Warning: Permanently added '10.128.10.15' (ED25519) to the list of known hosts. 2023/11/07 21:19:16 fuzzer started 2023/11/07 21:19:16 dialing manager at 10.128.0.163:30015 2023/11/07 21:19:16 checking machine... 2023/11/07 21:19:16 checking revisions... 2023/11/07 21:19:16 testing simple program... [ 17.847556][ T27] audit: type=1400 audit(1699391956.444:81): avc: denied { getattr } for pid=3050 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 17.850820][ T27] audit: type=1400 audit(1699391956.444:82): avc: denied { read } for pid=3050 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 17.853618][ T27] audit: type=1400 audit(1699391956.444:83): avc: denied { open } for pid=3050 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 17.861413][ T27] audit: type=1400 audit(1699391956.454:84): avc: denied { mounton } for pid=3058 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 17.862441][ T3058] cgroup: Unknown subsys name 'net' [ 17.864460][ T27] audit: type=1400 audit(1699391956.454:85): avc: denied { mount } for pid=3058 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.868114][ T27] audit: type=1400 audit(1699391956.464:86): avc: denied { unmount } for pid=3058 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.976636][ T3058] cgroup: Unknown subsys name 'rlimit' [ 18.096458][ T27] audit: type=1400 audit(1699391956.694:87): avc: denied { mounton } for pid=3058 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.121247][ T27] audit: type=1400 audit(1699391956.694:88): avc: denied { mount } for pid=3058 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.144559][ T27] audit: type=1400 audit(1699391956.694:89): avc: denied { create } for pid=3058 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 18.152461][ T3059] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.164980][ T27] audit: type=1400 audit(1699391956.694:90): avc: denied { write } for pid=3058 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 18.251311][ T3058] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.423080][ T3076] chnl_net:caif_netlink_parms(): no params data found [ 18.452181][ T3076] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.459415][ T3076] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.466723][ T3076] bridge_slave_0: entered allmulticast mode [ 18.472895][ T3076] bridge_slave_0: entered promiscuous mode [ 18.479479][ T3076] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.486597][ T3076] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.493780][ T3076] bridge_slave_1: entered allmulticast mode [ 18.500327][ T3076] bridge_slave_1: entered promiscuous mode [ 18.515220][ T3076] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 18.525357][ T3076] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 18.542491][ T3076] team0: Port device team_slave_0 added [ 18.548756][ T3076] team0: Port device team_slave_1 added [ 18.562606][ T3076] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 18.569587][ T3076] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 18.595476][ T3076] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 18.606457][ T3076] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 18.613380][ T3076] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 18.639350][ T3076] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 18.662308][ T3076] hsr_slave_0: entered promiscuous mode [ 18.668251][ T3076] hsr_slave_1: entered promiscuous mode [ 18.722973][ T3076] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 18.731600][ T3076] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 18.740126][ T3076] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 18.748493][ T3076] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 18.761456][ T3076] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.768569][ T3076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.775814][ T3076] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.782862][ T3076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.810381][ T3076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 18.821372][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.829397][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.840448][ T3076] 8021q: adding VLAN 0 to HW filter on device team0 [ 18.850243][ T959] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.857341][ T959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.874376][ T3076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 18.884725][ T3076] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 18.899700][ T3092] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.906839][ T3092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.937542][ T3076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 18.991271][ T3076] veth0_vlan: entered promiscuous mode [ 19.001125][ T3076] veth1_vlan: entered promiscuous mode [ 19.014597][ T3076] veth0_macvtap: entered promiscuous mode [ 19.021759][ T3076] veth1_macvtap: entered promiscuous mode [ 19.032562][ T3076] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 19.043272][ T3076] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 19.052196][ T3076] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 19.060957][ T3076] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 19.069759][ T3076] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 19.078515][ T3076] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2023/11/07 21:19:17 building call list... executing program [ 21.276531][ T3054] can: request_module (can-proto-0) failed. [ 21.289286][ T3054] can: request_module (can-proto-0) failed. [ 21.301699][ T3054] can: request_module (can-proto-0) failed. [ 21.459674][ T3054] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 21.567887][ T3054] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 22.505580][ T3076] syz-executor.0 (3076) used greatest stack depth: 10856 bytes left [ 22.515838][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 24.719645][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 24.777633][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 24.837767][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 24.915411][ T27] kauditd_printk_skb: 75 callbacks suppressed [ 24.915419][ T27] audit: type=1400 audit(1699391963.514:166): avc: denied { search } for pid=2816 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 24.943079][ T27] audit: type=1400 audit(1699391963.524:167): avc: denied { read } for pid=2816 comm="dhcpcd" name="n25" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 24.964971][ T27] audit: type=1400 audit(1699391963.524:168): avc: denied { open } for pid=2816 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 24.987875][ T27] audit: type=1400 audit(1699391963.524:169): avc: denied { getattr } for pid=2816 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.011088][ T27] audit: type=1400 audit(1699391963.544:170): avc: denied { read } for pid=3176 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.034056][ T27] audit: type=1400 audit(1699391963.544:171): avc: denied { open } for pid=3176 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.058996][ T27] audit: type=1400 audit(1699391963.544:172): avc: denied { getattr } for pid=3176 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.084530][ T27] audit: type=1400 audit(1699391963.594:173): avc: denied { write } for pid=3175 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.107351][ T27] audit: type=1400 audit(1699391963.594:174): avc: denied { add_name } for pid=3175 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.129711][ T27] audit: type=1400 audit(1699391963.594:175): avc: denied { create } for pid=3175 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.547024][ T11] hsr_slave_0: left promiscuous mode [ 25.552730][ T11] hsr_slave_1: left promiscuous mode [ 25.558788][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 25.566315][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 25.574160][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 25.581606][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 25.589938][ T11] bridge_slave_1: left allmulticast mode [ 25.595625][ T11] bridge_slave_1: left promiscuous mode [ 25.601392][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.609543][ T11] bridge_slave_0: left allmulticast mode [ 25.615208][ T11] bridge_slave_0: left promiscuous mode [ 25.620853][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.630084][ T11] veth1_macvtap: left promiscuous mode [ 25.635575][ T11] veth0_macvtap: left promiscuous mode [ 25.641101][ T11] veth1_vlan: left promiscuous mode [ 25.646337][ T11] veth0_vlan: left promiscuous mode [ 25.713139][ T11] team0 (unregistering): Port device team_slave_1 removed [ 25.722369][ T11] team0 (unregistering): Port device team_slave_0 removed [ 