b227e93de643114575b78eb82ac492fabad205083abfabbe71568685b47cb60f335aa8744c0e65f21bdcd907c5064c694c5e6629bf7a02824587fd54bb8063aa809bcce5314bd67533377f6ae88027ddd064ec7d71f86347373763ba6e3a95cd982bfcc03092e7012a063939c20a1664b589f1c93c573f3b9c9b89a1fa5af9918aa1d7e6e52b3d21f89e3a50511e930e6e6f042c27d1a515672607cb8f489ec0cc1a644f42b2d142a62383c935ca140a03ff2ceaa319f53250189ecfa9bd59c5951c54e6ec23a2e405bf340133c2b168ed1ebd95a04356f4dc9ab03d5bd4b80e877336df3c64330d2a41a66a9e0c978d885a05d4ce721996ec2f984b74088d141f6df7a69fb5cb11c998f554335cb2caeebb52026ed67a906a747b99e1effccb4172d9080673b3f03e8105f8623cb83e4868e372db17b037c783e6886952d56ed38b4ecf70a6f1cbf27ff5a99d3aeaa531488aebae1e42fa61c0515b8751b80219393494124169cee831278359946193176d305c4a9c3fe357f3e82a39873e30255ce311afd5b328998c7abc522f69e83143dba247553e2eea517e1388ba0e9f0397fa4618e56f01ee9ba1a43338e9a6437a620320e1ea9c2ef1c77362463710b67f41a6bf6f1e23243381c50321068580ae81c315611de46336e1882687b507d2a27ab4373b81e4b0bbdeb6a7ab9ba018dbdb9419f714df3ffbde00efd6a48b4f3ddd0feb4aa76254683c3054bdee84cc47c62d61fd7fb880ef53970582554235e98a016229acbbb38b64135ff31c797f5d0a61e43d765d0054ac379c51c69d07f1ef1dad19275e67301715c7cebb207a04e5b60f3c959ee19420190d8f3dacdd2a76712ebf63c8b1f0888c101a4c62e42e317f43be0fdb157ec6ec000f9394edbfe18c5ab09e4bb0210bbd2075f07a8e9b76a29ba25808b096e1263cb5c9fa740e390cee1dda615669cc56a3a097ef03f0056c4e8c3c964952460fdec8f671d2304aa2a607f31492582b997d78aafcaaa8488dfdfe9aaabebde58c100cc29127589566ee529316829d8732a6b9862366e6de9295ec40f90ab8875e0f467c57ca7d2b2e56eb39baf2b3b503db03e0a87a7c288029d07cf77ae327d5edbe838391113ea24104d18567c4e09769c6eb4250e38f2a44b92e794663b8bff8180193fca62c36c6173aa0aea6bf3a3423ef5ee70dc6ad9fb6b0038dff8b9b1e54e2ca9e71ab856bca4e6f37e6e85365c05a2c582f2ce557995fde4d2d8a7a6c1ce59de5bd3637f2f7ae3e5c2b773918b84debfdd132cc940af855cfa6b9651ff5d4c405dd6af7598d6e5a88b6407e61176b0b330ee9d72b31084c31b7b543b85bb2b118388427bda84b14d760d59f94306c1def028c954ed5eb4b088a725520bbb8d0499dc9e853b1173427296a37ab89e4f3e5030adccc1c717d77f0b11ffcb55899bb613ce787f4ee3f84ac5cca86e8ecbfd23c804c00417758acca27275a02249727bc22d7ef4803a13b0cb83af6f434042222e454136ee944bc495d172f2edecde4cb97c655d6addf35151a606b93b82a6fd84a362deaf67a9c7cb7af10d8af3e8cc41da1e83719146bba2fd0490ce9af12549f0d72eb72df4e8b7dfde5bb028015e2209f0ef4450359a140ea7d789654eaf02f1a657944be830853139adf4555ddecfedfd5bb695f95e6bc7133db264ec8fb836a33ef2c5feea8cf5e0d9ec44825b98018969f09ca3cba33c56e04ce96ef49b7c7e5bd836093ae4ce5af37c549ddc08ed745dd11ab7c044792cb1136477bc030659abbc9c7cb085f96fd758469021e1fe8faa68dd7e7345764b094945c89c0dd7b63b48b2781daac2b938d6acef02cef2654035619a0c863a49004fecf3f704a20c679e2c25f1098d837b9956b6cb799c2a6a6757bd2337bf3d0a54245b4b36e3da2a6dfb887cc7329a6d7fb82979af6a1116795e92e518082a2f18129baa5444782652e93f793801d9edc807ab04106e0125460eaa43f22e7c4c10d5373950c75582d7d9b67125148f27f1c830b1726f531a019e365323287377a3e3c63948a8e8695cef75f1171dad61695c4b07470ff34825e5436d70c251e67cb2c67529ed7b1e66d46e7c734afe24392b4541581aacf93ebef8c0ad7559dfd13c32b008d22e23e22e142257967989fe53c14d6c789f30906427e1b86b0be6880c777ebe54b2a02e2bf8f9c780fc06345ac950de88b23bed96298676a406bffab49d17cb22e0c3f4e5e94232d846058e5486d0968add1ddbe09fbb95844521cbd7a7e679465ef2823fd6c934378a9294efda6e1aaf62280d66454e4870a129397cdbf27d706e298c042b35578da94c788a8d5dd8d338f860669a0bfce8711c2d0a2ad94a51a5f0b991d23f1464206a39ee22f1b6b625bf60cb2a08182bcdcba997c5b554d54d0281aa6601cd1436fe6b8baf0814672b5afaa3ab17ef1cad7bfc5a8195f81f3dab7619cefb4d4e1e010e7d10e97e1adcc06f9c6e838a1a22878a88da4733ff71414427ee7df1e6234e342f1a019d052de5b9dc8c80ea6bd32cedeae27a840fb791f58e4fb3d69845f72a0a680f7f47bda23cd2f79c361e6048f0a24f64cd5de48a71f7d00d54d19782149790a605407fb2deaba62ebb5e8a5969051189d6ef3599b9579124b4055b9e675bf988e509f0c7cf00b21c3f8040d3d85d8be846d0ebabdb8583f01001a977d6287faae5e2b0a38a2611b170a18ef9396c8292ffe43ad7248558a3987f640b73e3d6a47675bc0d4777b50aff516f748e943a59d490e093bae847f23ab2994d84d310741f66ecc76114907e0af8434e110636044c8c8d7e443a1de419c8097583a75f9204f94483b9205cc029c99b2ed745b760b1d39db499250d93981a42134fbb394db7861a72df7a7a12a6655ec632fa6963aa866f8ad52ecea49d97cc3c8839f12a897757dc7638fcbf76287ec1a9f17f92fcfb662477ab4e6ae634429a7435e4a77f795623486ab87d83aeb069bf46489978336462e0f2cefdc435e888ad2b537d027520c5fee1394990bfebe3aadedab8dc97aa1ff2c8fa7a9c3b87752ea1ad6a70f80cd942040cfa9516c0a32c733f4bccc5a6a4887468438ab6a61c4ebf3c181cdd0215b8c340ee27dda12fe31aca50ead5673f4c1e40e94189e403646903540837b9edf900369063dcdcd2c960c58ee58d8f78cc8c49e70bb444bcd99e630fd78584eee5de451acc8be53780ad81aae3a9e9fe158b6071254934d41dfa376d17d692fd7fc42e25bf66e6ebab14718e2305899c1d457b4826dd64c952e2027dcad5e06a2d8046bdc04a12c8970acee94ac622cef64433490d942a8d3fbadbfeacd9bbd5c0e52fd98509bbcd224f7d17a7f0ba9a4a37e8aa64a6fde499d948e69fa6191d3f6d72b8699761d67390a5d88cba0615544d9510e2d5b716ee13ee5a009a3ae6f2ea643098fd8477177e067ac755837ed0121261cb2d99d43bbd1a448b4b7784502fa224a2141010225f4913085177bc6d49e8f5f3837c098bdca3af59db9c3740ff3a7f6a825dbc60f0514925f3e395737df047910c53b3fa490aab7195311a9fdd3dba899aae7e285c3163f3125ca9733d82dd993196591a5652f81fa0b73175ca965fc294bec36957530bfdf76a4de6c7b669d858b36abfbc8990f40fcdebb0adc486406a2c76cf89e64f0a585424a44a656086c9c09670f69cd3e38f4adcef53055d13a9c302d3f61a8cd14a8d54fbce79c7f4c71c0b885c9d359ec1639a14c5498f10c26d2fdf023cf26c0e30ee4c0d11105035d4e90f65bb2e50e4967d4e500c0b38619761086ea5ea5566beb29241554b64db97f8adfb2685f41d78cce88990950f7c96581b84569278efae58771e2d67598a9dbd3c76dc4c882817759da79378b4df6726e86594804603fb8fff3a79d7bbf2f78b5e0e5ac24231cc25997f78855e52b080263a94d6701839ba8f0821c7702fb7fc3e65744d40f528146db42ba9bb3b607974e4a63cce87df0350b6b4d8e9a798232c6cac5b43b6e5634d1d571945b52b7dcb854a6e1e84889977fa95d03a852706153398bed48e463902ea6432eb6c004043f2a1807ccd8d5f6750c42aa7477de0fc0a64316364470d182af4392edab3c71ff9eac03a285d81e0900d706c758bc011e18007c74c785d6f93cad15b62fe6cf4de4f05f572b28dc1829a1a9f62efd61be36c51c3103c7f98c11bda5420a9ba472a13cd76aeb8c303d133f43c0d613032636af538920dedc6ead696ffba61114ee14e69068f3e6cc232b7764e6cf65639d6c0941a81eaed7a636a12d43f690f0964892217c5af9d38ace044b2f827eb3d407f1f22e89d8ae9322cc4dc8040d95b88787c9eb7b1965e55a91f2d3744ec55189400186abf20028a351e5a4663f9137eb5d14f264c58e03e64e926996825c6d530bc04509f2777b5b41e6ae8034f6246968cd13038b97684c7fe6381c51b9795ebc02034ff0229fdaf87be650ae63850166129cdb12ed4cf93cd92e1457283a98adfd007130e2ea4174edb99eb5b4af8318a5f1c711da8d4f3519b1bf86f6390b132943f4ea1e0c6dfadc46264c3cd356f3e9c5165374d11890fa2712b3116e55fb18ed948cc884d6044b6a93d40326f55d60469805afad8fb26cbd4a4717609109e4d9d0c8cbccf3defd8e5cdfec4dfc115fbd8337c2ecfafcfee6b38160b2fe97d4090919826c841f0c04951426f94d3f80fd14114a81699864f7a3e7d5037d401a4b62c4f3ef1ce5efe945e2c52ea98da0413fabe5b7c61f11152d2c1076e41f8031c4ce6d858c3c33cd6198f605aaca1d43e0a2e2f997d254e21e542b4d693d682fa45a56da22e8339c4fa3a003ed2b94800374fb8ddd5992e57883753e4ac59180e31fe4b2ce9d882bd5e11f7ce18a96358a18b08c47451d3029f008ee3b70519a55574070d06debd9b5c3c6104102e00219eb6f1a4f186f4414361ce3167d3a2e35e7e61424bb7ea55384b2b00a59adaec5a295d95bdcdb9426a4f22b2771d237cc7efedc5a95689ca40994fc60e0511002ace0f56eadd52c7bbe8e1313085263758cb3e4aaa03ef972580411efc5f2cf853956a5abc7dfd217a84a5d9890c8a1dbf08ff7eac9941b08c8c5e9fa1db90e322ef81f5681ccaf4ea9803127fb25cee007422c58e35307a61db26919059bdb3b98492b99c76bb63c157d0e07acf8971c8f3605c5d5aa58ffb40ca2c53328e3490a3fb17c15cba7eb05052943eea2407213ad9eefc30df92509cb509b5fb7f6466123db0160f72ebe325e6278a1cf9027f1941bde2de3ad7510146256f8936515fccf9ce0b696083b7f3d24cc53162ff24c8b4a12cb0ecff287bb1e49391a15412334df50fdd9930c7bcf4b6df75a2edfa89cd74e49966a59db448533dd63994996fc4e01745728239a32901f9a24560a20b95ef04ae3fb68a891e5170cdd68b6fa6ddc8594c741bc93c65a1d08b3975c4dbe2ca9f73273b61acf3fbb08d750b78b9e0faa5776de62103956f3eee789d70dfbfbfe5400298f2af77c4277a8b906b2f44d1957ca169916c0b0f0fd0e94f4be04cd3a95dc00ca531eca3d88aa0cb867009fae3acd5e40c4c789e2df8e8ba83"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:39:51 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1416.472799][T17907] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1416.502354][T17904] device team_slave_0 left promiscuous mode [ 1416.535709][T17904] device team_slave_1 left promiscuous mode 14:39:51 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1417.266199][T17909] device team0 entered promiscuous mode [ 1417.285413][T17909] device team_slave_0 entered promiscuous mode [ 1417.292181][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.298023][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1417.318950][T17909] device team_slave_1 entered promiscuous mode [ 1417.340343][T17909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1417.367479][T17928] device team0 entered promiscuous mode [ 1417.401873][T17928] device team_slave_0 entered promiscuous mode [ 1417.409484][T17928] device team_slave_1 entered promiscuous mode [ 1417.420513][T17928] 8021q: adding VLAN 0 to HW filter on device team0 [ 1417.432350][T18122] device team0 left promiscuous mode [ 1417.450343][T18122] device team_slave_0 left promiscuous mode [ 1417.460553][T18122] device team_slave_1 left promiscuous mode [ 1417.693226][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.699289][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1417.705830][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.711819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1421.453164][ C0] net_ratelimit: 18 callbacks suppressed [ 1421.453190][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1421.465388][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1421.852207][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1421.858096][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1421.863956][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1421.869715][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1422.012910][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1422.019146][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1422.572232][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1422.572589][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/90, &(0x7f0000000000)=0x5a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000280)={@dev, 0x0, 0x1, 0x0, 0xc}, 0x20) socket$inet6(0xa, 0x0, 0x9) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r2, 0x0) 14:39:57 executing program 5: openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x81, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$inet_sctp(0x2, 0x0, 0x84) r2 = dup2(r0, r1) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = socket(0x5, 0x1000000000000803, 0x803) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x3, 0x0) 14:39:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x118) unlink(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x40000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0x3, &(0x7f0000000200)='):\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r1, 0x0, 0xc, &(0x7f0000000140)='/dev/amidi#\x00', r4}, 0x30) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000280)="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", 0x189, 0xfffffffffffffffd) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f00000004c0)=0x7fffffff, 0x4) 14:39:57 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:57 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:57 executing program 1: socket$inet6(0xa, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040)=0x100, 0x4) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, 0x0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 1422.907877][T18131] PKCS8: Unsupported PKCS#8 version [ 1422.916363][T18140] device team0 left promiscuous mode [ 1422.923968][T18140] device team_slave_0 left promiscuous mode 14:39:57 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x400, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) [ 1422.988622][T18140] device team_slave_1 left promiscuous mode 14:39:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)=0x8) mount(0x0, &(0x7f0000000040)='./file0/bus\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0/bus\x00', 0x4040, 0x0) truncate(&(0x7f0000000000)='./file0/bus\x00', 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x10000, 0x0) open(&(0x7f0000000240)='./file0/bus\x00', 0x3, 0x0) chroot(&(0x7f0000000140)='./file0\x00') 14:39:57 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:39:57 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x6, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) socketpair(0x9, 0xa, 0x4, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000340)={0x2, 0x70, 0x8, 0x7fffffff, 0x5, 0x9, 0x0, 0x5, 0x54128, 0x3, 0x3, 0x0, 0x0, 0xc9, 0x400, 0x80, 0x3, 0x3fd1, 0x7, 0x1, 0xd9d, 0x1, 0x100000001, 0x200, 0xdce, 0x400000000000, 0x8, 0x8, 0x8, 0x81, 0xdd7c, 0x7, 0x6, 0x2, 0x0, 0xdbc6, 0x3f, 0x9, 0x0, 0xa7, 0x4, @perf_config_ext={0x7fffffff, 0x6}, 0x0, 0x2, 0xffff, 0x8, 0x3, 0x8, 0x511a}) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x7, 0x400000) r2 = dup(r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100030}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="02000000", @ANYRES16=r3, @ANYBLOB="090027bd7000ffdbdf25050000006c000300080007004e22000014000200626f6e64300000000000000000000000080007004e230000080007004e23000008000500ac1414bb080008000200000008000500ac141420080008000100000008000500ffffffff14000600000000000000000000000000000000000800060020000000080004007408000024000100080006007368000008000800f9ffffff0800060077727200080008000600000008000600030000002800010008000800ff010000080001000200000008000600727200000c0006006e6f6e650000000048000200080002004e240000080004000200000008000b000a00000008000900ff030000140001000000000000000000000000000000000008000300000000000800030002000000"], 0x12c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004000) 14:39:58 executing program 2: r0 = memfd_create(&(0x7f0000000140)='md5sumbdev.vmnet1lo\x00', 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0xfffffffffffffea1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0/../file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f00000000c0)='./file0/../file0\x00', 0x0) 14:39:58 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket(0xa, 0x1, 0x0) getpeername$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000180), 0x4) 14:39:58 executing program 1: socket$inet6(0xa, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040)=0x100, 0x4) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, 0x0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 14:39:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) socket$inet(0x2, 0x3, 0x2) [ 1423.869356][T18209] device team0 entered promiscuous mode [ 1423.881221][T18209] device team_slave_0 entered promiscuous mode 14:39:58 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\xd0\x8c\"\xb4xD\xd2E\xaf\xb6`RY\xe2\x88\xd4Bpc\x91\xa6\x91\x82&1Y:\xeb\b\xb7\xf5&\x05J\"NY\x9bp\x16Oi\xe9\xc3\x8e\x83\xf4\xb6z\xcb\xd9\xa2t2\xcb\xb7Jvb\x1e\xcf\x9e\xe8a%+\xa6\xf0_~\x90*?wc\xa1N\xf3\xdc\xcad\xec\x98\xc4\xda\x01\x00\x95\xc0\xdf$\xdd\x817$0\x8e\xa9\xcf\x1f\x16\x9a\xea\x87\x01\xf04\x1e\x90\a|u\xea\x90%\xe1P\xcb\x95\xc9\xd1\xbfn\xae[\x1d\xa8\xba\xce\xe98\xa5\xd0\x89\x1c\xd2)\xb0\xf4\xb1\xb9F\x8a\xee\xd8`\x8aH\xefKL\x14\xe8\xf9\xa0#L8\x14P\xbc(xH\xfa\xe52\xe7\xc0\xed8', 0x2) fcntl$addseals(r0, 0x409, 0x8) io_setup(0x1002, &(0x7f0000000040)=0x0) io_submit(r1, 0x1f9, &(0x7f0000000080)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="92", 0x1, 0x9, 0x0, 0xfffffffffffffffe, 0xffffffffffffff9c}]) r2 = msgget(0x1, 0x307) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000140)=""/93) r3 = socket$l2tp(0x18, 0x1, 0x1) sendmsg(r3, &(0x7f0000001780)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="62c354a5f647778089d3f6f57687317f6cecc7e8273e8d3748e695215f9cb40527771e115896b5579c96fb7806b290eab5c679e1015b7bf57cb67f15dd1610cf02bf6bc82e9040272e1530e09a34bc8aaf110db91989133488afe9460e48a6998494", 0x62}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1268}, 0x10) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPIN\x00', &(0x7f00000002c0)='\xd0\x8c\"\xb4xD\xd2E\xaf\xb6`RY\xe2\x88\xd4Bpc\x91\xa6\x91\x82&1Y:\xeb\b\xb7\xf5&\x05J\"NY\x9bp\x16Oi\xe9\xc3\x8e\x83\xf4\xb6z\xcb\xd9\xa2t2\xcb\xb7Jvb\x1e\xcf\x9e\xe8a%+\xa6\xf0_~\x90*?wc\xa1N\xf3\xdc\xcad\xec\x98\xc4\xda\x01\x00\x95\xc0\xdf$\xdd\x817$0\x8e\xa9\xcf\x1f\x16\x9a\xea\x87\x01\xf04\x1e\x90\a|u\xea\x90%\xe1P\xcb\x95\xc9\xd1\xbfn\xae[\x1d\xa8\xba\xce\xe98\xa5\xd0\x89\x1c\xd2)\xb0\xf4\xb1\xb9F\x8a\xee\xd8`\x8aH\xefKL\x14\xe8\xf9\xa0#L8\x14P\xbc(xH\xfa\xe52\xe7\xc0\xed8', 0xab, 0x1) [ 1423.909836][T18209] device team_slave_1 entered promiscuous mode [ 1423.923651][T18209] 8021q: adding VLAN 0 to HW filter on device team0 [ 1423.931169][T18249] device team0 entered promiscuous mode [ 1423.948818][T18249] device team_slave_0 entered promiscuous mode [ 1423.988047][T18249] device team_slave_1 entered promiscuous mode [ 1424.033878][T18249] 8021q: adding VLAN 0 to HW filter on device team0 [ 1424.083841][T18866] device team0 left promiscuous mode [ 1424.095629][T18866] device team_slave_0 left promiscuous mode 14:39:58 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1424.151083][T18866] device team_slave_1 left promiscuous mode 14:39:58 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000340)='Tem1:vmnet0bdevlouser') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000640)={0x1, 0x0, @pic={0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x8}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000280)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000300)={r4, 0x6}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000140)={{0x3, 0x3, 0x5, 0xfffffffffffffffe, 'syz0\x00', 0x6}, 0x0, 0x1, 0xfffffffffffffff7, r5, 0x3, 0x8, 'syz0\x00', &(0x7f0000000100)=['vmnet0\x00', '/dev/kvm\x00', '/dev/zero\x00'], 0x1a, [], [0x0, 0x40, 0xffffffffffffffe0, 0x10001]}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:39:58 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket(0x1b, 0x3, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000180)={@rand_addr=0x8, @local, r2}, 0xc) 14:39:58 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60d8652b00140600fe0000000000000000000d00000000aafe8000000000000000000200000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 1424.236225][T19087] device team0 left promiscuous mode [ 1424.245969][T19087] device team_slave_0 left promiscuous mode 14:39:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x3f, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:cron_spool_t:s0\x00', 0x22, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', r2}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1300, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000001400090500000000000000000e000000", @ANYRES32=r3, @ANYBLOB="140009001400000000000000000000000000000014000200fe8000000000000000000000000000aa"], 0x40}}, 0x0) [ 1424.288248][T19087] device team_slave_1 left promiscuous mode 14:39:58 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x40, 0x3, {"d3aabf0fa084906c2ae34cf117c2099ef8d95ba1b1a18a43e5a88b568ce1d85f27584b9321"}}, {0x0, "cf2039b77107f54e64ee1d73b6a762dde53820de784d15d1f3d3e9afe3877db2acad4aed8d1b155e07174af06d22218db328d78de9f305f310f511e3226f963eb5bc5beeb7bd10c13634a692e06e0ce0cbe96e1505fa1bf5ba2ce8599437338c71a5f8e760931975cfd507a53932687fc6ae554f3ceddecf369161a4a103ab71527ee515c47a2e66f5b2c3abac9aef7c5ccdf3908e84243ffec70a239b366245121078ac36b0ec7b90f14b3400259ff27570fa218a"}}, &(0x7f0000000240)=""/173, 0xf7, 0xad}, 0x20) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x81, 0x0) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x16a8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7d, &(0x7f00000000c0), 0x14) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getpeername$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000400)={@mcast1, 0x0}, &(0x7f0000000440)=0x14) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000480)={0x0, @multicast2, @multicast1}, &(0x7f00000004c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000500)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) accept4$packet(r4, &(0x7f0000000680)={0x11, 0x0, 0x0}, &(0x7f00000006c0)=0x14, 0x80800) accept$packet(r2, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) getpeername(r4, &(0x7f0000000840)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000008c0)=0x80) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000a80)={@local, @local, 0x0}, &(0x7f0000000ac0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000001c80)={@rand_addr, @multicast1, 0x0}, &(0x7f0000001cc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @broadcast}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001e00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001e40)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001f40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000006600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100884}, 0xc, &(0x7f0000001f80)={&(0x7f0000006040)={0x5b8, r5, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0xb4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x62}}}]}}, {{0x8, 0x1, r9}, {0x260, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x70}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xa4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x1b8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r16}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0xb8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ddb}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}]}, 0x5b8}, 0x1, 0x0, 0x0, 0x1}, 0x44001) socket$inet_dccp(0x2, 0x6, 0x0) close(r1) close(r0) 14:39:59 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1a, 0xffffff84}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 14:39:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x800000000000000) r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$usb(0x0, 0x6, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000000)="24a661a9c917bacadeb6540fc706562781c07f18f0fd3db0c40839a23bbc1d52bfbbff4151defdccd34de696fced7c1b439acd0ca538a310304b8cf9f31b31182bdab9ad7451529a5a179032d084a94a629aa48c18cdc76b2af0db2b86d993ee7c0167504aa9eb08b8c5d0ec1eaf5881a4166555cc1faa6d9c2acc7d85fa56d5e0647f95f8d5de79e7e789bfea59a99d5430", 0x92) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x200000) llistxattr(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xe4, r2, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x43be}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x80c4}, 0x40000) 14:39:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000080)=0x2e5) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x4000) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000040)={0x1, 0x800, [{0x5, 0x0, 0x1}]}) 14:39:59 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x100) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x18000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffffffffffff, 0x2, 0xff, 0xf, 0x5, 0x6}, 0x20) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x64, &(0x7f000055bfe4)=[@in={0x2, 0x0, @remote}], 0x11) 14:39:59 executing program 4: pipe(0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x3, 0x0) sendmsg$nl_crypto(r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0xa040) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x689bf2af, 0x6}, {0x1000, 0x6}, {0x6, 0x2}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x2, 0x1e3, 0xbe, 'queue1\x00', 0x10001}) pipe(0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x4, 0x1}, 0x10) epoll_create1(0x800080000) semctl$IPC_STAT(0x0, 0x0, 0x10, 0x0) [ 1425.073146][T19096] device team0 entered promiscuous mode [ 1425.078942][T19096] device team_slave_0 entered promiscuous mode [ 1425.091643][T19096] device team_slave_1 entered promiscuous mode [ 1425.147954][T19096] 8021q: adding VLAN 0 to HW filter on device team0 [ 1425.166597][T19214] device team0 entered promiscuous mode [ 1425.172991][T19214] device team_slave_0 entered promiscuous mode [ 1425.179489][T19214] device team_slave_1 entered promiscuous mode [ 1425.187764][T19214] 8021q: adding VLAN 0 to HW filter on device team0 14:39:59 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1425.217428][T19926] device team0 left promiscuous mode [ 1425.222871][T19926] device team_slave_0 left promiscuous mode [ 1425.239160][T19926] device team_slave_1 left promiscuous mode [ 1425.261147][T19932] device team0 left promiscuous mode 14:39:59 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:39:59 executing program 2: syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x100, 0x40000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000200)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) getsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0xffffffffffffffc0, &(0x7f0000000180)=0xfffffffffffffcb7) 14:39:59 executing program 4: pipe(0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x3, 0x0) sendmsg$nl_crypto(r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0xa040) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x689bf2af, 0x6}, {0x1000, 0x6}, {0x6, 0x2}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x2, 0x1e3, 0xbe, 'queue1\x00', 0x10001}) pipe(0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x4, 0x1}, 0x10) epoll_create1(0x800080000) semctl$IPC_STAT(0x0, 0x0, 0x10, 0x0) 14:39:59 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x50200, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000080)={0x9, 0x0, 0x1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)) r3 = dup2(r2, r1) io_setup(0x4, &(0x7f0000000100)=0x0) dup2(r3, r2) io_submit(r4, 0x0, &(0x7f0000000180)) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x9) 14:39:59 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = getpgid(0xffffffffffffffff) ptrace$cont(0x20, r1, 0x6, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1425.268361][T19932] device team_slave_0 left promiscuous mode [ 1425.275987][T19932] device team_slave_1 left promiscuous mode 14:40:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) readv(r0, &(0x7f0000000000), 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000300)={0x0, @src_change}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000180)={0xb, @vbi={0x0, 0x4, 0x8, 0x0, [0x6]}}) syz_open_dev$media(0x0, 0x0, 0x44313c24b40f7618) 14:40:00 executing program 1: bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8001, 0x400040) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x0, 0x1, [0x7, 0x0, 0x1e, 0xfff, 0x2, 0x80000001, 0xccf, 0x34f63bde]}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r2 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000000)={0x0, 0xfffffffffffffffd}) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000000), 0x3, 0x7ffffffffffff) 14:40:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x101a00, 0x0) bind$vsock_dgram(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @hyper}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x8001, 0x8000, 0x1, 0xffffffffffff4692, 0x1, 0x10001, 0x9d75, 0x7, 0x73951389, 0x7d93, 0x1000}, 0xb) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, &(0x7f000000d000)}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000400)=0x4, 0x4) 14:40:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000100)={0xffffffff, 0x401, 0x8, {0x0, 0x1c9c380}, 0xffff, 0x2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) [ 1426.205421][T19934] device team0 entered promiscuous mode [ 1426.211008][T19934] device team_slave_0 entered promiscuous mode [ 1426.233861][T19934] device team_slave_1 entered promiscuous mode [ 1426.247929][T19934] 8021q: adding VLAN 0 to HW filter on device team0 14:40:00 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000100)={0x6, {{0xa, 0x4e20, 0x9, @mcast2, 0xca1}}, 0x1, 0x2, [{{0xa, 0x4e23, 0x7, @remote, 0x2}}, {{0xa, 0x4e23, 0x81, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fffffff}}]}, 0x190) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007fafb7a41cb22da280000206000000a843096c37234a39000900350008004b00ca8a9848a3090000006b7b31afdc1338d54400009b84136ef75afb83de441100d42c44e82afc5349fddd4ab94e7162", 0x55}], 0x1}, 0x0) 14:40:00 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="7d932b1538d72bc23b5a1f20fe2906a3", 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) [ 1426.303738][T20121] device team0 entered promiscuous mode [ 1426.309333][T20121] device team_slave_0 entered promiscuous mode [ 1426.396588][T20121] device team_slave_1 entered promiscuous mode [ 1426.433961][T20121] 8021q: adding VLAN 0 to HW filter on device team0 [ 1426.456398][T20473] device team0 left promiscuous mode [ 1426.468232][T20473] device team_slave_0 left promiscuous mode [ 1426.475564][T20473] device team_slave_1 left promiscuous mode 14:40:01 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:01 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) bind$vsock_stream(r0, &(0x7f00000001c0), 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{0x9a2, 0x1, 0x2, 0x3000000000000000}, {0x9, 0x0, 0x3, 0x14}, {0x1, 0x0, 0x0, 0x10001}, {0x6, 0x9626, 0x6, 0x7}, {0x10001, 0x0, 0x2, 0x81}, {0x8d9, 0x8, 0x1, 0xd2}, {0x0, 0xda7d, 0x4, 0xffffffffffff8001}, {0xfffffffffffffffd, 0xd36f, 0x7fff, 0x7f}]}) r1 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x8000001, 0x0, 0x3, 0x3, 0xfb}}) 14:40:01 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:01 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f6fde"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)='/dev/kvm\x00', 0xfffffffffffffffe) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1426.604002][ T26] audit: type=1326 audit(1553438401.188:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20754 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x0 [ 1426.607866][T20697] device team0 left promiscuous mode [ 1426.705995][T20697] device team_slave_0 left promiscuous mode [ 1426.719659][T20697] device team_slave_1 left promiscuous mode [ 1426.732174][ C0] net_ratelimit: 22 callbacks suppressed [ 1426.732183][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1426.732686][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1426.737943][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1426.743954][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:40:01 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="7d932b1538d72bc23b5a1f20fe2906a3", 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 14:40:01 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x80000) r1 = syz_genetlink_get_family_id$team(&(0x7f0000001400)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000001440)={@initdev, @initdev, 0x0}, &(0x7f0000001480)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b80)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003c40)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000003c80)={@loopback, 0x0}, &(0x7f0000003cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003d00)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000003e80)={@multicast2, @broadcast, 0x0}, &(0x7f0000003ec0)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x19, &(0x7f0000003f00)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000003f40)=0x4) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000004500)={@remote, @empty, 0x0}, &(0x7f0000004540)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004600)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005fc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006080)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000006180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000062c0)={'veth0_to_team\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006300)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000006500)={0x0, @broadcast}, &(0x7f0000006540)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000006580)={@dev, @rand_addr, 0x0}, &(0x7f00000065c0)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000006900)={&(0x7f0000006600)=@can={0x1d, 0x0}, 0x80, &(0x7f00000068c0)=[{&(0x7f0000006680)=""/211, 0xd3}, {&(0x7f0000006780)=""/60, 0x3c}, {&(0x7f00000067c0)=""/161, 0xa1}, {&(0x7f0000006880)=""/64, 0x40}], 0x4}, 0x2020) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006a00)={0x11, 0x0, 0x0}, &(0x7f0000006a40)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006ac0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000006dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006e00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006e40)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000006f40)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000007040)={@dev, 0x0}, &(0x7f0000007080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000070c0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007240)=0x14, 0x80800) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000007e80)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000007e40)={&(0x7f0000007280)=ANY=[@ANYBLOB="a40b0000", @ANYRES16=r1, @ANYBLOB="000326bd7000ffdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="fc0102003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d0000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ff0f000008000600", @ANYRES32=r3, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400cd0b000008000600", @ANYRES32=r4, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000140004000900000402000000000006010800000022000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000101000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400a1060000080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004002000000008000100", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400030000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fcffffff08000100", @ANYRES32=r11, @ANYBLOB="1402020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400010000800800070000000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400c703000008000600", @ANYRES32=r12, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000800000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400010000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400070003040080000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400090000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000900000008000100", @ANYRES32=r15, @ANYBLOB="7001020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400060000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100008008000600", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="3c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="640202004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000001400100010000030009013f00000000000106e26500003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r22, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r24, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000800000008000600", @ANYRES32=r25, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r26, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000700f5800400000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="08000100", @ANYRES32=r28, @ANYBLOB="4400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004008000000008000600", @ANYRES32=r29], 