25.731594][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 25.742566][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 25.768562][ T11] bond0 (unregistering): Released all slaves [ 34.597471][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 34.597479][ T27] audit: type=1400 audit(1699391973.194:180): avc: denied { remove_name } for pid=2760 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.626023][ T27] audit: type=1400 audit(1699391973.194:181): avc: denied { rename } for pid=2760 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.648257][ T27] audit: type=1400 audit(1699391973.194:182): avc: denied { create } for pid=2760 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2023/11/07 21:19:48 syscalls: 2880 2023/11/07 21:19:48 code coverage: enabled 2023/11/07 21:19:48 comparison tracing: enabled 2023/11/07 21:19:48 extra coverage: enabled 2023/11/07 21:19:48 delay kcov mmap: enabled 2023/11/07 21:19:48 setuid sandbox: enabled 2023/11/07 21:19:48 namespace sandbox: enabled 2023/11/07 21:19:48 Android sandbox: enabled 2023/11/07 21:19:48 fault injection: enabled 2023/11/07 21:19:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/11/07 21:19:48 net packet injection: enabled 2023/11/07 21:19:48 net device setup: enabled 2023/11/07 21:19:48 concurrency sanitizer: enabled 2023/11/07 21:19:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/11/07 21:19:48 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/11/07 21:19:48 USB emulation: /dev/raw-gadget does not exist 2023/11/07 21:19:48 hci packet injection: /dev/vhci does not exist 2023/11/07 21:19:48 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/11/07 21:19:48 802.15.4 emulation: enabled 2023/11/07 21:19:48 swap file: enabled 2023/11/07 21:19:48 fetching corpus: 0, signal 0/0 (executing program) 2023/11/07 21:19:48 fetching corpus: 0, signal 0/0 (executing program) 2023/11/07 21:19:49 starting 6 fuzzer processes 21:19:49 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) 21:19:49 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:49 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:49 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:49 executing program 3: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 51.425071][ T27] audit: type=1400 audit(1699391989.984:183): avc: denied { read } for pid=3438 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 51.446533][ T27] audit: type=1400 audit(1699391989.984:184): avc: denied { open } for pid=3438 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 51.470040][ T27] audit: type=1400 audit(1699391989.994:185): avc: denied { mounton } for pid=3438 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 51.769665][ T3438] chnl_net:caif_netlink_parms(): no params data found [ 51.829459][ T3440] chnl_net:caif_netlink_parms(): no params data found [ 51.839902][ T3452] chnl_net:caif_netlink_parms(): no params data found [ 51.900088][ T3438] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.907179][ T3438] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.914657][ T3438] bridge_slave_0: entered allmulticast mode [ 51.921162][ T3438] bridge_slave_0: entered promiscuous mode [ 51.928128][ T3438] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.935212][ T3438] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.942305][ T3438] bridge_slave_1: entered allmulticast mode [ 51.949253][ T3438] bridge_slave_1: entered promiscuous mode [ 51.994544][ T3445] chnl_net:caif_netlink_parms(): no params data found [ 52.003692][ T3438] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.015727][ T3438] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.036493][ T3452] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.043590][ T3452] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.050761][ T3452] bridge_slave_0: entered allmulticast mode [ 52.057104][ T3452] bridge_slave_0: entered promiscuous mode [ 52.077353][ T3440] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.084440][ T3440] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.091636][ T3440] bridge_slave_0: entered allmulticast mode [ 52.098037][ T3440] bridge_slave_0: entered promiscuous mode [ 52.117020][ T3452] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.124108][ T3452] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.131331][ T3452] bridge_slave_1: entered allmulticast mode [ 52.137875][ T3452] bridge_slave_1: entered promiscuous mode [ 52.150450][ T3440] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.157595][ T3440] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.164715][ T3440] bridge_slave_1: entered allmulticast mode [ 52.171116][ T3440] bridge_slave_1: entered promiscuous mode [ 52.177680][ T3438] team0: Port device team_slave_0 added [ 52.184297][ T3438] team0: Port device team_slave_1 added [ 52.222169][ T3452] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.248153][ T3440] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.257498][ T3438] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 52.264414][ T3438] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.290696][ T3438] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 52.302684][ T3452] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.321233][ T3445] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.328360][ T3445] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.335749][ T3445] bridge_slave_0: entered allmulticast mode [ 52.341935][ T3445] bridge_slave_0: entered promiscuous mode [ 52.349359][ T3440] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.360362][ T3438] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 52.367339][ T3438] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.393626][ T3438] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 52.409750][ T3452] team0: Port device team_slave_0 added [ 52.420175][ T3445] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.427346][ T3445] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.434504][ T3445] bridge_slave_1: entered allmulticast mode [ 52.440862][ T3445] bridge_slave_1: entered promiscuous mode [ 52.447030][ T3447] chnl_net:caif_netlink_parms(): no params data found [ 52.468479][ T3440] team0: Port device team_slave_0 added [ 52.474722][ T3452] team0: Port device team_slave_1 added [ 52.499228][ T3445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.514122][ T3440] team0: Port device team_slave_1 added [ 52.524525][ T3452] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 52.531498][ T3452] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.557455][ T3452] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 52.579795][ T3438] hsr_slave_0: entered promiscuous mode [ 52.585737][ T3438] hsr_slave_1: entered promiscuous mode [ 52.592489][ T3445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.606287][ T3452] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 52.613230][ T3452] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.639143][ T3452] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 52.676863][ T3440] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 52.683806][ T3440] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.709751][ T3440] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 52.720368][ T3459] chnl_net:caif_netlink_parms(): no params data found [ 52.746993][ T3445] team0: Port device team_slave_0 added [ 52.753980][ T3445] team0: Port device team_slave_1 added [ 52.759911][ T3440] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 52.766880][ T3440] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.792766][ T3440] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 52.809668][ T3447] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.816771][ T3447] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.824007][ T3447] bridge_slave_0: entered allmulticast mode [ 52.830313][ T3447] bridge_slave_0: entered promiscuous mode [ 52.837287][ T3447] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.844433][ T3447] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.851651][ T3447] bridge_slave_1: entered allmulticast mode [ 52.858180][ T3447] bridge_slave_1: entered promiscuous mode [ 52.903421][ T3445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 52.910429][ T3445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.936391][ T3445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 52.947325][ T3445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 52.954251][ T3445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 52.980222][ T3445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.004169][ T3452] hsr_slave_0: entered promiscuous mode [ 53.010161][ T3452] hsr_slave_1: entered promiscuous mode [ 53.016009][ T3452] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.023535][ T3452] Cannot create hsr debugfs