0xba4}}, 0x40) r30 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r30, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=@getstats={0x1b, 0x4a, 0x301, 0x0, 0x0, {0xa}}, 0x1c}}, 0x0) 14:40:01 executing program 2: accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x5ee3, 0x800, 0x19d4, 0x300000000000000, 0x2, 0x100000001, 0x7, 0x1ff, 0x1, 0x3ff, 0xa5f, 0xcef1, 0x5d, 0x5, 0x9, 0x9], 0x7000, 0x800}) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x81, 0x0, [0x0, 0x9, 0xe7d6, 0x1]}) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0x7, 0x3, "593387db3d67e03ff89c1d86c0e55f1d27594f19b8b40655b37b0af3c44f6bf5", 0x0, 0x8, 0x0, 0x0, 0x519f83346ce35822}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x0, r3, 0x3) r4 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) fallocate(r2, 0x11, 0x0, 0xc00000) 14:40:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000001400)='./file0\x00', 0x2000, 0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000001440)={0x3, 0x10000, 0x80, 0xfa, 0xbc07, 0x200000000000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e05000/0x2000)=nil, 0x2000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r2, 0x8, &(0x7f0000000100)=[0x1000, 0x0, 0x295, 0x8000, 0x1, 0x81, 0x8, 0x4], &(0x7f0000000140)=[0x29f, 0x3, 0x8], 0x10, 0x0, 0x9, 0x0, &(0x7f00000001c0)=[0x2]}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2c00000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@gettaction={0x170, 0x32, 0x800, 0x70bd25, 0x25dfdbff, {}, [@action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}, @action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x14, 0x1d, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x1, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x16, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x74, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x832}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x101}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x200}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x3f05}}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001480)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 14:40:02 executing program 4: r0 = socket$inet(0x10, 0x21cd561677c37d95, 0x3f) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f6105000a0000001f00000000000100080008000400ff7e", 0x24}], 0x1}, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) [ 1427.411882][ T26] audit: type=1326 audit(1553438401.988:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20754 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x0 [ 1427.472982][T20758] device team0 entered promiscuous mode [ 1427.478718][T20758] device team_slave_0 entered promiscuous mode [ 1427.494467][T20758] device team_slave_1 entered promiscuous mode [ 1427.520458][T20758] 8021q: adding VLAN 0 to HW filter on device team0 [ 1427.537622][T20786] device team0 entered promiscuous mode [ 1427.547385][T20786] device team_slave_0 entered promiscuous mode [ 1427.579276][T20786] device team_slave_1 entered promiscuous mode [ 1427.603727][T20786] 8021q: adding VLAN 0 to HW filter on device team0 [ 1427.611638][T20787] device team0 entered promiscuous mode [ 1427.623221][T20787] device team_slave_0 entered promiscuous mode 14:40:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0xfffffffffffffffe}}}, &(0x7f00000001c0)=0x84) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r3, 0x0) 14:40:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000080)=0x7) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x1, 0x0, 0x0, @msi}]}) [ 1427.629516][T20787] device team_slave_1 entered promiscuous mode [ 1427.686677][T20787] 8021q: adding VLAN 0 to HW filter on device team0 [ 1427.693447][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1427.693502][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1427.708627][T21006] device team0 left promiscuous mode [ 1427.723898][T21006] device team_slave_0 left promiscuous mode 14:40:02 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:02 executing program 5: socket(0x11, 0x802, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x20840) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1427.754921][T21006] device team_slave_1 left promiscuous mode [ 1427.813153][T21010] device team0 entered promiscuous mode [ 1427.846412][T21010] device team_slave_0 entered promiscuous mode [ 1427.855911][T21010] device team_slave_1 entered promiscuous mode [ 1427.877979][T21010] 8021q: adding VLAN 0 to HW filter on device team0 [ 1427.904199][T21489] device team0 left promiscuous mode [ 1427.909639][T21489] device team_slave_0 left promiscuous mode 14:40:02 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:02 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) write$UHID_INPUT(r0, &(0x7f0000000840)={0x8, "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", 0x1000}, 0x1006) ioctl(0xffffffffffffffff, 0x8912, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgrou\xd9\xb6\xa3\x00\x00\x00\x80\x00\x00\x00\x00', 0x1ff) io_setup(0x9, &(0x7f0000000380)) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000340)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000003c0)={0xf9c, {{0xa, 0x0, 0xfffffffffffffff7, @loopback}}}, 0x88) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3, 0x94) eventfd(0x100000001) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a45323, 0x0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000480)="590737f74163d11de814df0ba0b2a67824ff095cd3f5fde0866140ae29a2021dfa190321fe82e52e3806952deb5bee0defa59f958f3204455083f01c28d237507eecb8221f340334ad66b531e6804aeadae2636971a47ddb9b6c5a2c7ac4a3aa7f209cfdb288e0258b9e30344f48cb79f557ba491ea1362eedbda7ea75f9680df8be22f092f8bf5440be92c6f2dbd72f353157602e5fe09013daf1e03b88c07047e6adda6a2b87f9eadf8b593be265c7b34af3ecf54fb26874a946e64f8160b1c9b108b3", 0xc4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) 14:40:02 executing program 5: r0 = socket(0x11, 0x802, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0xfffd, 0x400804) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000080)={0x20, 0x4, "79e2e0e78446bb03266e2019b37f942d000b7e6406da2908f25c4bea69c4a93d", 0x2, 0xffffffffffffffff, 0x5, 0xb20, 0x20}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) recvfrom$rxrpc(r0, &(0x7f0000000180)=""/145, 0x91, 0x40000002, &(0x7f0000000240)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0xcd, @ipv4={[], [], @loopback}, 0x6656}}, 0x24) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) 14:40:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) geteuid() ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x587000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000280)={0x8e, 0xcd6, 0x10000}) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2}, 0x10) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L+', 0x54b6}, 0x28, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$lock(r0, 0x6, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "d3cce0f719456821301b2b983f6d12c9"}, 0x11, 0x2) quotactl(0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f00000000c0)) ioctl$RTC_AIE_ON(r4, 0x7001) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000540)={@multicast1, @empty}, &(0x7f00000005c0)=0xc) ioctl$RTC_AIE_OFF(r4, 0x7002) io_cancel(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x101, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r4}, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) 14:40:02 executing program 1: r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000400)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffda9) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000140)) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 1427.935384][T21489] device team_slave_1 left promiscuous mode 14:40:02 executing program 1: getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) pipe(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$binfmt_aout(r0, &(0x7f0000000300)={{0x1cf, 0x9, 0x7, 0xf5, 0x3b2, 0xfffffffffffffc00, 0x2d5}, "e4d9b7386467ae00030371f6b6c83f1429a2618e99e7f1616ae3a0d723d6247bb99a92f662615810c7be2702f394500c61845e76102265b602cf39d01181eff0b4bdafdbb2", [[], [], [], [], [], [], [], [], [], []]}, 0xa65) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r0, r2, &(0x7f0000000100), 0x20000000009) [ 1428.092174][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1428.098107][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1428.103996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1428.109761][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:40:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xfffffffffffffffd}, &(0x7f00000000c0)=0x8) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r0, 0x4, 0x100, 0x400}, 0x10) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r3, 0x107, 0x10000000000006, &(0x7f0000000100)="ce08fdebc26622dbe29f44c93b4109737bae72034b8abb38eedcc016fc98a7103ed2f577950b8683e75698ea473942878dc199bcd89f9e12c095d11cd9557f667b666ac612b5832a45e25d19cb9872f968f70fe0ac1fba474b2e70253a5cb1", 0x32) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) dup2(r4, r3) 14:40:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x5, 0x4, [0x1, 0x1, 0x44a43d91, 0x0]}, &(0x7f0000000180)=0x10) ioctl$TIOCNXCL(r0, 0x540d) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x16\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) dup2(r2, r1) 14:40:03 executing program 2: r0 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x88082) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000800)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x401, 0x5, {"601114b7b22fcdc2973f7b1946550d92"}, 0x2ac3, 0x0, 0x9}, @in6={0xa, 0x4e23, 0xe11d, @dev={0xfe, 0x80, [], 0x19}, 0x110224a3}}}, 0x118) getpgid(0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000a00)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)}}, 0xfffffe78) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000480)={0x7fffffff, 0x100000000}) accept4$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xf6) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20a00, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000200)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000540)={0x0, 0x8000}, &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000300)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x1, 0x20, 0x0, 0x0, 0x2, 0x2, 'syz1\x00', &(0x7f0000000180)=['uservboxnet0nodev[lo\x00', 'trustedem1cpuset\x00'], 0x26, [], [0x7, 0x88a, 0x81]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000640)=""/115) syz_open_dev$dspn(&(0x7f0000000500)='/dev/dsp#\x00', 0xffffffffffffffff, 0x480080) sendmsg$nl_generic(r4, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x40810) socketpair(0x11, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) 14:40:03 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) sysinfo(&(0x7f0000000080)=""/11) r2 = semget$private(0x0, 0x0, 0x40) semtimedop(r2, &(0x7f00000000c0)=[{0x0, 0x5, 0x800}], 0x1, &(0x7f0000000100)={0x77359400}) io_submit(r1, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) [ 1428.835641][T21523] device team0 entered promiscuous mode [ 1428.847936][T21523] device team_slave_0 entered promiscuous mode [ 1428.870258][T21523] device team_slave_1 entered promiscuous mode [ 1428.879585][T21523] 8021q: adding VLAN 0 to HW filter on device team0 14:40:03 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffe) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0xb2, 0x5}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa20a2012}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfa9}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x16}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x14}}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1a}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x52b}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}]}, 0x88}, 0x1, 0x0, 0x0, 0x40094}, 0x4000) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x20, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x4, 0x9}]}, 0x20}}, 0x0) dup2(r0, r0) [ 1429.035057][T21528] device team0 left promiscuous mode [ 1429.040393][T21528] device team_slave_0 left promiscuous mode [ 1429.064971][T21528] device team_slave_1 left promiscuous mode [ 1429.087538][T21548] device team0 left promiscuous mode [ 1429.096176][T21548] device team_slave_0 left promiscuous mode [ 1429.105309][T21548] device team_slave_1 left promiscuous mode [ 1429.117290][T21630] device team0 entered promiscuous mode [ 1429.126635][T21630] device team_slave_0 entered promiscuous mode [ 1429.137297][T21630] device team_slave_1 entered promiscuous mode [ 1429.151161][T21630] 8021q: adding VLAN 0 to HW filter on device team0 [ 1429.239780][T22295] device team0 left promiscuous mode [ 1429.252562][T22295] device team_slave_0 left promiscuous mode [ 1429.275789][T22295] device team_slave_1 left promiscuous mode [ 1429.304397][T22294] device team0 entered promiscuous mode [ 1429.314368][T22294] device team_slave_0 entered promiscuous mode [ 1429.324183][T22294] device team_slave_1 entered promiscuous mode [ 1429.353768][T22294] 8021q: adding VLAN 0 to HW filter on device team0 [ 1429.371175][T22363] device team0 left promiscuous mode 14:40:04 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)=""/228, 0xe4}], 0x1}}], 0x1, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000080)=""/24, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r2, &(0x7f0000000140), 0x96, 0x0) 14:40:04 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x208500) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'rose0\x00', 0xfffffffffffffffc}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) connect(r0, &(0x7f0000000100)=@ax25={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @null]}, 0x80) 14:40:04 executing program 2: r0 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x88082) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000800)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x401, 0x5, {"601114b7b22fcdc2973f7b1946550d92"}, 0x2ac3, 0x0, 0x9}, @in6={0xa, 0x4e23, 0xe11d, @dev={0xfe, 0x80, [], 0x19}, 0x110224a3}}}, 0x118) getpgid(0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000a00)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)}}, 0xfffffe78) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000480)={0x7fffffff, 0x100000000}) accept4$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xf6) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20a00, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000200)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000540)={0x0, 0x8000}, &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000300)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x1, 0x20, 0x0, 0x0, 0x2, 0x2, 'syz1\x00', &(0x7f0000000180)=['uservboxnet0nodev[lo\x00', 'trustedem1cpuset\x00'], 0x26, [], [0x7, 0x88a, 0x81]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000640)=""/115) syz_open_dev$dspn(&(0x7f0000000500)='/dev/dsp#\x00', 0xffffffffffffffff, 0x480080) sendmsg$nl_generic(r4, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x40810) socketpair(0x11, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) [ 1429.418560][T22363] device team_slave_0 left promiscuous mode [ 1429.501389][T22363] device team_slave_1 left promiscuous mode 14:40:04 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x8801, 0x0) ioctl$TIOCCONS(r0, 0x541d) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800000000080000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)) 14:40:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)=""/228, 0xe4}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x96, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xa8, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x101}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x78, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x825}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0xa8}}, 0x4) [ 1429.933362][T22372] device team0 entered promiscuous mode [ 1429.938981][T22372] device team_slave_0 entered promiscuous mode [ 1429.962279][T22372] device team_slave_1 entered promiscuous mode [ 1429.969825][T22372] 8021q: adding VLAN 0 to HW filter on device team0 14:40:04 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1430.043021][T22512] device team0 left promiscuous mode [ 1430.048383][T22512] device team_slave_0 left promiscuous mode [ 1430.084514][T22512] device team_slave_1 left promiscuous mode [ 1430.153806][T22550] device team0 entered promiscuous mode [ 1430.159530][T22550] device team_slave_0 entered promiscuous mode [ 1430.166103][T22550] device team_slave_1 entered promiscuous mode [ 1430.173686][T22550] 8021q: adding VLAN 0 to HW filter on device team0 [ 1430.194092][T22788] device team0 left promiscuous mode [ 1430.212359][T22788] device team_slave_0 left promiscuous mode [ 1430.220119][T22788] device team_slave_1 left promiscuous mode 14:40:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x602001, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x100000}) 14:40:05 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700)={0x0}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0xc) clock_adjtime(0x0, &(0x7f0000000300)={0x7, 0x0, 0x80000000, 0x7, 0x0, 0x101, 0x3f, 0x800, 0xfffffffffffffffa, 0x26, 0x4df, 0x7ff, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5b19bdf7, 0x0, 0x100, 0x6, 0x0, 0x5, 0x0, 0x0, 0xa}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000180)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000500)) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x80d0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000200)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$UI_BEGIN_FF_ERASE(r5, 0xc00c55ca, &(0x7f0000000000)={0x1, 0x9, 0xffffffffffffffa9}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000740)={{0xa, 0x4e22, 0x0, @loopback, 0xffffffffffffffff}, {0xa, 0x0, 0x800, @mcast1, 0x3}, 0xffffffff, [0x0, 0x0, 0x200, 0x100, 0x9, 0x4, 0x9c, 0x6]}, 0x5c) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) eventfd2(0x80401, 0x80801) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000540)="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") ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f00000006c0)) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000240)) ioctl$VIDIOC_S_TUNER(r4, 0x4054561e, &(0x7f0000000100)={0x9, "46e1fc9cd81288313ece64e50ab23ed729077ad2dcd1c6e34a21414517b9b7ef", 0x7, 0xf0, 0xee, 0x6c8b7bdd, 0x4, 0x3, 0x0, 0x800}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940)={r1, 0x1}, &(0x7f0000000980)=0xfffffffffffffe3c) unlink(&(0x7f0000000080)='./file0\x00') 14:40:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0xe0041, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000080)={0xffffffffffffff00, 0x1, 0x4}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), 0x4) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x800, 0x1, 0x201, 0x1f, 0xb, 0x1, 0x13b3, 0x1, 0x1, 0x20, 0x3ff, 0x50007b4e}) [ 1430.447348][T22789] device team0 entered promiscuous mode [ 1430.461450][T22789] device team_slave_0 entered promiscuous mode [ 1430.469237][T22789] device team_slave_1 entered promiscuous mode [ 1430.482790][T22789] 8021q: adding VLAN 0 to HW filter on device team0 [ 1430.537756][T22512] device team0 left promiscuous mode [ 1430.547459][T22512] device team_slave_0 left promiscuous mode [ 1430.555563][T22512] device team_slave_1 left promiscuous mode [ 1430.568597][T22550] device team0 entered promiscuous mode [ 1430.576408][T22550] device team_slave_0 entered promiscuous mode 14:40:05 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:05 executing program 2: r0 = inotify_init1(0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x10004, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000040), 0x0, 0x1}, 0x20) r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x7dc, 0x0, 0x2, 0x8, 0x0, 0x20, 0x0, 0x2, 0xa0, 0x10000, 0x6, 0x8, 0x6, 0x7ff, 0x0, 0x100000000, 0x0, 0x0, 0x101, 0x10, 0x9, 0x7, 0xfff, 0x9, 0x6, 0x1ff, 0x0, 0x80, 0x1, 0x774, 0x8, 0x3ff, 0x2, 0xffffffffffffffff, 0x7, 0x7673, 0x0, 0x800, 0x3, @perf_bp={0x0, 0x7}, 0x7473972b5e77f31c, 0x8, 0x7, 0x8, 0x100, 0x2000000, 0x9}, 0x0, 0x4, r1, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) mmap$binder(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x400000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000680)={0xb4, r7, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x782}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000740)=0x80000000000000, 0x4) shutdown(0xffffffffffffffff, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='/group.stat\x00') ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat], 0x0}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="08631040", @ANYRES64=0x0, @ANYBLOB="00003790dba5716be55fe3fa3516c6000000000000"], 0x0, 0x0, &(0x7f0000000780)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)=0x0) kcmp$KCMP_EPOLL_TFD(r8, r8, 0x7, r2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) fallocate(r1, 0x40, 0x3, 0xffb9) [ 1430.586846][T22550] device team_slave_1 entered promiscuous mode [ 1430.596849][T22550] 8021q: adding VLAN 0 to HW filter on device team0 14:40:05 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000240)=""/232, 0xe8}], 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x11, &(0x7f0000000000)='net/fib_triestat\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/fib_triestat\x00') preadv(r2, &(0x7f0000000480), 0x200000000000008e, 0x0) 14:40:05 executing program 5: r0 = socket(0x11, 0x802, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x6e, 0x401, 0x5, 0x9f2, 0x6}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f00000004c0)={0x3, &(0x7f00000000c0)=""/211, &(0x7f0000000440)=[{0xc9a, 0xd0, 0x1, &(0x7f00000001c0)=""/208}, {0x2, 0x74, 0x8001, &(0x7f00000002c0)=""/116}, {0xfffffffffffffff2, 0xf3, 0x6, &(0x7f0000000340)=""/243}]}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000500)) 14:40:05 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x3f}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x0, 0xfff, 0x0, 0x7, 0x4e}, &(0x7f0000000240)=0x98) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r3 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000100)={0xf000000, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f905, 0x800, [], @ptr=0x70a000}}) [ 1430.755491][T22976] device team0 left promiscuous mode [ 1430.764689][T22938] binder: 22934:22938 BC_INCREFS_DONE u0000000000000000 no match [ 1430.780171][T22976] device team_slave_0 left promiscuous mode [ 1430.828359][T22976] device team_slave_1 left promiscuous mode 14:40:05 executing program 2: r0 = inotify_init1(0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x10004, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000040), 0x0, 0x1}, 0x20) r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x7dc, 0x0, 0x2, 0x8, 0x0, 0x20, 0x0, 0x2, 0xa0, 0x10000, 0x6, 0x8, 0x6, 0x7ff, 0x0, 0x100000000, 0x0, 0x0, 0x101, 0x10, 0x9, 0x7, 0xfff, 0x9, 0x6, 0x1ff, 0x0, 0x80, 0x1, 0x774, 0x8, 0x3ff, 0x2, 0xffffffffffffffff, 0x7, 0x7673, 0x0, 0x800, 0x3, @perf_bp={0x0, 0x7}, 0x7473972b5e77f31c, 0x8, 0x7, 0x8, 0x100, 0x2000000, 0x9}, 0x0, 0x4, r1, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) mmap$binder(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x400000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000680)={0xb4, r7, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x782}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000740)=0x80000000000000, 0x4) shutdown(0xffffffffffffffff, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='/group.stat\x00') ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat], 0x0}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="08631040", @ANYRES64=0x0, @ANYBLOB="00003790dba5716be55fe3fa3516c6000000000000"], 0x0, 0x0, &(0x7f0000000780)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)=0x0) kcmp$KCMP_EPOLL_TFD(r8, r8, 0x7, r2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) fallocate(r1, 0x40, 0x3, 0xffb9) [ 1430.980513][ T17] binder: send failed reply for transaction 31 to 22934:22938 [ 1431.001505][ T17] binder: undelivered TRANSACTION_COMPLETE [ 1431.050147][ T17] binder: undelivered TRANSACTION_ERROR: 29189 [ 1431.179783][T23227] binder: 23226:23227 BC_INCREFS_DONE u0000000000000000 no match [ 1431.239219][ T1685] binder: release 23226:23227 transaction 33 out, still active [ 1431.253829][ T1685] binder: undelivered TRANSACTION_COMPLETE 14:40:05 executing program 2: r0 = inotify_init1(0x0) pwrite64(r0, &(0x7f0000000140), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x10004, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000040), 0x0, 0x1}, 0x20) r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x7dc, 0x0, 0x2, 0x8, 0x0, 0x20, 0x0, 0x2, 0xa0, 0x10000, 0x6, 0x8, 0x6, 0x7ff, 0x0, 0x100000000, 0x0, 0x0, 0x101, 0x10, 0x9, 0x7, 0xfff, 0x9, 0x6, 0x1ff, 0x0, 0x80, 0x1, 0x774, 0x8, 0x3ff, 0x2, 0xffffffffffffffff, 0x7, 0x7673, 0x0, 0x800, 0x3, @perf_bp={0x0, 0x7}, 0x7473972b5e77f31c, 0x8, 0x7, 0x8, 0x100, 0x2000000, 0x9}, 0x0, 0x4, r1, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) mmap$binder(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x400000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000680)={0xb4, r7, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x782}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000740)=0x80000000000000, 0x4) shutdown(0xffffffffffffffff, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='/group.stat\x00') ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat], 0x0}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="08631040", @ANYRES64=0x0, @ANYBLOB="00003790dba5716be55fe3fa3516c6000000000000"], 0x0, 0x0, &(0x7f0000000780)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)=0x0) kcmp$KCMP_EPOLL_TFD(r8, r8, 0x7, r2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) fallocate(r1, 0x40, 0x3, 0xffb9) [ 1431.309642][ T1685] binder: send failed reply for transaction 33, target dead 14:40:06 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000240)=""/232, 0xe8}], 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x11, &(0x7f0000000000)='net/fib_triestat\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/fib_triestat\x00') preadv(r2, &(0x7f0000000480), 0x200000000000008e, 0x0) [ 1431.474063][T23254] binder: 23253:23254 BC_INCREFS_DONE u0000000000000000 no match [ 1431.529155][ T17] binder: release 23253:23254 transaction 35 out, still active [ 1431.544206][ T17] binder: undelivered TRANSACTION_COMPLETE 14:40:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x40000003, 0x0, 0x1}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000080)=""/201, 0x9ea9188ad646a00, 0x1800, 0x81}, 0x18) [ 1431.586630][ T17] binder: send failed reply for transaction 35, target dead [ 1431.695615][T22982] device team0 left promiscuous mode [ 1431.705601][T22982] device team_slave_0 left promiscuous mode [ 1431.737653][T22982] device team_slave_1 left promiscuous mode [ 1431.776599][T23018] device team0 entered promiscuous mode [ 1431.796962][T23018] device team_slave_0 entered promiscuous mode [ 1431.837218][T23018] device team_slave_1 entered promiscuous mode 14:40:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x1000, 0x2000) fcntl$setstatus(r0, 0x4, 0x400) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x32dc42, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000040)={0x6, 0xffffffff, 0x7, 'queue1\x00', 0x100000001}) [ 1431.852191][ C0] net_ratelimit: 18 callbacks suppressed [ 1431.852201][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1431.864008][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1431.870882][T23018] 8021q: adding VLAN 0 to HW filter on device team0 14:40:06 executing program 4: r0 = memfd_create(&(0x7f0000000100)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x12, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='maps\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e20, @rand_addr=0x4}], 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x0) clone(0x40002102101ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_open_procfs(0x0, &(0x7f0000000880)='\x04\x00\x00\x00\x00\x00\x00\x00') setns(r1, 0x4020000) [ 1431.892578][T23021] device team0 entered promiscuous mode [ 1431.900952][T23021] device team_slave_0 entered promiscuous mode [ 1431.933641][T23021] device team_slave_1 entered promiscuous mode [ 1431.958130][T23021] 8021q: adding VLAN 0 to HW filter on device team0 [ 1431.981752][T23332] device team0 left promiscuous mode 14:40:06 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) msgget(0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) [ 1432.037354][T23332] device team_slave_0 left promiscuous mode [ 1432.086941][T23332] device team_slave_1 left promiscuous mode 14:40:06 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x101000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x6, 0x8000, 0x7, 0xdd4462e, 0x2}, &(0x7f0000000180)=0x14) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000035c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000003540)={0x4c, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PORT={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x4c}, 0x1, 0x0, 0x0, 0x801}, 0x4000) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x105001, 0x0) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000200)) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r5, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 14:40:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000001c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000180)={@hyper}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x9c, r5, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffc01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7c0}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4008881}, 0x48045) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e5d4f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$RTC_WIE_ON(r4, 0x700f) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x1f, 0x3}) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:40:06 executing program 5: r0 = socket(0x11, 0x804, 0x7ff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = dup3(r0, r0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x2, 0x6, 0x8}}, 0x28) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 1432.155722][T23657] device team0 left promiscuous mode [ 1432.166195][T23657] device team_slave_0 left promiscuous mode [ 1432.225558][T23657] device team_slave_1 left promiscuous mode [ 1432.252183][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1432.258574][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1432.264694][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:40:06 executing program 5: r0 = socket(0x9, 0x802, 0xbe7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5d2c6043, 0x100) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x3, {0x1}}, 0x283) [ 1432.270599][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:40:07 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x5, &(0x7f0000000040)=0x3, 0x1bf) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @dev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x0, @loopback}], 0x1c) 14:40:07 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x10b001, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000340)={0xff, 0x3, 0x0, 0x80000000, 0x8, 0x1, 0x3, 0x7170, 0x800, 0x6, 0x1, 0xfffffffffffffffb}) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x63}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @rand_addr=0xff}, 0x401}}, 0x0, 0x5, 0x1f, 0xffffffff, 0x80}, &(0x7f0000000300)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0585604, &(0x7f0000000080)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) [ 1432.412757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1432.419861][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:40:07 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x10000) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{0xffffffffffffffac, 0x2, 0x101, 0x8}, 'syz0\x00', 0x23}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:07 executing program 1: r0 = socket(0x9, 0x802, 0xbe7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5d2c6043, 0x100) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x3, {0x1}}, 0x283) 14:40:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, 0x0, 0xf82055efa15ff4ba) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-'}, 0x28, 0x2) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000440)=0x2d6) r6 = getpgid(0x0) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{0x10000, r4, r5, 0x0, r5}, 0xb8fb, 0xffc, 0xffffffffffffffff, 0x8000, 0x0, r6, 0x81}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) sendmsg(r1, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c00], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x400000000, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x1ff, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r2, 