directory [ 53.030037][ T3447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.040310][ T3447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.069025][ T3440] hsr_slave_0: entered promiscuous mode [ 53.075241][ T3440] hsr_slave_1: entered promiscuous mode [ 53.081080][ T3440] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.088633][ T3440] Cannot create hsr debugfs directory [ 53.104650][ T3459] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.111743][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.119082][ T3459] bridge_slave_0: entered allmulticast mode [ 53.125593][ T3459] bridge_slave_0: entered promiscuous mode [ 53.132127][ T3459] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.139274][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.146449][ T3459] bridge_slave_1: entered allmulticast mode [ 53.152753][ T3459] bridge_slave_1: entered promiscuous mode [ 53.175178][ T3447] team0: Port device team_slave_0 added [ 53.225086][ T3445] hsr_slave_0: entered promiscuous mode [ 53.231096][ T3445] hsr_slave_1: entered promiscuous mode [ 53.238218][ T3445] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.245993][ T3445] Cannot create hsr debugfs directory [ 53.252322][ T3447] team0: Port device team_slave_1 added [ 53.266541][ T3459] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.311435][ T3447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.318436][ T3447] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.344429][ T3447] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.367632][ T3459] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.382815][ T3447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.389801][ T3447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.415772][ T3447] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.457286][ T3459] team0: Port device team_slave_0 added [ 53.506506][ T3459] team0: Port device team_slave_1 added [ 53.516077][ T3447] hsr_slave_0: entered promiscuous mode [ 53.522050][ T3447] hsr_slave_1: entered promiscuous mode [ 53.528756][ T3447] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.537744][ T3447] Cannot create hsr debugfs directory [ 53.587623][ T3459] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.594568][ T3459] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.620519][ T3459] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.634588][ T3459] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.641581][ T3459] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.667503][ T3459] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.736974][ T3438] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 53.747292][ T3459] hsr_slave_0: entered promiscuous mode [ 53.753697][ T3459] hsr_slave_1: entered promiscuous mode [ 53.761069][ T3459] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 53.768655][ T3459] Cannot create hsr debugfs directory [ 53.777101][ T3438] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 53.799310][ T3438] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 53.821057][ T3440] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 53.838740][ T3440] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 53.850982][ T3438] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 53.863057][ T3440] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 53.875560][ T3440] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 53.884457][ T3452] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 53.894292][ T3452] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 53.903460][ T3452] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 53.928542][ T3452] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 53.981459][ T3447] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 54.005359][ T3447] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 54.033693][ T3447] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 54.046777][ T3438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.058115][ T3440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.078269][ T3447] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 54.093063][ T3445] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 54.103907][ T3445] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 54.126125][ T3445] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 54.137701][ T3445] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 54.149730][ T3452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.164799][ T3440] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.173460][ T3438] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.184910][ T3452] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.202498][ T3459] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 54.212039][ T3459] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 54.224000][ T3607] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.231115][ T3607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.240979][ T3607] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.248068][ T3607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.278363][ T3459] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 54.287992][ T3607] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.295114][ T3607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.304164][ T3607] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.311225][ T3607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.327203][ T3607] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.334295][ T3607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.350757][ T3459] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 54.364373][ T3607] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.371603][ T3607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.392703][ T3438] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.410142][ T3447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.432938][ T3447] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.457375][ T3090] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.464448][ T3090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.476089][ T3090] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.483151][ T3090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.502425][ T3452] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.512969][ T3452] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.534653][ T3447] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.545081][ T3447] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.628786][ T3438] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.654916][ T3452] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.667973][ T3445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.701047][ T3459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.726476][ T3459] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.743055][ T3440] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.753105][ T3445] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.768827][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.775923][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.796288][ T3438] veth0_vlan: entered promiscuous mode [ 54.809312][ T3597] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.816447][ T3597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.846149][ T3447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.871622][ T3452] veth0_vlan: entered promiscuous mode [ 54.879744][ T3637] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.886948][ T3637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.911501][ T3459] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.921978][ T3459] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.936056][ T3438] veth1_vlan: entered promiscuous mode [ 54.954687][ T3445] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.965310][ T3445] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.001192][ T3597] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.008400][ T3597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.048740][ T3438] veth0_macvtap: entered promiscuous mode [ 55.057236][ T3452] veth1_vlan: entered promiscuous mode [ 55.086103][ T3438] veth1_macvtap: entered promiscuous mode [ 55.136774][ T3438] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.147101][ T3452] veth0_macvtap: entered promiscuous mode [ 55.154871][ T3452] veth1_macvtap: entered promiscuous mode [ 55.163225][ T3459] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.183668][ T3440] veth0_vlan: entered promiscuous mode [ 55.201984][ T3445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.217723][ T3438] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.227410][ T3438] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.236202][ T3438] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.244934][ T3438] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.253672][ T3438] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.270551][ T3452] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.281087][ T3452] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.292549][ T3452] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.306052][ T3452] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.316555][ T3452] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.327739][ T3452] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.336450][ T3447] veth0_vlan: entered promiscuous mode [ 55.352012][ T3452] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.360958][ T3452] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.369848][ T3452] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.378606][ T3452] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.399315][ T3440] veth1_vlan: entered promiscuous mode [ 55.416736][ T3447] veth1_vlan: entered promiscuous mode [ 55.489925][ T3447] veth0_macvtap: entered promiscuous mode [ 55.523436][ T3440] veth0_macvtap: entered promiscuous mode [ 55.539198][ T3447] veth1_macvtap: entered promiscuous mode 21:19:54 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) 21:19:54 executing program 3: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 55.561027][ T27] audit: type=1400 audit(1699391994.154:186): avc: denied { ioctl } for pid=3798 comm="syz-executor.0" path="socket:[4714]" dev="sockfs" ino=4714 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 55.565210][ T3440] veth1_macvtap: entered promiscuous mode 21:19:54 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) 21:19:54 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) [ 55.617312][ T3445] veth0_vlan: entered promiscuous mode [ 55.631904][ T3440] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.642445][ T3440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.652438][ T3440] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 21:19:54 executing program 0: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 55.662957][ T3440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.674398][ T3440] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.688283][ T3447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.698873][ T3447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.708751][ T3447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.719301][ T3447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.729111][ T3447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.739553][ T3447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.750339][ T3447] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.764307][ T3447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.774791][ T3447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.785080][ T3447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.795621][ T3447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.807163][ T3447] batman_adv: batadv0: Interface activated: batadv_slave_1 21:19:54 executing program 0: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 55.815961][ T3447] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.824695][ T3447] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.833548][ T3447] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.842314][ T3447] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.853010][ T3440] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.863511][ T3440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.873345][ T3440] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.883766][ T3440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.893590][ T3440] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.904135][ T3440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:19:54 executing program 0: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 55.915626][ T3440] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.925562][ T3440] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.934251][ T3440] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.943040][ T3440] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.951788][ T3440] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.972664][ T3445] veth1_vlan: entered promiscuous mode [ 55.988383][ T3459] veth0_vlan: entered promiscuous mode [ 56.007749][ T3459] veth1_vlan: entered promiscuous mode 21:19:54 executing program 3: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 56.083417][ T3459] veth0_macvtap: entered promiscuous mode [ 56.109743][ T3445] veth0_macvtap: entered promiscuous mode [ 56.132483][ T3459] veth1_macvtap: entered promiscuous mode [ 56.153748][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.164310][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.174182][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.184640][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.194532][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.204986][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.214817][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.225252][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.241910][ T3459] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.250549][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.261053][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.270933][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.281372][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.291203][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.301802][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.311651][ T3459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.322188][ T3459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.333948][ T3459] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.342692][ T3445] veth1_macvtap: entered promiscuous mode [ 56.356172][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.366911][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.376737][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.387213][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.397058][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.407494][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.417296][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.427718][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.437526][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.448057][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.458874][ T3445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.479472][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.489935][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.499800][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.510261][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.520118][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.525089][ T27] audit: type=1400 audit(1699391995.094:187): avc: denied { prog_load } for pid=3863 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.530549][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.549847][ T27] audit: type=1400 audit(1699391995.094:188): avc: denied { bpf } for pid=3863 comm="syz-executor.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 56.559751][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 21:19:55 executing program 0: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 56.580491][ T27] audit: type=1400 audit(1699391995.114:189): avc: denied { prog_run } for pid=3863 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.590928][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.590943][ T3445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.630556][ T3445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.641706][ T3445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.650748][ T3459] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.659482][ T3459] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.668327][ T3459] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.677063][ T3459] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.696349][ T3445] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.705101][ T3445] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.713846][ T3445] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.722618][ T3445] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.847695][ T27] audit: type=1400 audit(1699391995.444:190): avc: denied { write } for pid=3883 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 21:19:55 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:55 executing program 3: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:55 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:55 executing program 0: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:55 