0x0) add_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000001c00)="b9f36a952e4a0cad0746243745506fdf775417b78a0d2a0384780c896061dd994f0e090541c8e0cf930b3f82090e2a3be47a24ff4129c5c2be5fa976436f90f40f094c466dd769952803b44898149945a731e818d4776ddc192df4b10aab72b579cc28ecf0c5526f975fddbb52f587bd162a64be0dea40a1e7647ca10bda225e7eb325f5afc8df68df7ebfd39301189fec293270c90689e97e885399b71944b74b840263c01f1f99c07133ddc9a415c9e9cc9d3839ddb81f56ca3c7edf2fa4c47365874361b193de750424a90f5329b236c4c9e27d88f4f629be96ce03b1dced66af644cfc550285207a47afccfe0ddb40aa054fa5639b665cd9447440ee9a3fb8bc9ba650dee3763f7a5a2dd569c5a9807cf2e4a8c927c3e95f27a2e721e759766a2ea4820b553988b9d9665768338aa701fba1d16113e37162f042b7c804f4a4b1715a700369683664679d58deccfb53b7b2d798f6a356f4e2ddb1586fbbe514de2dded4b886e898ebde8255e7fb24019d127a628c27eed86465f5dc287471cc099edf12895d02fd57be03fa4b29dd0040131d8cdbc784c481fc0373fa20e230443554d706e83465c9ede5f035f821fd09c6de1412740afa3965cb40f3ab416a7b0c32c0a15111a073ea49bdefe82c1589548d375b0c2e2d91f560ae313b56a3144489fab7e82ef8a67d3e5ffcb1877b2fbd6c346c1a6b863fb8755ad94254ad9bd288ff3856dee757db0f903d2ed0b95141a9117e74d8208c460478ca5d07979ca3559a9c3e5a0c72aea808f60f696250cae7e232115bc90bc005892a609a48ba12b10432114f5bdd6b40e90e08c0ad1d9361b5530aee41c5c292bb7f2686eebd4ce122a4a4ab9c18192301c74f333a2c95b7ecfebc0a61a5753fe433814b330ba25442435bbbfa17e76f03076459ebf008e009d74c1b61a6cd01738b3f39e64d8681f5f571f08779ca94170d3fc813195d09cc44e202625a7bf89163ea71ed26f5b7a366820b69d8f5b7c0c7b0c16cce39191d004339761d14f623df4d66e03a7f035617c4ecadec648961c7d02780d5840d9084a166b74b3f3458a4b3fc0b7d927d8c5405dbddb91c821a6fa32b214bd30c66b757aca924d5bb3e3501a1354095a35ba55ce9dc45365657a17c93cc607e21dd8e936818a241b25ae5e37619c79cc73de5b832d510ba8c039605a1444d0ab8149f986d29a051ac2f834dc07d49c3e33f99ca4a699bf398fb8128a703e0a2f5aa49688e0bc4bb0144e920c59d69d018c3423844c43b0bcca718be284c2ead73b65627cd1dea599e3808fc090a5d4b79e372408280c84326e03f8693f198241e77994c65d2652a2203d3f354a641f832c1522d7bed41ddd0df8c88ec0f00a05843ca555a6fcfcdd2e035397ccb0aae4ca37b02409035200f414dbd4ea6f3580bdf1e9c896daaf0d88382aa016cb52a5c1479b9072fa531306a50c6b105d25ba690005e001442845c75c5b10da62e7d94adb7c9f820946d93aa2661162a89cecdff67d48a7bd2a5e58892f71fa710ea79d9c5bd8b0e96e1a0af0b6c5ea6d733d03457513e718e86146646ebb33d17d609f06b7e7fc404afe2e95d530612bff3d461b471ead6b0a06b635989c043a6363c92e9a47401ba6cc4f7545283156850b34bd49d014f854095f608b206e35fe0b1a6c7a683aa882b43ac40c9a9269dbe00cdee618148435affa507c674503d7a46c21c44e97eec882be952062d803cf9e4317d5d8f206281c10360d7bbf8b254e39b9f864f72573ed1d9448e256dd4ebb723ef9763e75e36949a8187a39b2c744d01500e2302373e08e5c34abe1bcabef6a1f67b1c61aa9dc29454c2b4d7fb89fe0d130bc7d80af9442426871ddce0479b94f1f04015358a9172f88d4151a98c24e5c3538176df5b07ac58ba77f52c1e7afe7a2c75d74eca3945620878dc3854bf2539322ef78d10a08409710dfe11233cc1481828a39abfee17ebfe8947a8624e7abe9e4e300c07f70cdfed5621c1c813cb2552bd17426cc7a9dbcb6c4ab22f8e98030672120a12442cfcaaf754ed17f5513e34cf23fc355bc6fa0046f3e981fd999738cb1d3bdc5681ceaec955f23324902bab50ad39eecd140a18a4975054bc2669c121ca2b2f28dac28924eaa5260b39c36ca33accf576d9d54e9882b94dcf296371172c2b8417d32114783cbf4bece64eb6e1892c5942dbd817f1ff13fc8049ce71695d3e7b7c4f1c41d1b47854cdc9636d7b97a5dcd9795da252288a2cea16963281753644cbdf30463435a9b56b42814cc12c66b7df8a575a272d1f8832f3b7815b1a087e348a0b140e4a38dfe5bf833a47707ce985663617183b7ca5d0f38a4138bc112d6a1479022912157562b64e481920d5f18f8a04ff95660b3ba1d988b16053f9e31cd2163971437d8363e5e9417800981f788a18b0e70e2af70760d0bef9d4d3de1eb81a011205e6bee2b20b820f7bbda63fb00b8ef1708c2fc60e34a0ac0a1afee521678d2e0ce8039f91c46b11a60bc126318cc86c83ca57ccd2df46172c660fa2b6a27f743640b91bbd8be5b95b872a291e9a9664b6b6060d092a3834cd11584395e206972df8f82dfea65e92cbde007fdd27d83983095bef6d4fb3dfd2d576b51d0882102614414fd9adfa19dfaccadf4c67d3e160a9f6b7bc51a44ff96a6f9da2d51576f1eb1629286ed3e306b8cb13894dbfec09d436edf8cb4b125169c10dabed53f3f8821739c2e4ca566e47a3a062a2ba53d39f3a5a250ad0bef87cdd9ee8457cf5c18486391c05fe88ae1e32287fda8f16aa983da89d181739051139a382fc25aff93266b85078f9629494c1f60ab7a348ba683439a15059b21b82b5b31f9e61afb3399ffaeb60f1b7ef77e1a8c0ecd4d7e13c769ca397367e1bb950ed22dc841c5a9abfa90b07af691361c1d69cb7e8725eb73e53b2f65602f437deacf7cd64ec57eadb9639b47ae56ebbde6d4dad879ee881b41f96c0c728befb07da41664bc2deaa1495b3daf3eeacc84c508a6ca104c974e36bb34bc5264463c39e0161e010a1ac96dc0572322e7b53ad4b76b9c6148aed6c5ff89ad7312181351a2fca1e74645da200506647e3b82d423b6b4e407c7d256d2ed0f466408db21383d0a8d6effd890a7ddb72cbfc25b05b67f5426ca9154ab67af19e6119912d53bd3493e8d94e897efd2cd76088b5ef969fda9914602c9e035a4291b1b674c1ffd56f0ce1b55e30caea87e9697a880d123fb81e34c7bbeeda79839dc044b0d393b4befa5e1855649f5c85e40f37163a31db05d3c4934751a22079ca01833cf2807af09dcaee581d9af05e3505d2c09b768fb785bfd47886b0eacad96185006da100d4dbdc9386ec2145e302d16e347f21396709d2ce8c3676e774f9f11f54bb6a03f20ae0d745838fa1f7990420ae6e8de23997c697c7a7ba9f073da7003fd496422d7d51f30d821a6a05562ca310210112420703a27dc04d1050034619b82fe26043ed5f6790bf7547dbca0d45ec579260eba48a3799f341c7ce80c1c567954efd3c0ab95d952b73dfe9c58167d15d40dc0af37ff2ae847677c878e9b1f176fd428d2e8c0de344d8c53f0de81ffd186261772a60b455988bf0f557a862f665acfa843414f64c4228f77e81256f62e3fb128e4d1008b1920c3d749d1e154850deb4d72a82bdc5ae09f299732c9518fde88a3294e685578d563b41b7e72155754e962d1835720e18819c4abc9051fce11562eda9b2bdcffc88c4dd1a80ed27856c4415eb262c684cdf81ee23620581169107bada7c3f8e84d642984d9bf9588c1b84af9d831d81a23df354822316bc1e41e4f0b51b3a75c2a1b12acd7eea9f18fb42798dcae24c925501ea43f1f2e2057f6dcce4f229db742a2892a1f151a9aff694c1cbb42be330d0463a01ae3c1814e0c5b7021f434a018b6b79c1f6a2e9067870a72967e3505185c7dd0f5ba2df34b16891cdaa0a325172a8b9a54e75d2109c320a4d1a5d3e60156662c154ce1352cca13df0de294002bc1995df9ab79cb6a12fa576275e912f8f3914d425d304dfefb94dec8baf5bc8084c844b29a15617d35897134a44b52178dd24aa32702e67b506b561e0f161e89104390b0041248f95d35d4bc107226f580ea9ed52972859607217d97f6e7e0a6d594bf0a79ff7019182a584c9d55c287534779d1f5c94cf1bd20a6f72fca4328d08ccb60723835e1e16bfcc48a226970885b3fc3cb36ac051624c4b5b5719c379c9fadc6346ae4d087178adbc38ac6b1521c197c19fc036922f2c87627cd29dd0d884e201ee11ae560e4209f62cc5646c91c1a66507c3ea19ba78abcce5a39e61d5cb242914d1c295f556f0353bc9a7984e73c6eb3acd657087d69484b4517f27e4e72386bb63615009acf64d7454b3e2a6de16476c14dd92ab232469d6e308a658b1fe86174a01227ce7daf96ef3338d485a6c6a26b9b8794b83f7c89fdc40116d35cd0d29d5da623a3bc9572c3389e00f855f7b632520a124216e53729a2faccdacc8039ae7070d389d9a97451c87fd06cc7885c09de08bc3178b0a2062b364b6ec5fbe74d1e36549ea3fe1801425ced7c45d07030599c00bbf728a189eaf5ce59f34e96439d704674e7378c4a3f84468ed5de1e45d4054c24cf4ed4abc82adad6f5d90192cdbbb42cdafa4e31e1090245aa8f8be0d529346c35e436cef6715975e4091041fbf2d9247428d1877f99f4c19bd170c19512f61d9491911aff4d02bef641895eac4f932528bbf68e421c661e596609ecf4326080ccc399876df1f5b67d4b831738c4d3ad48a08b92769d084680da0654bfc69b34a91e42bc065dc47eea8e23d3755eb84999d5407fff2a7742e899b207ba27c9f2a1af2982ff0a275ef20161819c64f479b49cce5a12a68c1a2d19c077ad7c05b242849f30d25d48151f519dcd8713822d761cfbf42da9188611ecfeddc86ea1aaaca314369a52908e3c59e2b939b6d1e57807aac87f7be06d3f1cb12be99491c41cee1f6cf1151905895fdd9e5eec2fa4716ca497332b7254b8fb925e848aec5b13fab4915ac185cdb62cc7c1c2c6852130c006a03f7ecc9939bf4fbc5712279dea399a6dcf1c299287c03c55921c3a80f9581c67cc51691c3b004d9cc7cf325b9b4079205b4f94b43e784714d2652691103f9fffce271e102cddc7c1b8c46c5e5a06fac57893e9ba992217227e0f1c0a47fccadd259b44f0edae2afa2a8dcc2181e52a58627d68e97b445ff81ccab2895788f474c1196818b368c2af5ac71736c041fb0ed48831abf28e9e6099c53a7351d973d279b6d2fedbc1cd39551bcbc1aa001ac005447c6556e48a4c83ec026e302f664cd49b5af675e28c44b34bf8e8caaf314dc34c46aced78cb319ccd2e7b6d813fe7ecc171e09de559ab971b2da8551362cfcd7e8a3840a048b094e91980593bfc06ee483ddbae265d216dc3828c49e249e1a60dd8cfd7dff2dd2c9d871ec57673d9f215ab0f609616005aee4109dfce03e492a7286ef54ca31b587bfc1d55e9826a295d954f43ca592c4e06c15c7556fe866127acf2193d1fb3b491f8e0872b9e7a5f6d55858c09e3ac45742ca09be907ca2a285a3b32770cd749cda2e4dd88637c74d89bb24f7531443a8d4b7f5cf1005276b6dfd564367ffb743e646fe74bd4719bdcdec27608e35e3734f9e38194957a203e35cd8d0f9532880d555596ea7019ea8c87650f18ec44744ddeb41d59a255470bea4cf7e76428a9b7b5bd7598f953e44f5663c6ade068ad927f60f00cb21", 0x1000, 0xfffffffffffffff8) r8 = request_key(&(0x7f0000000640)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000680)='Fvmnet1/\x00', 0xffffffffffffffff) r9 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffffce7}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0x1}, 0x28, 0x3) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) ioctl(r2, 0x40000000, &(0x7f0000000700)="00000080ffffffff099370") socket$key(0xf, 0x3, 0x2) [ 1432.967004][T23762] device team0 entered promiscuous mode [ 1432.972305][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1432.973093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1433.043174][T23762] device team_slave_0 entered promiscuous mode [ 1433.061925][T23762] device team_slave_1 entered promiscuous mode [ 1433.071071][T23762] 8021q: adding VLAN 0 to HW filter on device team0 [ 1433.081032][T23866] device team0 entered promiscuous mode [ 1433.090876][T23866] device team_slave_0 entered promiscuous mode 14:40:07 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x48, 0x1, 0x5}}}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000000c0)={r2, 0x2}) r3 = socket(0x10, 0x2, 0x0) sendto(r3, &(0x7f0000000180)="120000001200e7ef007b1a3fcd0000df07a1", 0x12, 0x0, 0x0, 0x0) [ 1433.128975][T23866] device team_slave_1 entered promiscuous mode [ 1433.161065][T23866] 8021q: adding VLAN 0 to HW filter on device team0 [ 1433.217290][T23771] device team0 left promiscuous mode [ 1433.232670][T23771] device team_slave_0 left promiscuous mode [ 1433.243438][T23771] device team_slave_1 left promiscuous mode [ 1433.270301][T24296] device team0 left promiscuous mode [ 1433.303004][T24296] device team_slave_0 left promiscuous mode 14:40:07 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:07 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000040)={0x5, 0x70df, 0x1, 0xa1d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 14:40:07 executing program 5: r0 = socket(0x12, 0x802, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x40000) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f00000000c0)={0x6, 0x7fffffff, 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'vxcan1\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180)=0x8, 0x4) r2 = dup(r0) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000)=""/44, &(0x7f0000000140)=0x2c) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000040)={0x2, 0x1ca6}) [ 1433.325086][T24296] device team_slave_1 left promiscuous mode 14:40:08 executing program 4: r0 = memfd_create(&(0x7f0000000380)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f0000000140)="122ecd9bf1f9aaf3c8d2e9ab8880352f33c3a7e599fdc49104da79594748abb2e595b828813b8413e0f643a84b340a6d6deb1a8cc37e5accab7138d20c953f20d4ec50561184d0928b94e6ff73b5737654c69633673c176e53f6ab18b060633a93c0bc76014ad853fad3a408087efab6214e7ee0c5047a7805b0d159de2aecae", 0x58, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000003040)=""/4096, 0x1000) 14:40:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xf4) 14:40:08 executing program 2: r0 = socket$inet(0x10, 0x6, 0x2000000401) sendmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000507031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 14:40:08 executing program 5: r0 = socket(0x11, 0x802, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xaa9, 0x2280) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000080)) 14:40:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000040)={0x262, "5c2ec503807e5f930d774ec3412619a88efd5c60a909e00d18b775bb89a6647e", 0x1, 0x1}) 14:40:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) mmap(&(0x7f00004cf000/0x4000)=nil, 0x4000, 0x2000008, 0x10, r0, 0xffffffffffffff81) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xa01b1871712608b3) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x8, 0x2600) 14:40:08 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xc5cc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x2f3) setsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x12) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmmsg(r2, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000004b40), 0x1ac, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0x20004bc0) [ 1434.192790][T24371] device team0 entered promiscuous mode [ 1434.198588][T24371] device team_slave_0 entered promiscuous mode [ 1434.212363][T24371] device team_slave_1 entered promiscuous mode [ 1434.220101][T24371] 8021q: adding VLAN 0 to HW filter on device team0 [ 1434.229084][T24511] device team0 entered promiscuous mode [ 1434.236513][T24511] device team_slave_0 entered promiscuous mode 14:40:08 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:08 executing program 1: openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x10000, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") prctl$PR_GET_NO_NEW_PRIVS(0x27) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) [ 1434.250034][T24511] device team_slave_1 entered promiscuous mode [ 1434.259253][T24511] 8021q: adding VLAN 0 to HW filter on device team0 [ 1434.328259][T24447] device team0 left promiscuous mode [ 1434.349165][T24447] device team_slave_0 left promiscuous mode [ 1434.368569][T24447] device team_slave_1 left promiscuous mode [ 1434.394842][T24939] device team0 left promiscuous mode [ 1434.400963][T24939] device team_slave_0 left promiscuous mode [ 1434.411879][T24939] device team_slave_1 left promiscuous mode [ 1434.595908][T24511] device team0 entered promiscuous mode [ 1434.601520][T24511] device team_slave_0 entered promiscuous mode [ 1434.608918][T24511] device team_slave_1 entered promiscuous mode [ 1434.620685][T24511] 8021q: adding VLAN 0 to HW filter on device team0 [ 1434.635816][T25031] device team0 entered promiscuous mode 14:40:09 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:09 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000440)='vegas\x00', 0x8377c82a1d841f) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x8) tkill(0x0, 0xd) 14:40:09 executing program 5: getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0x8000000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:09 executing program 2: r0 = socket(0x1, 0x5, 0xffff) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000200)=0x5, 0x4) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000180)=0x9) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r2) keyctl$dh_compute(0x17, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={'crct10difi(0;\x00'}}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x12402, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000100)=0x16000) 14:40:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0, 0x244}}, 0x0) close(r1) io_setup(0x7, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, r2}]) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f00000002c0)=[0xffffffffffffff00, 0x400]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040894}, 0x40) [ 1434.641743][T25031] device team_slave_0 entered promiscuous mode [ 1434.654894][T25031] device team_slave_1 entered promiscuous mode [ 1434.666273][T25031] 8021q: adding VLAN 0 to HW filter on device team0 14:40:09 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1434.768532][T25055] device team0 left promiscuous mode [ 1434.804958][T25055] device team_slave_0 left promiscuous mode 14:40:09 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:09 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0xfffffffffffffe39) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/84, 0x54}], 0x1) [ 1434.833357][T25045] could not allocate digest TFM handle crct10difi(0; [ 1434.862433][T25055] device team_slave_1 left promiscuous mode 14:40:09 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x24) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "c78494a2fa6ed10be9e834ef8933c9eb"}, 0x11, 0x1) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r1, 0xb06, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfff, 0x6, 0x8, 0x1}}}, ["", "", "", "", "", "", "", ""]}, 0x30}}, 0x4008000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x480000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f00000001c0)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000180)={0x9, 0x6, 0x6, 0x4, 0x80000000}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='/', 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f00000003c0)={0xc1, 0x7, 0x3edf}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet6(0xa, 0x80000, 0x100000000) 14:40:09 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x21ef81, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r1, r2, r3}, 0xc) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000280)={0x3, 0x100}) listen(r0, 0x80) r4 = socket$inet(0xa, 0x801, 0x84) listen(r4, 0x2) accept4(r4, 0x0, 0x0, 0x0) [ 1434.944956][T25222] device team0 entered promiscuous mode [ 1434.972359][T25222] device team_slave_0 entered promiscuous mode [ 1434.986213][T25222] device team_slave_1 entered promiscuous mode [ 1435.015941][T25222] 8021q: adding VLAN 0 to HW filter on device team0 [ 1435.028616][T25362] device team0 left promiscuous mode [ 1435.036496][T25362] device team_slave_0 left promiscuous mode [ 1435.059612][T25362] device team_slave_1 left promiscuous mode 14:40:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pause() setrlimit(0x0, &(0x7f0000becff0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:40:09 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r0, 0x4, 0xe3) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0x9, 0x0) [ 1435.546088][T25373] device team0 entered promiscuous mode [ 1435.551947][T25373] device team_slave_0 entered promiscuous mode [ 1435.572278][T25373] device team_slave_1 entered promiscuous mode [ 1435.580239][T25373] 8021q: adding VLAN 0 to HW filter on device team0 [ 1435.671205][T25055] device team0 left promiscuous mode [ 1435.679211][T25055] device team_slave_0 left promiscuous mode [ 1435.689992][T25055] device team_slave_1 left promiscuous mode [ 1435.708376][T25222] device team0 entered promiscuous mode [ 1435.717109][T25222] device team_slave_0 entered promiscuous mode [ 1435.725671][T25222] device team_slave_1 entered promiscuous mode [ 1435.734013][T25222] 8021q: adding VLAN 0 to HW filter on device team0 14:40:10 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400002, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000280)={{0xf002, 0x0, 0x4, 0x9, 0x6b, 0x8001, 0x1, 0x2, 0x6, 0xffffffff, 0x3, 0x5}, {0x6002, 0x0, 0xf, 0x40, 0x6, 0x54e, 0x4728, 0x8000, 0x200, 0x3, 0x1f, 0x2}, {0x7005, 0x7004, 0x9, 0x1f, 0x3ff, 0x8, 0xf80d, 0x10000, 0xffff, 0x100, 0x0, 0x401}, {0xf000, 0x4, 0x0, 0xe, 0x3f, 0x3, 0xfffffffffffffff9, 0x0, 0x1, 0x34b9, 0x6, 0x2}, {0x4, 0x10000, 0x8, 0xfffffffffffffeff, 0xc6, 0x1, 0x200, 0x100000001, 0x1, 0x9, 0x4}, {0x2, 0x7002, 0x3, 0x9, 0x5, 0x101, 0xffffffff, 0x480000000, 0x7fffffff, 0x4, 0x81}, {0x0, 0x6000, 0x8, 0x9, 0x7, 0x0, 0x2, 0x3f, 0x5, 0xffffffffffff8000, 0x11d, 0x81}, {0x7002, 0x6000, 0xf, 0x6, 0x8001, 0x8000, 0x98, 0xd65, 0xfffffffffffffffa, 0x2, 0x9, 0x3}, {0x7000, 0xd000}, {0x2001, 0x117000}, 0x80010014, 0x0, 0x10000, 0x4110, 0x6, 0x3401, 0x0, [0x4, 0x0, 0xb77, 0x7fff]}) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000140)=0x2e45c9f5, 0x4) sendmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)="83b1f261a8f98bcb7cabe6fa7f95259642fb113e76f808eea52c30cbb2ef7838a73070dea16adb90", 0x28}], 0x1}}], 0x1, 0x0) 14:40:10 executing program 5: r0 = socket(0x19, 0x801, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:40:10 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x10001}, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128l-generic)\x00'}, 0x58) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r2 = dup2(r1, r1) mq_timedsend(r2, &(0x7f0000000140)="fe6c626b09135e2c898bfe543c99e923db9c8a976fd706b32ff54274d5c9b09e1e8bb1ff0fcf694cf68d1b01b7f55699648cf5dfc5c5ace4d65bbafe1c786d2199981aca", 0x44, 0xff, &(0x7f00000001c0)={0x0, 0x1c9c380}) io_setup(0x7, &(0x7f0000000280)=0x0) io_cancel(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x100, r1, &(0x7f00000002c0)="e3ad84b8b4622188", 0x8, 0xffff, 0x0, 0x1, r2}, &(0x7f0000000340)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="63bfa4", 0x3) 14:40:10 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getuid() keyctl$chown(0x4, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:10 executing program 4: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001180)=@security={'security\x00', 0xe, 0x4, 0x448, 0x1c0, 0x1c0, 0x310, 0x0, 0x310, 0x470, 0x470, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@ip={@multicast1, @remote, 0x0, 0x0, 'hsr0\x00', 'lo\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:semanage_exec_t:s0\x00'}}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'team_slave_1\x00', 'ip6gretap0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@loopback, @multicast2, 0x0, 0x0, 'bond_slave_0\x00', 'tunl0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4a8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) geteuid() getegid() sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f00000000c0), 0xfffff28, &(0x7f0000000140)=[@rights={0x20, 0x1, 0x1, [r0, r0, r1, r2]}], 0x20}, 0x8000) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 1435.879184][T25942] device team0 left promiscuous mode [ 1435.899596][T25942] device team_slave_0 left promiscuous mode [ 1435.909699][T25942] device team_slave_1 left promiscuous mode 14:40:10 executing program 5: r0 = socket(0x11, 0x804, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:10 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:10 executing program 2: creat(&(0x7f0000001dc0)='./file0\x00', 0x0) clone(0x2102801ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$isdn(0x22, 0x3, 0x25) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:40:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0) [ 1436.001294][T26097] device team0 entered promiscuous mode [ 1436.052597][T26097] device team_slave_0 entered promiscuous mode [ 1436.069949][T26097] device team_slave_1 entered promiscuous mode [ 1436.090773][T26097] 8021q: adding VLAN 0 to HW filter on device team0 [ 1436.101899][ T34] rpcbind: RPC call returned error 22 [ 1436.109005][T26013] device team0 left promiscuous mode [ 1436.115897][T26013] device team_slave_0 left promiscuous mode 14:40:10 executing program 5: r0 = socket(0x1, 0x800, 0x1000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1436.177878][T26013] device team_slave_1 left promiscuous mode 14:40:10 executing program 4: memfd_create(0x0, 0x200000000000001) bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0xfffffffffffffc67) listen(0xffffffffffffffff, 0x10001) r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$apparmor_exec(r0, &(0x7f0000000580)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000640)={0x0, 0x4, 0xfff}, &(0x7f00000005c0)=0x6) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x4, 0x101}, 0x0) r2 = socket$inet6(0xa, 0x800000000000800, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x375251b7, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0xffffffffffffffff, 0xcb, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x6fe4c7b5) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) syz_open_procfs(r3, &(0x7f0000000200)='net/ip6_tables_matches\x00') bind$can_raw(r0, &(0x7f0000000600), 0x10) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000380)={0xfffffffffffffffb, 0x3, 0xa108}) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) getsockopt$inet_dccp_buf(r4, 0x21, 0xf, &(0x7f0000000080)=""/127, &(0x7f0000000140)=0x7f) getsockopt$inet_udp_int(r4, 0x11, 0x6f, &(0x7f0000000280), &(0x7f0000000400)=0x4) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0xc6) socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_FILL_RING(r7, 0x11b, 0x5, &(0x7f00000008c0)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r7, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x0, r6}, 0x10) dup3(r5, r7, 0x0) [ 1436.562496][T26212] device team0 entered promiscuous mode [ 1436.569045][T26212] device team_slave_0 entered promiscuous mode [ 1436.576906][T26212] device team_slave_1 entered promiscuous mode [ 1436.592667][T26212] 8021q: adding VLAN 0 to HW filter on device team0 [ 1436.639844][T25942] device team0 left promiscuous mode [ 1436.645488][T25942] device team_slave_0 left promiscuous mode [ 1436.651746][T25942] device team_slave_1 left promiscuous mode [ 1436.661053][T26097] device team0 entered promiscuous mode [ 1436.667902][T26097] device team_slave_0 entered promiscuous mode [ 1436.679365][T26097] device team_slave_1 entered promiscuous mode [ 1436.688481][T26097] 8021q: adding VLAN 0 to HW filter on device team0 14:40:11 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:11 executing program 5: r0 = socket(0xe, 0x800, 0xfffffffffffff001) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x2, 0x9, 0x3, 0x81, 0x8}) accept4(r1, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80, 0x800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000280)={0x2, 0x9, 0x4, 0x40, {0x77359400}, {0x2, 0xd, 0x1, 0xffff, 0x0, 0x0, "826c8a12"}, 0x7fffffff, 0x7, @offset=0x5, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) sendto$inet(r2, &(0x7f0000000240)='\x00', 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x8, 0x4, 0x800, 0xff00000000000000, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000100)={r5, 0x6}, &(0x7f0000000140)=0x8) splice(r0, 0x0, r4, 0x0, 0x1, 0x0) 14:40:11 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x10000000) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) 14:40:11 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1436.824420][T26650] [ 1436.826829][T26650] ====================================================== [ 1436.833858][T26650] WARNING: possible circular locking dependency detected [ 1436.840886][T26650] 5.1.0-rc1+ #35 Not tainted [ 1436.845481][T26650] ------------------------------------------------------ [ 1436.851687][T26652] device team0 entered promiscuous mode [ 1436.852502][T26650] syz-executor.2/26650 is trying to acquire lock: [ 1436.852511][T26650] 0000000033c919a2 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 1436.852542][T26650] [ 1436.852542][T26650] but task is already holding lock: [ 1436.852557][T26650] 00000000cfadf4a6 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 1436.858118][T26652] device team_slave_0 entered promiscuous mode [ 1436.864488][T26650] [ 1436.864488][T26650] which lock already depends on the new lock. [ 1436.864488][T26650] [ 1436.864493][T26650] [ 1436.864493][T26650] the existing dependency chain (in reverse order) is: [ 1436.864497][T26650] [ 1436.864497][T26650] -> #2 (&pipe->mutex/1){+.+.}: [ 1436.864525][T26650] lock_acquire+0x16f/0x3f0 [ 1436.864537][T26650] __mutex_lock+0xf7/0x1310 [ 1436.864549][T26650] mutex_lock_nested+0x16/0x20 [ 1436.864562][T26650] fifo_open+0x159/0xb00 [ 1436.864582][T26650] do_dentry_open+0x488/0x1160 [ 1436.902580][T26652] device team_slave_1 entered promiscuous mode [ 1436.903817][T26650] vfs_open+0xa0/0xd0 [ 1436.903830][T26650] path_openat+0x10e9/0x46e0 [ 1436.903850][T26650] do_filp_open+0x1a1/0x280 [ 1436.955068][T26652] 8021q: adding VLAN 0 to HW filter on device team0 14:40:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x9) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) [ 1436.955807][T26650] do_open_execat+0x137/0x690 [ 1436.955822][T26650] __do_execve_file.isra.0+0x178d/0x23f0 [ 1436.955835][T26650] __x64_sys_execve+0x8f/0xc0 [ 1436.955858][T26650] do_syscall_64+0x103/0x610 [ 1436.994401][T26650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.994408][T26650] [ 1436.994408][T26650] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 1436.994431][T26650] lock_acquire+0x16f/0x3f0 14:40:11 executing program 2: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file1\x00', 0x400100, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1003080, 0x0) quotactl(0x2080000201, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) [ 1436.994445][T26650] __mutex_lock+0xf7/0x1310 14:40:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x10000000) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) [ 1436.994459][T26650] mutex_lock_killable_nested+0x16/0x20 [ 1436.994471][T26650] lock_trace+0x4a/0xe0 [ 1436.994482][T26650] proc_pid_syscall+0x98/0x250 [ 1436.994494][T26650] proc_single_show+0xf6/0x170 14:40:11 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x2c}, {0x6}]}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20ncci\x00', 0x100, 0x0) 14:40:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) ioctl$KDDELIO(r2, 0x541b, 0x70a000) [ 1436.994506][T26650] seq_read+0x4db/0x1130 [ 1436.994519][T26650] do_iter_read+0x4a9/0x660 [ 1436.994531][T26650] vfs_readv+0xf0/0x160 [ 1436.994544][T26650] default_file_splice_read+0x475/0x890 [ 1436.994554][T26650] do_splice_to+0x12a/0x190 [ 1436.994566][T26650] splice_direct_to_actor+0x2d2/0x970 [ 1436.994578][T26650] do_splice_direct+0x1da/0x2a0 [ 1436.994590][T26650] do_sendfile+0x597/0xd00 [ 1436.994605][T26650] __x64_sys_sendfile64+0x1dd/0x220 [ 1436.994618][T26650] do_syscall_64+0x103/0x610 [ 1436.994630][T26650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.994633][T26650] [ 1436.994633][T26650] -> #0 (&p->lock){+.+.}: 14:40:12 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x2c}, {0x6}]}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20ncci\x00', 0x100, 0x0) [ 1436.994653][T26650] __lock_acquire+0x239c/0x3fb0 [ 1436.994664][T26650] lock_acquire+0x16f/0x3f0 [ 1436.994676][T26650] __mutex_lock+0xf7/0x1310 [ 1436.994689][T26650] mutex_lock_nested+0x16/0x20 [ 1436.994699][T26650] seq_read+0x71/0x1130 [ 1436.994710][T26650] proc_reg_read+0x1fe/0x2c0 [ 1436.994721][T26650] do_iter_read+0x4a9/0x660 [ 1436.994733][T26650] vfs_readv+0xf0/0x160 14:40:12 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1436.994745][T26650] default_file_splice_read+0x475/0x890 [ 1436.994756][T26650] do_splice_to+0x12a/0x190 [ 1436.994767][T26650] do_splice+0x10a9/0x13c0 [ 1436.994778][T26650] __x64_sys_splice+0x2c6/0x330 [ 1436.994790][T26650] do_syscall_64+0x103/0x610 [ 1436.994803][T26650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.994807][T26650] [ 1436.994807][T26650] other info that might help us debug this: [ 1436.994807][T26650] [ 1436.994810][T26650] Chain exists of: [ 1436.994810][T26650] &p->lock --> &sig->cred_guard_mutex --> &pipe->mutex/1 [ 1436.994810][T26650] [ 1436.994828][T26650] Possible unsafe locking scenario: [ 1436.994828][T26650] [ 1436.994832][T26650] CPU0 CPU1 [ 1436.994835][T26650] ---- ---- [ 1436.994837][T26650] lock(&pipe->mutex/1); [ 1436.994846][T26650] lock(&sig->cred_guard_mutex); [ 1436.994854][T26650] lock(&pipe->mutex/1); [ 1436.994863][T26650] lock(&p->lock); [ 1436.994870][T26650] [ 1436.994870][T26650] *** DEADLOCK *** [ 1436.994870][T26650] [ 1436.994878][T26650] 1 lock held by syz-executor.2/26650: [ 1436.994881][T26650] #0: 00000000cfadf4a6 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 1436.994909][T26650] [ 1436.994909][T26650] stack backtrace: [ 1436.994923][T26650] CPU: 1 PID: 26650 Comm: syz-executor.2 Not tainted 5.1.0-rc1+ #35 [ 1436.994937][T26650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.994941][T26650] Call Trace: [ 1436.994961][T26650] dump_stack+0x172/0x1f0 [ 1436.994978][T26650] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1436.994993][T26650] check_prev_add.constprop.0+0xf11/0x23c0 [ 1436.995008][T26650] ? check_usage+0x570/0x570 [ 1436.995020][T26650] ? __lock_acquire+0x548/0x3fb0 [ 1436.995035][T26650] ? graph_lock+0x7b/0x200 [ 1436.995048][T26650] ? __lockdep_reset_lock+0x450/0x450 [ 1436.995063][T26650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1436.995077][T26650] __lock_acquire+0x239c/0x3fb0 [ 1436.995096][T26650] ? mark_held_locks+0xf0/0xf0 [ 1436.995113][T26650] lock_acquire+0x16f/0x3f0 [ 1436.995125][T26650] ? seq_read+0x71/0x1130 [ 1436.995140][T26650] ? seq_read+0x71/0x1130 [ 1436.995153][T26650] __mutex_lock+0xf7/0x1310 [ 1436.995164][T26650] ? seq_read+0x71/0x1130 [ 1436.995176][T26650] ? seq_read+0x71/0x1130 [ 1436.995191][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.995205][T26650] ? mutex_trylock+0x1e0/0x1e0 [ 1436.995222][T26650] ? aa_file_perm+0x432/0xeb0 [ 1436.995238][T26650] ? get_page_from_freelist+0x129c/0x4170 [ 1436.995253][T26650] ? aa_path_link+0x460/0x460 [ 1436.995266][T26650] ? seq_dentry+0x2d0/0x2d0 [ 1436.995281][T26650] mutex_lock_nested+0x16/0x20 [ 1436.995294][T26650] ? fsnotify+0x811/0xbc0 [ 1436.995308][T26650] ? mutex_lock_nested+0x16/0x20 [ 1436.995328][T26650] seq_read+0x71/0x1130 [ 1436.995345][T26650] ? seq_dentry+0x2d0/0x2d0 [ 1436.995358][T26650] proc_reg_read+0x1fe/0x2c0 [ 1436.995371][T26650] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 1436.995387][T26650] ? rw_verify_area+0x118/0x360 [ 1436.995401][T26650] do_iter_read+0x4a9/0x660 [ 1436.995414][T26650] ? dup_iter+0x260/0x260 [ 1436.995430][T26650] vfs_readv+0xf0/0x160 [ 1436.995442][T26650] ? alloc_pages_current+0x10f/0x210 [ 1436.995458][T26650] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1436.995471][T26650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1436.995488][T26650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1436.995504][T26650] ? iov_iter_revert+0xaa0/0xaa0 [ 1436.995518][T26650] ? aa_file_perm+0x40b/0xeb0 [ 1436.995530][T26650] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1436.995543][T26650] ? iov_iter_pipe+0xba/0x2f0 [ 1436.995558][T26650] default_file_splice_read+0x475/0x890 [ 1436.995572][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.995589][T26650] ? iter_file_splice_write+0xbe0/0xbe0 [ 1436.995604][T26650] ? lock_acquire+0x16f/0x3f0 [ 1436.995617][T26650] ? pipe_lock+0x6e/0x80 [ 1436.995632][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.995645][T26650] ? fsnotify+0x811/0xbc0 [ 1436.995660][T26650] ? fsnotify+0xbc0/0xbc0 [ 1436.995675][T26650] ? fsnotify_first_mark+0x210/0x210 [ 1436.995689][T26650] ? find_held_lock+0x35/0x130 [ 1436.995708][T26650] ? security_file_permission+0x94/0x380 [ 1436.995724][T26650] ? rw_verify_area+0x118/0x360 [ 1436.995737][T26650] ? iter_file_splice_write+0xbe0/0xbe0 [ 1436.995749][T26650] do_splice_to+0x12a/0x190 [ 1436.995763][T26650] do_splice+0x10a9/0x13c0 [ 1436.995779][T26650] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1436.995794][T26650] ? __fget_light+0x1a9/0x230 [ 1436.995808][T26650] __x64_sys_splice+0x2c6/0x330 [ 1436.995825][T26650] do_syscall_64+0x103/0x610 [ 1436.995839][T26650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.995850][T26650] RIP: 0033:0x458209 [ 