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:55 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:55 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:55 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:55 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:55 executing program 0: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:56 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:56 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 0: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:56 executing program 0: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 5: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 4: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:56 executing program 0: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:57 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:57 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:57 executing program 5: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:57 executing program 5: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:57 executing program 2: open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:19:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:57 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:57 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x3000000) 21:19:57 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_LEN={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 21:19:58 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 4: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 5: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:58 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) 21:19:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 5: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48000000000000f2000000000000000000", @ANYRES32], 0x48}}, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 21:19:58 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) 21:19:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) [ 59.669622][ T27] audit: type=1400 audit(1699391998.264:191): avc: denied { connect } for pid=4089 comm="syz-executor.3" lport=44 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 59.690710][ T27] audit: type=1400 audit(1699391998.264:192): avc: denied { write } for pid=4089 comm="syz-executor.3" laddr=::1 lport=44 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 21:19:58 executing program 4: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:58 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891b, 0x0) 21:19:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 5: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x13}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 21:19:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 4: process_vm_readv(0x0, &(0x7f0000000b00)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000a80)=""/123, 0x7b}], 0x5, &(0x7f00000005c0)=[{&(0x7f0000000b80)=""/144, 0x90}, {&(0x7f0000000c40)=""/105, 0x69}], 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000dc0)=""/118, 0x76}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x46c}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 21:19:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x13}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 21:19:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3ae0", 0xffe4}, {&(0x7f0000000000)="634c18df66c4a79ee31563701dcee59a72bf660fd19114ea7e8a48c237f47868d5225624327fe2b734ef31078e73b16c8f371f9107c83ed56a965a9b7e0b4b2b784844a88a9ec4b92fd9a41c076228fd54447f4174b25b8669b54bf98a75ceb8ae5a6cc9574f90a5f6727552012f44cab144287debcf7f", 0x18ec0000}, {&(0x7f0000000200)="2f06e3f56808e1919dd6fcba0c3140f60b669dc7ce0ef48353cd9a3056358a7c0e56376e6484f1421fefa7eb7c5ae82098e0e681687293b5b739496cbe4a3d907cbdb9a8475af929dd4fa8f0f6dc95377762081af68df94a18161827bd511d05314d82a9668cc39c7257c760f41120ce7908f54893c68260a392c0bead45452a258d639e61b01f6baf75959004a3a3ef91bb79747084d37a2111755c4c133f2884045a6fb47744bac2544415ea77245973f65fa66865026a411a16999409df3cf918f6e3eb1fe8993a0ae30b92e95d261fc044b1d544c812d6d60248a697"}, {&(0x7f0000000300)="4cdda7f24b978c302835a4f9ebf2ede4bcaafd7d56ac35648917c4fc4dfcc4765694ace1bd28ee28d3b029c95f429637d305a376cc0d05b6b350e603a6dec74dd9c1257aa2cfc4f8a5bf043e2410e5106996ccdacc00e95cb6470f6151bf2373c2e4ee9fef7c2a974aade456375b04641e94b915906b4a1f6b2cf24f03a880dbb4fd40d4c47a0a4318e4f6b53ecf442ae097293bc7901b5f1a42fff92fe607ed600b6dd0f5c12d48b762c23a8a7a733b06e85583d8283e70c10740c4be60eba28bf946ce7d5a2c188d5bc6a3b12422cac0e0"}], 0x1}}], 0x1, 0x0) 21:19:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x13}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) [ 59.881544][ T27] audit: type=1400 audit(1699391998.474:193): avc: denied { perfmon } for pid=4123 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 59.912658][ T4124] tunl0: entered promiscuous mode [ 59.951160][ T4124] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 59.959452][ T4124] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 59.970262][ T27] audit: type=1400 audit(1699391998.504:194): avc: denied { ioctl } for pid=4123 comm="syz-executor.0" path="socket:[5116]" dev="sockfs" ino=5116 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 21:19:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x13}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) [ 59.995499][ T27] audit: type=1400 audit(1699391998.514:195): avc: denied { connect } for pid=4132 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 60.016066][ T27] audit: type=1400 audit(1699391998.514:196): avc: denied { setopt } for pid=4132 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 21:19:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) [ 60.050274][ T4124] ipvlan2: entered promiscuous mode [ 60.055561][ T4124] ipvlan2: entered allmulticast mode [ 60.060844][ T4124] macvlan0: entered allmulticast mode [ 60.066246][ T4124] veth1_vlan: entered allmulticast mode [ 60.083116][ T4124] syz-executor.0 (4124) used greatest stack depth: 10760 bytes left 21:19:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:19:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:19:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.189714][ T4166] tunl0: entered promiscuous mode 21:19:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.230871][ T4166] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 60.239219][ T4166] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. [ 60.251025][ T4167] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 60.259154][ T4167] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 60.281682][ T4178] tunl0: entered promiscuous mode [ 60.299092][ T4178] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 60.307254][ T4178] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 60.318891][ T4167] ipvlan3: entered promiscuous mode [ 60.324170][ T4167] ipvlan3: entered allmulticast mode 21:19:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.334674][ T4166] ipvlan2: entered promiscuous mode [ 60.339966][ T4166] ipvlan2: entered allmulticast mode [ 60.345278][ T4166] macvlan0: entered allmulticast mode [ 60.350635][ T4166] veth1_vlan: entered allmulticast mode [ 60.360452][ T4178] ipvlan2: entered promiscuous mode [ 60.365758][ T4178] ipvlan2: entered allmulticast mode [ 60.371062][ T4178] macvlan0: entered allmulticast mode [ 60.376471][ T4178] veth1_vlan: entered allmulticast mode 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.394453][ T4179] tunl0: entered promiscuous mode [ 60.403767][ T4166] syz-executor.5 (4166) used greatest stack depth: 10728 bytes left [ 60.422261][ T4179] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 60.430428][ T4179] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 60.442721][ T4189] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 60.450870][ T4189] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 60.464746][ T4182] ipvlan2: entered promiscuous mode [ 60.470083][ T4182] ipvlan2: entered allmulticast mode [ 60.475739][ T4182] macvlan0: entered allmulticast mode [ 60.481095][ T4182] veth1_vlan: entered allmulticast mode [ 60.488809][ T4186] tunl0: entered promiscuous mode 21:19:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.504516][ T4186] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 60.512676][ T4186] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 60.522539][ T4194] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 60.530732][ T4194] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. [ 60.544030][ T4192] ipvlan2: entered promiscuous mode [ 60.549320][ T4192] ipvlan2: entered allmulticast mode 21:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.554607][ T4192] macvlan0: entered allmulticast mode [ 60.560457][ T4192] veth1_vlan: entered allmulticast mode [ 60.569985][ T4189] ipvlan4: entered promiscuous mode [ 60.575353][ T4189] ipvlan4: entered allmulticast mode [ 60.582603][ T4193] tunl0: entered promiscuous mode 21:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.601647][ T4193] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 60.609867][ T4193] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 60.622437][ T4181] ipvlan2: entered promiscuous mode [ 60.627717][ T4181] ipvlan2: entered allmulticast mode [ 60.633048][ T4181] macvlan0: entered allmulticast mode [ 60.639005][ T4181] veth1_vlan: entered allmulticast mode 21:19:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.654065][ T4194] ipvlan3: entered promiscuous mode [ 60.659559][ T4194] ipvlan3: entered allmulticast mode [ 60.666692][ T4198] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 60.674770][ T4198] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 60.693066][ T4191] ipvlan3: entered promiscuous mode [ 60.698347][ T4191] ipvlan3: entered allmulticast mode 21:19:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.716595][ T4206] ipvlan5: entered promiscuous mode [ 60.721829][ T4206] ipvlan5: entered allmulticast mode [ 60.732827][ T4197] ipvlan3: entered promiscuous mode [ 60.738322][ T4197] ipvlan3: entered allmulticast mode [ 60.756676][ T4201] ipvlan3: entered promiscuous mode 21:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.762120][ T4201] ipvlan3: entered allmulticast mode [ 60.778850][ T4208] ipvlan4: entered promiscuous mode [ 60.784165][ T4208] ipvlan4: entered allmulticast mode [ 60.800905][ T4207] ipvlan3: entered promiscuous mode [ 60.806233][ T4207] ipvlan3: entered allmulticast mode 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.826109][ T4215] ipvlan6: entered promiscuous mode [ 60.831388][ T4215] ipvlan6: entered allmulticast mode [ 60.854396][ T4211] ipvlan4: entered promiscuous mode [ 60.859660][ T4211] ipvlan4: entered allmulticast mode 21:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.880220][ T4217] ipvlan4: entered promiscuous mode [ 60.885595][ T4217] ipvlan4: entered allmulticast mode [ 60.906980][ T4221] ipvlan4: entered promiscuous mode [ 60.912214][ T4221] ipvlan4: entered allmulticast mode 21:19:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.934208][ T4219] ipvlan5: entered promiscuous mode [ 60.939508][ T4219] ipvlan5: entered allmulticast mode [ 60.952885][ T4223] ipvlan4: entered promiscuous mode [ 60.958993][ T4223] ipvlan4: entered allmulticast mode [ 60.978405][ T4226] ipvlan7: entered promiscuous mode 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 60.983657][ T4226] ipvlan7: entered allmulticast mode [ 61.003950][ T4234] ipvlan6: entered promiscuous mode [ 61.009331][ T4234] ipvlan6: entered allmulticast mode [ 61.022594][ T4235] ipvlan5: entered promiscuous mode [ 61.027925][ T4235] ipvlan5: entered allmulticast mode 21:19:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.043904][ T4231] ipvlan5: entered promiscuous mode [ 61.049344][ T4231] ipvlan5: entered allmulticast mode [ 61.074984][ T4229] ipvlan5: entered promiscuous mode [ 61.080263][ T4229] ipvlan5: entered allmulticast mode 21:19:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.108118][ T4237] ipvlan8: entered promiscuous mode [ 61.113450][ T4237] ipvlan8: entered allmulticast mode [ 61.134766][ T4239] ipvlan5: entered promiscuous mode [ 61.140039][ T4239] ipvlan5: entered allmulticast mode [ 61.152766][ T4244] ipvlan7: entered promiscuous mode 21:19:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.158153][ T4244] ipvlan7: entered allmulticast mode [ 61.171417][ T4248] ipvlan6: entered promiscuous mode [ 61.176672][ T4248] ipvlan6: entered allmulticast mode [ 61.192816][ T4241] ipvlan6: entered promiscuous mode [ 61.199494][ T4241] ipvlan6: entered allmulticast mode 21:19:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.227110][ T4247] ipvlan6: entered promiscuous mode [ 61.232401][ T4247] ipvlan6: entered allmulticast mode [ 61.252504][ T4252] ipvlan9: entered promiscuous mode [ 61.257835][ T4252] ipvlan9: entered allmulticast mode 21:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.282077][ T4251] ipvlan6: entered promiscuous mode [ 61.287448][ T4251] ipvlan6: entered allmulticast mode [ 61.303527][ T4254] ipvlan8: entered promiscuous mode [ 61.308799][ T4254] ipvlan8: entered allmulticast mode 21:19:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:19:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.344372][ T4260] ipvlan10: entered promiscuous mode [ 61.349734][ T4260] ipvlan10: entered allmulticast mode [ 61.366763][ T4256] ipvlan7: entered promiscuous mode [ 61.372055][ T4256] ipvlan7: entered allmulticast mode 21:20:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.393741][ T4267] ipvlan7: entered promiscuous mode [ 61.399132][ T4267] ipvlan7: entered allmulticast mode [ 61.421150][ T4265] ipvlan9: entered promiscuous mode [ 61.426456][ T4265] ipvlan9: entered allmulticast mode 21:20:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.444865][ T4258] ipvlan7: entered promiscuous mode [ 61.450343][ T4258] ipvlan7: entered allmulticast mode [ 61.460642][ T4263] ipvlan7: entered promiscuous mode [ 61.466074][ T4263] ipvlan7: entered allmulticast mode 21:20:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.491534][ T4270] ipvlan11: entered promiscuous mode [ 61.497003][ T4270] ipvlan11: entered allmulticast mode [ 61.513224][ T4273] ipvlan8: entered promiscuous mode [ 61.518732][ T4273] ipvlan8: entered allmulticast mode 21:20:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.541808][ T4271] ipvlan8: entered promiscuous mode [ 61.547158][ T4271] ipvlan8: entered allmulticast mode [ 61.585771][ T4275] ipvlan10: entered promiscuous mode [ 61.591106][ T4275] ipvlan10: entered allmulticast mode [ 61.605850][ T4279] ipvlan8: entered promiscuous mode [ 61.611088][ T4279] ipvlan8: entered allmulticast mode [ 61.623821][ T4278] ipvlan8: entered promiscuous mode [ 61.629312][ T4278] ipvlan8: entered allmulticast mode 21:20:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.647160][ T4283] ipvlan12: entered promiscuous mode [ 61.652494][ T4283] ipvlan12: entered allmulticast mode [ 61.672108][ T4285] ipvlan9: entered promiscuous mode [ 61.677410][ T4285] ipvlan9: entered allmulticast mode [ 61.692452][ T4286] ipvlan9: entered promiscuous mode 21:20:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.697843][ T4286] ipvlan9: entered allmulticast mode [ 61.726274][ T4294] ipvlan9: entered promiscuous mode [ 61.731548][ T4294] ipvlan9: entered allmulticast mode 21:20:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.752455][ T4292] ipvlan11: entered promiscuous mode [ 61.758405][ T4292] ipvlan11: entered allmulticast mode [ 61.773132][ T4296] ipvlan13: entered promiscuous mode [ 61.778492][ T4296] ipvlan13: entered allmulticast mode [ 61.796145][ T4293] ipvlan9: entered promiscuous mode 21:20:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.801440][ T4293] ipvlan9: entered allmulticast mode 21:20:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 61.823850][ T4300] ipvlan10: entered promiscuous mode [ 61.829274][ T4300] ipvlan10: entered allmulticast mode [ 61.849038][ T4298] ipvlan10: entered promiscuous mode [ 61.854379][ T4298] ipvlan10: entered allmulticast mode 21:20:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) 21:20:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) [ 61.875892][ T4302] ipvlan10: entered promiscuous mode [ 61.881235][ T4302] ipvlan10: entered allmulticast mode [ 61.898422][ T4305] ipvlan12: entered promiscuous mode [ 61.903788][ T4305] ipvlan12: entered allmulticast mode 21:20:00 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:20:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0), &(0x7f00000005c0)=0x8) [ 61.933750][ T4306] ipvlan14: entered promiscuous mode [ 61.939105][ T4306] ipvlan14: entered allmulticast mode 21:20:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:20:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) 21:20:00 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) 21:20:00 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000040)="5f4ac7c4216632f8bdb81e2058edd7db", 0x10) 21:20:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) [ 61.975610][ T4311] ipvlan11: entered promiscuous mode [ 61.981005][ T4311] ipvlan11: entered allmulticast mode [ 62.003239][ T4309] ipvlan10: entered promiscuous mode [ 62.008873][ T4309] ipvlan10: entered allmulticast mode 21:20:00 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) 21:20:00 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) 21:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) 21:20:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) [ 62.051822][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 62.051835][ T27] audit: type=1400 