1436.995866][T26650] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1436.995873][T26650] RSP: 002b:00007f27ce3f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1436.995886][T26650] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 1436.995893][T26650] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000003 [ 1436.995901][T26650] RBP: 000000000073bf00 R08: 0000000000000001 R09: 0000000000000000 [ 1436.995909][T26650] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f27ce3f96d4 [ 1436.995917][T26650] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 00000000ffffffff [ 1437.007149][T26653] device team0 left promiscuous mode [ 1437.007169][T26653] device team_slave_0 left promiscuous mode [ 1437.007566][T26653] device team_slave_1 left promiscuous mode [ 1437.132188][ C1] net_ratelimit: 22 callbacks suppressed [ 1437.132197][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1437.132238][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1437.132596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1437.132848][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1437.165198][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1437.165254][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1437.181217][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1437.181248][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1437.308057][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1437.308086][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1437.446863][T26758] device team0 left promiscuous mode [ 1437.446893][T26758] device team_slave_0 left promiscuous mode [ 1437.447312][T26758] device team_slave_1 left promiscuous mode [ 1437.453479][T26780] device team0 entered promiscuous mode [ 1437.453489][T26780] device team_slave_0 entered promiscuous mode [ 1437.453586][T26780] device team_slave_1 entered promiscuous mode [ 1437.454594][T26780] 8021q: adding VLAN 0 to HW filter on device team0 [ 1437.455267][T26862] device team0 entered promiscuous mode [ 1437.455276][T26862] device team_slave_0 entered promiscuous mode [ 1437.455388][T26862] device team_slave_1 entered promiscuous mode [ 1437.456372][T26862] 8021q: adding VLAN 0 to HW filter on device team0 [ 1437.477031][T26758] device team0 left promiscuous mode [ 1437.477095][T26758] device team_slave_0 left promiscuous mode [ 1437.478223][T26758] device team_slave_1 left promiscuous mode [ 1437.518205][T26862] device team0 entered promiscuous mode [ 1437.518217][T26862] device team_slave_0 entered promiscuous mode [ 1437.518351][T26862] device team_slave_1 entered promiscuous mode [ 1437.533786][T26862] 8021q: adding VLAN 0 to HW filter on device team0 [ 1437.652923][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1437.652964][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1437.683886][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1437.683914][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1437.686601][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1437.686626][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1437.691587][T27379] device team0 left promiscuous mode [ 1437.691624][T27379] device team_slave_0 left promiscuous mode [ 1437.692524][T27379] device team_slave_1 left promiscuous mode [ 1437.704164][T27379] device team0 entered promiscuous mode [ 1437.704196][T27379] device team_slave_0 entered promiscuous mode [ 1437.704629][T27379] device team_slave_1 entered promiscuous mode [ 1437.712976][T27379] 8021q: adding VLAN 0 to HW filter on device team0 [ 1438.102232][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.480446][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.490036][T27382] device team0 left promiscuous mode [ 1438.495505][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.495542][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.495604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.495634][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:40:13 executing program 5: r0 = socket(0x11, 0x802, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$smack_current(r1, &(0x7f0000000080)='team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0xf) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:40:13 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x2c}, {0x6}]}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20ncci\x00', 0x100, 0x0) 14:40:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x10000000) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) 14:40:13 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1438.497845][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1438.530108][T27382] device team_slave_0 left promiscuous mode [ 1438.534608][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1438.550715][T27382] device team_slave_1 left promiscuous mode 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x2c}, {0x6}]}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20ncci\x00', 0x100, 0x0) 14:40:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x10000000) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) [ 1438.572840][T27387] device team0 entered promiscuous mode [ 1438.579436][T27387] device team_slave_0 entered promiscuous mode [ 1438.586719][T27387] device team_slave_1 entered promiscuous mode [ 1438.600872][T27387] 8021q: adding VLAN 0 to HW filter on device team0 [ 1438.611176][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1438.618689][T27394] device team0 left promiscuous mode 14:40:13 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x2c}, {0x6}]}, 0x10) [ 1438.625983][T27394] device team_slave_0 left promiscuous mode [ 1438.639150][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1438.639158][T27394] device team_slave_1 left promiscuous mode 14:40:13 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1438.689020][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1438.710199][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000000)) [ 1438.776905][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1438.806373][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0x2) [ 1438.900140][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1438.907462][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1438.946562][T27399] device team0 entered promiscuous mode [ 1438.954831][T27399] device team_slave_0 entered promiscuous mode [ 1438.961311][T27399] device team_slave_1 entered promiscuous mode [ 1438.969738][T27399] 8021q: adding VLAN 0 to HW filter on device team0 [ 1438.977570][T27408] device team0 left promiscuous mode [ 1438.983582][T27408] device team_slave_0 left promiscuous mode [ 1438.990027][T27408] device team_slave_1 left promiscuous mode 14:40:13 executing program 5: r0 = socket(0x11, 0x802, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x28, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x6, 0x0, &(0x7f0000000080)={r2, r3+10000000}, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x5, 0x7, 0x2, 0x3, 0x3, 0x10000, 0x80000000, 0x9, 0x0}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x72, "1270e1afe63442c1f4f2817d15f2266e656ef18eaed3ce12e05629805f6dc26ae625715fb04a9fbf5ab6c805c1ea8c891d59a096efed8bb14dba5c68bf436c149bfcad3da5d7116ce896cf387e6a8abecebd2db5b2c4a09698020d433f6040fd6fb8015953cf70353aa14334837dd5042f75"}, &(0x7f0000000380)=0x7a) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x82980, 0x0) 14:40:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x10000000) 14:40:13 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r0, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r1 = socket(0x11, 0x802, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) [ 1439.038729][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1439.056696][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) 14:40:13 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) r2 = add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="4c6a1802", 0x4, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) [ 1439.209621][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1439.220294][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1439.233545][T27435] device team0 entered promiscuous mode [ 1439.239332][T27435] device team_slave_0 entered promiscuous mode [ 1439.247772][T27435] device team_slave_1 entered promiscuous mode [ 1439.260524][T27435] 8021q: adding VLAN 0 to HW filter on device team0 [ 1439.296695][T27626] device team0 left promiscuous mode [ 1439.303751][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1439.306028][T27626] device team_slave_0 left promiscuous mode [ 1439.310892][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1439.327848][T27626] device team_slave_1 left promiscuous mode [ 1439.385362][T27632] device team0 entered promiscuous mode [ 1439.391082][T27632] device team_slave_0 entered promiscuous mode [ 1439.398918][T27632] device team_slave_1 entered promiscuous mode [ 1439.407915][T27632] 8021q: adding VLAN 0 to HW filter on device team0 [ 1439.416809][T27407] device team0 left promiscuous mode [ 1439.422394][T27407] device team_slave_0 left promiscuous mode [ 1439.428650][T27407] device team_slave_1 left promiscuous mode [ 1439.444728][T27435] device team0 entered promiscuous mode [ 1439.451488][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1439.452606][T27435] device team_slave_0 entered promiscuous mode [ 1439.458818][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1439.468578][T27435] device team_slave_1 entered promiscuous mode [ 1439.485459][T27435] 8021q: adding VLAN 0 to HW filter on device team0 14:40:14 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) 14:40:14 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="42e30178a538bb258916e58cffd0582428a493657e0608f021b4d957156e8ef1b801614e4623521b14efd1134a5878816fbb6d978e121b6694760b4fb44f09ae2fdd5bd0723e0bea06dcc4ab7ca2e4cf51c3ae6ecf73bd4cc6f35e38e8b9d4e24a916824f31b9e1575fba3d7c8f519fbb7d69dba8df9", 0x76, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) 14:40:14 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:14 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:14 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x40, 0xfffffffffffffff7, 0xe4de, 0x6}, {0x7fffffff, 0x5, 0xfffffffffffffff9, 0x7}, {0x301, 0x6, 0xfffffffffffffe01, 0x3}]}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1439.558089][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1439.571946][T27647] device team0 left promiscuous mode [ 1439.586344][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1439.596966][T27647] device team_slave_0 left promiscuous mode 14:40:14 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5b2793f2c1eca6fb6e480819478f57a7e782f70d706bb73e11c3cc8d7c6e2cc5571a1a841b7000caa62ffa7df4edfbe4642c7d9ec6002410b566b6aa4d377729fbe95c553d74a", 0x47, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0}, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) 14:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) [ 1439.605670][T27647] device team_slave_1 left promiscuous mode 14:40:14 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) [ 1439.640654][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1439.650146][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:14 executing program 1: keyctl$dh_compute(0x17, 0x0, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) 14:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:14 executing program 1: keyctl$dh_compute(0x17, 0x0, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) [ 1439.716354][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1439.748882][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1439.796220][T27654] device team0 left promiscuous mode [ 1439.815569][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1439.822707][T27654] device team_slave_0 left promiscuous mode [ 1439.823156][T27654] device team_slave_1 left promiscuous mode [ 1439.832972][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1439.850957][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1439.857290][T27668] device team0 entered promiscuous mode [ 1439.860682][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1439.871852][T27668] device team_slave_0 entered promiscuous mode [ 1439.878747][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1439.880532][T27668] device team_slave_1 entered promiscuous mode [ 1439.888123][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1439.897574][T27668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1439.912035][T27671] device team0 entered promiscuous mode [ 1439.922278][T27671] device team_slave_0 entered promiscuous mode [ 1439.929145][T27671] device team_slave_1 entered promiscuous mode [ 1439.938134][T27671] 8021q: adding VLAN 0 to HW filter on device team0 [ 1439.955405][T27654] device team0 left promiscuous mode [ 1439.960889][T27654] device team_slave_0 left promiscuous mode [ 1439.967281][T27654] device team_slave_1 left promiscuous mode [ 1439.975651][T27671] device team0 entered promiscuous mode [ 1439.981249][T27671] device team_slave_0 entered promiscuous mode [ 1439.987959][T27671] device team_slave_1 entered promiscuous mode [ 1439.996309][T27671] 8021q: adding VLAN 0 to HW filter on device team0 14:40:14 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:14 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:14 executing program 1: keyctl$dh_compute(0x17, 0x0, &(0x7f00000003c0)=""/208, 0xd0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) 14:40:14 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:14 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) r1 = syz_open_dev$usb(&(0x7f00000016c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0xa2041) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001780)={r1, 0x8000, 0x3, "f2100a855fe20b78fd43686708a50910e7b8b9ad54c357610ac5717b1cea596d84a8c42a13656b0765a35844038c9abf0fcc4c8bff82fa481b99033b24d013db328e2e76285930d67561e8fd23592b9b72d46100aafba67c7eb410dc1466a328a26a805521c9656fd0760bba7b596672745d5b07ab2acfe0cd82b37afb91602e53e25bcbebdffd34001f20a87805bfa80b8dd1d12e7b4ba1bcd4e2e650d8bb15dbb426187c415bcf280b56cb62f4bacb2a6fa11ce1297acc9a2b355f0bcf7843866cd0624f6b184f4dd26cf19dd1b37fd900d38026da787be8d9fae0c4ad37429ad80bc2deae74cf0d387c69947bfcf46eb4c0d59b"}) sendmmsg(r0, &(0x7f00000015c0)=[{{&(0x7f0000001700)=@caif=@dgm={0x25, 0x3, 0x8}, 0xfffffffffffffd5b, &(0x7f0000000380)=[{&(0x7f00000000c0)="330ac9f61f692eeba4908326ec0c6ad8f8cf499640e72368f41d8419e5946fa4d4810acf6a9d5b6c6d6a67b82252ffd1ee6475ae5c836540b6621d451b5a31e36e08772f4e78d5a8a8aa77b850385418d650f176dea6da9288dfb29f3d4057a7bffee04480dd7bcb73c9c4ef38c1ba8571f8a20b5a8dbdfd7c71b5fd416902d0b2487cd923a7cf2dc0d5880a9dad2f320aa1f0bddbee9a4674f41e13be0181f64df57b26aa6f", 0xa6}, {&(0x7f0000000180)="ec104e36acdcf0645cada289584edb05b468630aeae432c7717f2533e98d354e2ecee6ed04432d3ed19cb72d4579bb419f0e8037a543d36bb94cdf10f6bf90b7e7ebb872fb4de4fd2f2071a5f3f1968bb5d27e3233defbbae5c89558bf37a58b7a274e5f3c786481d2ff088054b2e1e8809ef5db6370088fa9c2fa7c1082e767fd343f58c40a172a353fcacacdcbd8395c8126ac1925f97fbb3bf3d3c516f87756283f3854aed4401898e604a2895cb8bb630f46d782fc8e35c93c784871acf42065e7267a4fa936690441a06412bbcb55d4abc197264d1a736bb47b3c3da331be", 0xe1}, {&(0x7f0000000280)="c3e617c3d8b6e14715367e018fe76960c62e8ea0cd0bd6e24d4e4b9014b478ca870643e1d97e987f4a06ce8a6d9e5e0893149b34d071489f3796f3b3172150f9da22629d512f4de3619e40f9eec567e8fb48828d7fce0b6f2e9ecd8ab2d448217ad9c75140bd7b5459759c9597f187fe56c7aad9cfe58ee8526d1da5bac7766840849c17f71c30a3953518aabf19a71dca00ae0d8b4453f107656d48043f6699765b0542e69bda91c167eeffaacbafb35a6540d2db3baa62c84e0a53d8299010960e7feaf95a13bd3d3e0b4fab2a9e6233fbe1df0a0eb84f328e2eed3be2501cb1af7bcbd8cb0a249bb066c979394a", 0xef}], 0x3, &(0x7f00000003c0)=[{0x38, 0x0, 0xfffffffffffffff7, "330ef6fec06914b29021c738e17cf4064e044f0421a654203b08055a1cbede28784738a2b5df"}, {0x1010, 0x10b, 0x10000, "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"}, {0xd8, 0x10a, 0x2, "cef875f8ff4840ee253cbbda2953570b111c8f8478a638cd38bdde34d5d6341ec45298f79f6ac48b3552f8906861734d53f25ca2483fe16bb9d4ad1af791d6dbc0bf5ec8dc5d9858db26718ea61336e7c6c350dbf275e74b4408a30dd95f661f10f66f199eeb01eb19007db61f36aa1395b17cd2d11533966f82ec3891f6a72a8792b0ba39fecff544e3a6bf40d06d6cc1dbf8f38af1a01a07a650ab188fd672b71c785209c418ebbee05236303fdd6dfd98b7a86cdb149b127a33d42758749f825004b06f81fc61"}, {0x28, 0x10b, 0x6, "e99b535a0798c2472c8db11d58cb567dda23cf7f"}, {0x48, 0x1, 0x80, "1acf3c17421a3a8b91adea18eb48eaf61af58cd10b6539a349ddbf6fd9c51e6f217959e3ba3468d4782189bbd4ff2e8fdde2e7a13d"}, {0x48, 0x1, 0x6, "cd83d53fe3d8d897809c73058996d6d923b6503670d91776aaaa9246b637db0230837f6bcfedee2ae74d7916284a10add6ea58cfd2ed42"}], 0x11d8}, 0x3}], 0x1, 0x40c0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001900)=0xfd0, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001680)={'ip6_vti0\x00', &(0x7f0000001600)=@ethtool_gstrings={0x1b, 0x0, 0x3f, "3dbe31128d14fcfaf66dbcecd9df76498d75b1498634a1f030b57d0af336966f7f1eeb17be500f3afdd0320ab2fc3f3374f1cffb8d6736264fb9ba9c7c7bbd"}}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xd9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000001880)={r2, 0x1000, 