audit(1699392000.634:202): avc: denied { write } for pid=4327 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 62.085361][ T4326] ipvlan13: entered promiscuous mode [ 62.090711][ T4326] ipvlan13: entered allmulticast mode 21:20:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="61a93bb313c06a35ec75e6dd43e21d71af64cfec935fed1c57d21c0f61e06f5c77c8dea3fc6a32bc69e04601113169ed8779d4b82430aff0367c619a66c12af51868072739afe3c156345ee760da64053f40d0cf4f935f9c5e7b41d84d6799d1edf98ead4fe710afcbc325aaa1623058a8260b4979dace78587face410c2e607f198285f78991b9da3b7f136e760151f70aa65d6af6d5f987dc189d59f095c4c468f73074965897f8e0f78383800385234c764efb730c83f87ef1e51169dd85e79ab59dcf645d517dbd9e93fe5caf43eccf77bf8e7ef338b08b09714554e1bda17162af3094c08e0a5bf9d20c3267f4133c355deafec30ae5169314d9efd297b600f140920284fcc7bb8474ec8740b51ec7d44122ffc5e854be1894f7e447ef4be2cad7ce4b1dafe9e27076e3418c497bc8ed12f8307c41af80fc529577f3d204195358ae6f3dcb169d69e4ed72776aa5f810222417774d815cc73cdfabdbc7cb81401b6853601679f9a62cf8efa98d1a40ceeeb3628168b329cbe0afb517ac5a63211f7ba747f897bf2078d56e025e019fae212cb95c3e1e0ef46195a39748365df7d6d9274abbd152fc8745ca0b8cead0f2b4724bcc1c210c4a149a2f7e56304b6e6ff7f6f7b1020ada2200727080351aaad61e5eec77e6d363ada2ae61e8bfdb2ef76e47d4fe38aa3f3be3a435827781fd791d3bb8710b9f016a450bf0d020dbd", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) 21:20:00 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) 21:20:00 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) 21:20:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) 21:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x8000, 0x20, 0x7, 0xfffffffa, {{0xb, 0x4, 0x2, 0x8, 0x2c, 0x65, 0x0, 0x5, 0x29, 0x0, @broadcast, @rand_addr=0x64010101, {[@lsrr={0x83, 0x17, 0xd3, [@private=0xa010102, @loopback, @empty, @multicast2, @multicast1]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=@deltclass={0x4c, 0x29, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6}, {0x7, 0x8}, {0xf, 0xe}}, [@TCA_RATE={0x6}, @tclass_kind_options=@c_tbf={0x8}, @TCA_RATE={0x6, 0x5, {0x1, 0xc6}}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}, @TCA_RATE={0x6, 0x5, {0x80, 0xea}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041004}, 0x4000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getneigh={0x14, 0x1e, 0x2, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@getnexthop={0x20, 0x5f, 0x221, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe0700000000000000ff3f02000000480100100000000019002b000a0001000500000000000072000000000000000000", 0x39}], 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', r10, r8, 0x0, 0x2, 0x1}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x8001, 0xd85, 0x0, 0x2000, r11, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xa}, 0x48) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@getqdisc={0x28, 0x26, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x10, 0xc}, {0xfff2, 0xd}, {0x7, 0x8}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x805}, 0x10) r12 = socket(0x10, 0x803, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r1, {0xc4ff}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x9282, r13, 0x1, 0x0, &(0x7f0000000940)=[{0x5, 0x5, 0x4}], 0x10, 0x2}, 0x90) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r12, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) 21:20:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000090000000000080002000d101000", 0x24) 21:20:00 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) [ 62.152082][ T4338] ipvlan12: entered promiscuous mode [ 62.158027][ T4338] ipvlan12: entered allmulticast mode 21:20:00 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x20}}, 0x0) 21:20:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) [ 62.214850][ T4352] ipvlan13: entered promiscuous mode [ 62.220290][ T4352] ipvlan13: entered allmulticast mode 21:20:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 21:20:00 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:00 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:00 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 21:20:00 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:00 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) [ 62.310389][ T27] audit: type=1400 audit(1699392000.904:203): avc: denied { setopt } for pid=4369 comm="syz-executor.3" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 21:20:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:00 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 21:20:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:01 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 21:20:01 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:01 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 21:20:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="61a93bb313c06a35ec75e6dd43e21d71af64cfec935fed1c57d21c0f61e06f5c77c8dea3fc6a32bc69e04601113169ed8779d4b82430aff0367c619a66c12af51868072739afe3c156345ee760da64053f40d0cf4f935f9c5e7b41d84d6799d1edf98ead4fe710afcbc325aaa1623058a8260b4979dace78587face410c2e607f198285f78991b9da3b7f136e760151f70aa65d6af6d5f987dc189d59f095c4c468f73074965897f8e0f78383800385234c764efb730c83f87ef1e51169dd85e79ab59dcf645d517dbd9e93fe5caf43eccf77bf8e7ef338b08b09714554e1bda17162af3094c08e0a5bf9d20c3267f4133c355deafec30ae5169314d9efd297b600f140920284fcc7bb8474ec8740b51ec7d44122ffc5e854be1894f7e447ef4be2cad7ce4b1dafe9e27076e3418c497bc8ed12f8307c41af80fc529577f3d204195358ae6f3dcb169d69e4ed72776aa5f810222417774d815cc73cdfabdbc7cb81401b6853601679f9a62cf8efa98d1a40ceeeb3628168b329cbe0afb517ac5a63211f7ba747f897bf2078d56e025e019fae212cb95c3e1e0ef46195a39748365df7d6d9274abbd152fc8745ca0b8cead0f2b4724bcc1c210c4a149a2f7e56304b6e6ff7f6f7b1020ada2200727080351aaad61e5eec77e6d363ada2ae61e8bfdb2ef76e47d4fe38aa3f3be3a435827781fd791d3bb8710b9f016a450bf0d020dbd", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:01 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:01 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 21:20:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:01 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x25}, 0x18) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(0x0, 0x1, &(0x7f0000001c80)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="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", 0x202}]) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 21:20:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) [ 62.538656][ T27] audit: type=1400 audit(1699392001.134:204): avc: denied { ioctl } for pid=4417 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=116 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 21:20:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0x0, 0x0}) 21:20:01 executing program 1: syz_clone3(&(0x7f0000000280)={0x300, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/202, 0xca, 0x0, 0x0}, 0x58) 21:20:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0xc, &(0x7f0000000000), 0x20000000) 21:20:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 1: syz_clone3(&(0x7f0000000280)={0x300, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/202, 0xca, 0x0, 0x0}, 0x58) 21:20:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) [ 63.066902][ T27] audit: type=1400 audit(1699392001.654:205): avc: denied { ioctl } for pid=4493 comm="syz-executor.0" path="socket:[6917]" dev="sockfs" ino=6917 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 21:20:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 1: syz_clone3(&(0x7f0000000280)={0x300, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/202, 0xca, 0x0, 0x0}, 0x58) 21:20:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x5}]}]}, 0x28}}, 0x0) 21:20:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 21:20:01 executing program 3: syz_emit_ethernet(0xffda, &(0x7f0000000040)={@multicast, @multicast, @void, {@x25}}, 0x0) 21:20:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 21:20:01 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 21:20:01 executing program 3: syz_emit_ethernet(0xffda, &(0x7f0000000040)={@multicast, @multicast, @void, {@x25}}, 0x0) 21:20:01 executing program 1: syz_clone3(&(0x7f0000000280)={0x300, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/202, 0xca, 0x0, 0x0}, 0x58) [ 63.285272][ T27] audit: type=1400 audit(1699392001.864:206): avc: denied { setopt } for pid=4531 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 21:20:01 executing program 3: syz_emit_ethernet(0xffda, &(0x7f0000000040)={@multicast, @multicast, @void, {@x25}}, 0x0) 21:20:01 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 21:20:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 3: syz_emit_ethernet(0xffda, &(0x7f0000000040)={@multicast, @multicast, @void, {@x25}}, 0x0) 21:20:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 