0x5}, &(0x7f00000018c0)=0x8) 14:40:14 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}, &(0x7f0000000500)}) 14:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1440.069469][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1440.080822][T27786] device team0 left promiscuous mode [ 1440.095230][T27786] device team_slave_0 left promiscuous mode [ 1440.098085][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1440.102782][T27786] device team_slave_1 left promiscuous mode 14:40:14 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, 0x0) 14:40:14 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) fadvise64(r0, 0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000200)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 1440.149480][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1440.183197][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:14 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, 0x0) 14:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1440.215450][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1440.267403][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1440.301785][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1440.326766][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.337198][T27789] device team0 left promiscuous mode [ 1440.342868][T27789] device team_slave_0 left promiscuous mode [ 1440.346907][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1440.357373][T27789] device team_slave_1 left promiscuous mode [ 1440.362444][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1440.369793][T27793] device team0 entered promiscuous mode [ 1440.381678][T27793] device team_slave_0 entered promiscuous mode [ 1440.388523][T27793] device team_slave_1 entered promiscuous mode [ 1440.397025][T27793] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.404462][T27810] device team0 entered promiscuous mode [ 1440.410152][T27810] device team_slave_0 entered promiscuous mode [ 1440.416894][T27810] device team_slave_1 entered promiscuous mode [ 1440.424310][T27810] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.443145][T27789] device team0 left promiscuous mode [ 1440.448722][T27789] device team_slave_0 left promiscuous mode [ 1440.455301][T27789] device team_slave_1 left promiscuous mode [ 1440.463227][T27810] device team0 entered promiscuous mode [ 1440.468869][T27810] device team_slave_0 entered promiscuous mode [ 1440.476982][T27810] device team_slave_1 entered promiscuous mode [ 1440.484194][T27810] 8021q: adding VLAN 0 to HW filter on device team0 14:40:15 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:15 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, 0x0) 14:40:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:15 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:15 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1440.561733][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1440.576503][T27912] device team0 left promiscuous mode [ 1440.592226][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1440.598530][T27912] device team_slave_0 left promiscuous mode 14:40:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:15 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) 14:40:15 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x80000000000, &(0x7f0000000080)=0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) [ 1440.616268][T27912] device team_slave_1 left promiscuous mode [ 1440.627704][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1440.650573][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:15 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) 14:40:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1440.678406][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1440.693625][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:40:15 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) 14:40:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1440.759411][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1440.769735][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.824748][T27920] device team0 left promiscuous mode [ 1440.831617][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1440.834490][T27920] device team_slave_0 left promiscuous mode [ 1440.838985][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.847064][T27920] device team_slave_1 left promiscuous mode [ 1440.866545][T27922] device team0 entered promiscuous mode [ 1440.872211][T27922] device team_slave_0 entered promiscuous mode [ 1440.878579][T27922] device team_slave_1 entered promiscuous mode [ 1440.888667][T27922] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.896276][T27923] device team0 entered promiscuous mode [ 1440.901848][T27923] device team_slave_0 entered promiscuous mode [ 1440.911164][T27923] device team_slave_1 entered promiscuous mode [ 1440.919842][T27923] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.928864][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1440.940347][T27920] device team0 left promiscuous mode [ 1440.942482][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1440.948856][T27920] device team_slave_0 left promiscuous mode [ 1440.965089][T27920] device team_slave_1 left promiscuous mode [ 1440.973843][T27923] device team0 entered promiscuous mode [ 1440.979496][T27923] device team_slave_0 entered promiscuous mode [ 1440.986141][T27923] device team_slave_1 entered promiscuous mode [ 1440.993586][T27923] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.011177][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env 14:40:15 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:15 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={'sha224\x00'}}) 14:40:15 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:15 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:15 executing program 5: r0 = socket(0x12, 0x80004, 0x4) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@alg={0xe8, 0x10, 0x110, 0x70bd2a, 0x25dfdbfb, {{'drbg_nopr_sha384\x00'}, [], [], 0x400, 0x2000}, [{0x8, 0x1, 0x2}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0x4a00}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8008000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x134, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4c6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcb8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4000085}, 0x40000) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000dc0)={@remote, @rand_addr="e81f6c796a5e81f90c27126459dbf30e", @remote, 0x9, 0x100, 0x2, 0x0, 0x8, 0x0, r1}) [ 1441.018702][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1441.050244][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1441.073042][T28060] device team0 entered promiscuous mode [ 1441.081795][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:40:15 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1441.094680][T28060] device team_slave_0 entered promiscuous mode [ 1441.118922][T28060] device team_slave_1 entered promiscuous mode 14:40:15 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:40:15 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1441.158036][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1441.163222][T28060] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.168791][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1441.183284][T28051] device team0 left promiscuous mode [ 1441.188705][T28051] device team_slave_0 left promiscuous mode [ 1441.197524][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env 14:40:15 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1441.207578][T28051] device team_slave_1 left promiscuous mode [ 1441.211684][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:15 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1441.255111][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1441.270450][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1441.315420][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1441.328147][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1441.410587][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1441.418968][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1441.464804][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1441.473193][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1441.485913][T28062] device team0 left promiscuous mode [ 1441.491304][T28062] device team_slave_0 left promiscuous mode [ 1441.498608][T28062] device team_slave_1 left promiscuous mode [ 1441.509926][T28127] device team0 entered promiscuous mode [ 1441.515857][T28127] device team_slave_0 entered promiscuous mode [ 1441.522306][T28127] device team_slave_1 entered promiscuous mode [ 1441.529508][T28127] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.537302][T28136] device team0 entered promiscuous mode [ 1441.543789][T28136] device team_slave_0 entered promiscuous mode [ 1441.550239][T28136] device team_slave_1 entered promiscuous mode [ 1441.558162][T28136] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.567000][T28171] device team0 left promiscuous mode [ 1441.574932][T28171] device team_slave_0 left promiscuous mode [ 1441.581749][T28171] device team_slave_1 left promiscuous mode [ 1441.675057][T28368] device team0 left promiscuous mode [ 1441.680563][T28368] device team_slave_0 left promiscuous mode [ 1441.687024][T28368] device team_slave_1 left promiscuous mode [ 1441.780073][T28062] device team0 left promiscuous mode [ 1441.785758][T28062] device team_slave_0 left promiscuous mode [ 1441.787285][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1441.795311][T28062] device team_slave_1 left promiscuous mode [ 1441.801239][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1441.806420][T28136] device team0 entered promiscuous mode [ 1441.821175][T28136] device team_slave_0 entered promiscuous mode 14:40:16 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00', 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) recvfrom(r0, &(0x7f0000000040)=""/69, 0x45, 0x40002121, 0x0, 0x0) 14:40:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:16 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:16 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:16 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1441.827798][T28136] device team_slave_1 entered promiscuous mode [ 1441.835370][T28136] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.889435][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1441.911852][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1441.915381][T28500] device team0 entered promiscuous mode [ 1441.926995][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env 14:40:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1441.945812][T28500] device team_slave_0 entered promiscuous mode [ 1441.947038][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1441.953060][T28500] device team_slave_1 entered promiscuous mode [ 1441.973811][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env 14:40:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1441.994853][T28500] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.996068][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.016720][T28504] device team0 entered promiscuous mode [ 1442.024337][T28504] device team_slave_0 entered promiscuous mode [ 1442.040373][T28504] device team_slave_1 entered promiscuous mode 14:40:16 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.055950][T28504] 8021q: adding VLAN 0 to HW filter on device team0 [ 1442.076842][T28501] device team0 left promiscuous mode [ 1442.083277][T28501] device team_slave_0 left promiscuous mode [ 1442.090476][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.096018][T28501] device team_slave_1 left promiscuous mode 14:40:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.101330][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.158756][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.166203][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.215537][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.224934][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.272517][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.279696][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.328393][T28506] device team0 left promiscuous mode [ 1442.334260][T28506] device team_slave_0 left promiscuous mode [ 1442.340344][T28506] device team_slave_1 left promiscuous mode [ 1442.350074][T28510] device team0 entered promiscuous mode [ 1442.356178][T28510] device team_slave_0 entered promiscuous mode [ 1442.362800][T28510] device team_slave_1 entered promiscuous mode [ 1442.369870][T28510] 8021q: adding VLAN 0 to HW filter on device team0 [ 1442.377216][T28511] device team0 entered promiscuous mode [ 1442.385227][T28511] device team_slave_0 entered promiscuous mode [ 1442.391718][T28511] device team_slave_1 entered promiscuous mode [ 1442.400222][T28511] 8021q: adding VLAN 0 to HW filter on device team0 [ 1442.418106][T28570] device team0 left promiscuous mode 14:40:17 executing program 5: r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x0, 0x3ff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x300000000000000}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:17 executing program 2: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1442.426553][T28570] device team_slave_0 left promiscuous mode [ 1442.434363][T28570] device team_slave_1 left promiscuous mode [ 1442.448074][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env [ 1442.455562][ T3876] kobject: 'loop2' (00000000959db17d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1442.506757][ T3876] kobject: 'loop5' (00000000df226e1b): kobject_uevent_env [ 1442.522068][ T3876] kobject: 'loop5' (00000000df226e1b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1442.554517][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.561915][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.582174][ C0] net_ratelimit: 18 callbacks suppressed [ 1442.582183][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.593623][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.623684][T28511] device team0 left promiscuous mode [ 1442.629462][T28511] device team_slave_0 left promiscuous mode [ 1442.651357][T28511] device team_slave_1 left promiscuous mode [ 1442.652372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.659195][T28506] device team0 entered promiscuous mode [ 1442.663244][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.668729][T28506] device team_slave_0 entered promiscuous mode [ 1442.674722][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.681013][T28506] device team_slave_1 entered promiscuous mode [ 1442.686540][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.695507][T28506] 8021q: adding VLAN 0 to HW filter on device team0 [ 1442.707011][T28735] device team0 left promiscuous mode [ 1442.716141][T28735] device team_slave_0 left promiscuous mode 14:40:17 executing program 3: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:17 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() keyctl$chown(0x4, r1, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x100000000, &(0x7f0000ffd000/0x3000)=nil, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffd000/0x2000)=nil, 0x1) r2 = socket(0x11, 0x802, 0x0) fcntl$getown(r0, 0x9) sched_rr_get_interval(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000440)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/55, 0x37}, &(0x7f0000000180), 0x55}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00L\x00\x00`\x00', 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x1c9) socket$kcm(0x29, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x8) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.727877][T28735] device team_slave_1 left promiscuous mode [ 1442.736418][ T3876] kobject: 'loop3' (00000000342aca70): kobject_uevent_env [ 1442.746773][ T3876] kobject: 'loop3' (00000000342aca70): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.786693][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.796254][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.812187][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.818029][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.876694][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.886330][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:40:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1442.932603][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1442.949047][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.995433][T28740] device team0 entered promiscuous mode [ 1443.007794][T28740] device team_slave_0 entered promiscuous mode [ 1443.014908][T28740] device team_slave_1 entered promiscuous mode [ 1443.024300][ T3876] kobject: 'loop4' (0000000045331404): kobject_uevent_env [ 1443.031496][ T3876] kobject: 'loop4' (0000000045331404): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1443.045542][T28740] 8021q: adding VLAN 0 to HW filter on device team0 [ 1443.063102][T28739] device team0 left promiscuous mode [ 1443.069631][ T3876] kobject: 'loop2' (00000000959db17d): kobject_uevent_env