21:20:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) [ 63.448305][ T27] audit: type=1400 audit(1699392002.034:207): avc: denied { mounton } for pid=4558 comm="syz-executor.4" path="/root/syzkaller-testdir4244108334/syzkaller.XfUVf5/41/file0" dev="sda1" ino=1968 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 21:20:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) [ 63.503552][ T27] audit: type=1400 audit(1699392002.074:208): avc: denied { unmount } for pid=3452 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 21:20:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) 21:20:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) 21:20:02 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$eJzs3c1vHGcZAPBnxp9N3TqBHqACEqAQUJR17LRR1UubCwhVlRAVB+CQGntjmayzIWuX2kSy+zeABBKnIvEPcEDigNQTByQOnBASB4RUDkgBIlACATFoZsfOxh7HG3u9G+zfTxrNx+t9n+ed1XzsO8m8ARxbZyJiIyJGI+KtiJgstyflFK+1p/zv7t65NXfvzq25JLLszb8mRXm+LTo+k3u6rHM8Ir7yxYhvJjvjtlbXrs02GvWb5frU8tKNqdbq2vnFpdmF+kL9+szMpelLF16++NJMz9p6eumnt7+w+PpXf/Hzj3/wm43PfzdPa6Is62zHYxl9dHG76SNbcXLDEfH6voI9eYbK+R67gSdUGhEfiohPFcf/ZAzF8Fi+Pcuy9UHnBgAcjiybjGyycx0AOOrSog8sSWtlX8BEpGmt1u7Dey5OpI1ma/nc1ebK9fl2X9nJGEmvLjb+lZ0a+/238xuGhZHk6mKjPl2UFeXF+sy29YsRcSoivj/2VLFem2s25gd43wMAx9nT267//xhrX/+7UPFUDwD4vzE+6AQAgL5z/QeA4+bMoBMAAAagi9//5cP+jUPPBQDoD/3/AHD8uP4DwPHj+g8Ax8qX33gjn7J75fuv599eXbnWfPv8fL11rba0Mleba968UVtoNheKd/Ys7VVfo9m8Mf1irLwztVxvLU+1VteuLDVXri9fKd7rfaU+0pdWAQCPcur0+79LImLjlaeKKTrGcnCthqMtHXQCwMAMDToBYGCGB50AMDDd/8b/1aHmAQxO5cu8xysXH/bDxwji3xnBE+XsRzv7/4uhfyv6/x9+LgAcDfr/4fjaX///qz3PA+i/fff//6S3eQD9l2XJ9jH/R7eKAIAjqdvn//eznbcO6z29EwEGZa/BvHvy/B8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACOmImI+FYkaa0cC3wi0rRWi3gmIk7GSHJ1sVG/EBHPxumIGBnL16cHnTQAcEDpn5Ny/K+zky9MbC8dTf45Vswj4js/evMH78wuL9+czrf/bWv72ObwYTMPPtftuIIAwOErrt8z5bzjh/zdO7fmNqdHVvD1Z3qaz+3L8Z9yKOK5e3duFVO7ZDiGi/l4cS9x4u9Jud4ei/T5iBjqQfyNdyPiI1XtT4q+kZPlyKed8aOM3Ys90X389KH4aVHWnuc3Xx/uQS5w3Lx/OSJee+j4Kw+zNM4U8+rjf7w4Qx3c7cvtyjbPfQ/Of+nW+W+oIn4yGmV+XcR48Zdf6lwf7Sx7N+L54ar4yVb8pCp+RLzQZfw/fOwT33t1l7LsvYizUR2/M9bU8tKNqdbq2vnFpdmF+kL9+szMpelLF16++NLMVNFHPbXZU73TX1459+xuueXtP7FL/PHK9j/Ye5/psv0//vdb3/jkI+J/7tPV3/9z+ey31fs/vyZ+tqK+/+4cpz9mT/xs1+G78/jzD9o/Hnt9/+ObpRHn2ovZ+h7t/+BPa/N7/AkA0Eet1bVrs41G/eaBFvJfob2oZ8dCnmJPK+xcqKj5j3FIsfazMLL/vfpeMoCcf721ZXjrXrW3Ib6W19jndqWbrUgOcsjcz7KsJ/ncrSjK1mP9cY+U/Ava89Db1eghn5aAPmitru3aN9CjLnYAAAAAAAAAAAAAAOCA+vE/qLbHvJdlFW8pAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMf3vwAAAP//QonTAQ==") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:02 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a000000}, 0x48) [ 63.757491][ T4595] syz-executor.2 (4595) used greatest stack depth: 10696 bytes left [ 63.819929][ T4607] loop4: detected capacity change from 0 to 512 [ 63.833113][ T27] audit: type=1400 audit(1699392002.424:209): avc: denied { map_read map_write } for pid=4605 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 21:20:02 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) [ 63.868219][ T27] audit: type=1400 audit(1699392002.434:210): avc: denied { connect } for pid=4605 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 63.888302][ T27] audit: type=1400 audit(1699392002.434:211): avc: denied { write } for pid=4605 comm="syz-executor.0" path="socket:[7063]" dev="sockfs" ino=7063 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 63.912363][ T4613] syz-executor.0 (4613) used greatest stack depth: 10624 bytes left [ 63.912935][ T4607] ======================================================= [ 63.912935][ T4607] WARNING: The mand mount option has been deprecated and [ 63.912935][ T4607] and is ignored by this kernel. Remove the mand [ 63.912935][ T4607] option from the mount to silence this warning. [ 63.912935][ T4607] ======================================================= 21:20:02 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 64.003956][ T4607] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 21:20:02 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) [ 64.055262][ T4607] ext4 filesystem being mounted at /root/syzkaller-testdir4244108334/syzkaller.XfUVf5/47/file0 supports timestamps until 2038-01-19 (0x7fffffff) 21:20:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:02 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 64.147583][ T3440] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:02 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:02 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) [ 64.264899][ T4640] loop4: detected capacity change from 0 to 512 21:20:02 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 64.307752][ T4640] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.340958][ T4640] ext4 filesystem being mounted at /root/syzkaller-testdir4244108334/syzkaller.XfUVf5/48/file0 supports timestamps until 2038-01-19 (0x7fffffff) 21:20:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.374476][ T4640] syz-executor.4 (4640) used greatest stack depth: 10408 bytes left 21:20:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.418410][ T3440] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.453601][ T4654] loop3: detected capacity change from 0 to 512 [ 64.494738][ T4656] loop2: detected capacity change from 0 to 512 [ 64.503520][ T4662] loop5: detected capacity change from 0 to 512 [ 64.513198][ T4654] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.518233][ T4663] loop4: detected capacity change from 0 to 512 21:20:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.526895][ T4654] ext4 filesystem being mounted at /root/syzkaller-testdir4180799603/syzkaller.SGTB0y/60/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.581748][ T4656] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.598258][ T4662] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.607356][ T4667] loop0: detected capacity change from 0 to 512 [ 64.617844][ T4663] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 21:20:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.641833][ T4656] ext4 filesystem being mounted at /root/syzkaller-testdir878583990/syzkaller.7mttjB/61/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.667811][ T4662] ext4 filesystem being mounted at /root/syzkaller-testdir1908168200/syzkaller.K9eRgr/51/file0 supports timestamps until 2038-01-19 (0x7fffffff) 21:20:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.684161][ T3452] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.694221][ T4663] ext4 filesystem being mounted at /root/syzkaller-testdir4244108334/syzkaller.XfUVf5/49/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.722434][ T4667] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 21:20:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$eJzs3c1vHGcZAPBnxp9N3TqBHqACEqAQUJR17LRR1UubCwhVlRAVB+CQGntjmayzIWuX2kSy+zeABBKnIvEPcEDigNQTByQOnBASB4RUDkgBIlACATFoZsfOxh7HG3u9G+zfTxrNx+t9n+ed1XzsO8m8ARxbZyJiIyJGI+KtiJgstyflFK+1p/zv7t65NXfvzq25JLLszb8mRXm+LTo+k3u6rHM8Ir7yxYhvJjvjtlbXrs02GvWb5frU8tKNqdbq2vnFpdmF+kL9+szMpelLF16++NJMz9p6eumnt7+w+PpXf/Hzj3/wm43PfzdPa6Is62zHYxl9dHG76SNbcXLDEfH6voI9eYbK+R67gSdUGhEfiohPFcf/ZAzF8Fi+Pcuy9UHnBgAcjiybjGyycx0AOOrSog8sSWtlX8BEpGmt1u7Dey5OpI1ma/nc1ebK9fl2X9nJGEmvLjb+lZ0a+/238xuGhZHk6mKjPl2UFeXF+sy29YsRcSoivj/2VLFem2s25gd43wMAx9nT267//xhrX/+7UPFUDwD4vzE+6AQAgL5z/QeA4+bMoBMAAAagi9//5cP+jUPPBQDoD/3/AHD8uP4DwPHj+g8Ax8qX33gjn7J75fuv599eXbnWfPv8fL11rba0Mleba968UVtoNheKd/Ys7VVfo9m8Mf1irLwztVxvLU+1VteuLDVXri9fKd7rfaU+0pdWAQCPcur0+79LImLjlaeKKTrGcnCthqMtHXQCwMAMDToBYGCGB50AMDDd/8b/1aHmAQxO5cu8xysXH/bDxwji3xnBE+XsRzv7/4uhfyv6/x9+LgAcDfr/4fjaX///qz3PA+i/fff//6S3eQD9l2XJ9jH/R7eKAIAjqdvn//eznbcO6z29EwEGZa/BvHvy/B8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACOmImI+FYkaa0cC3wi0rRWi3gmIk7GSHJ1sVG/EBHPxumIGBnL16cHnTQAcEDpn5Ny/K+zky9MbC8dTf45Vswj4js/evMH78wuL9+czrf/bWv72ObwYTMPPtftuIIAwOErrt8z5bzjh/zdO7fmNqdHVvD1Z3qaz+3L8Z9yKOK5e3duFVO7ZDiGi/l4cS9x4u9Jud4ei/T5iBjqQfyNdyPiI1XtT4q+kZPlyKed8aOM3Ys90X389KH4aVHWnuc3Xx/uQS5w3Lx/OSJee+j4Kw+zNM4U8+rjf7w4Qx3c7cvtyjbPfQ/Of+nW+W+oIn4yGmV+XcR48Zdf6lwf7Sx7N+L54ar4yVb8pCp+RLzQZfw/fOwT33t1l7LsvYizUR2/M9bU8tKNqdbq2vnFpdmF+kL9+szMpelLF16++NLMVNFHPbXZU73TX1459+xuueXtP7FL/PHK9j/Ye5/psv0//vdb3/jkI+J/7tPV3/9z+ey31fs/vyZ+tqK+/+4cpz9mT/xs1+G78/jzD9o/Hnt9/+ObpRHn2ovZ+h7t/+BPa/N7/AkA0Eet1bVrs41G/eaBFvJfob2oZ8dCnmJPK+xcqKj5j3FIsfazMLL/vfpeMoCcf721ZXjrXrW3Ib6W19jndqWbrUgOcsjcz7KsJ/ncrSjK1mP9cY+U/Ava89Db1eghn5aAPmitru3aN9CjLnYAAAAAAAAAAAAAAOCA+vE/qLbHvJdlFW8pAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMf3vwAAAP//QonTAQ==") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.781783][ T4677] loop3: detected capacity change from 0 to 512 [ 64.800646][ T4677] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.802076][ T3445] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.821116][ T4677] ext4 filesystem being mounted at /root/syzkaller-testdir4180799603/syzkaller.SGTB0y/61/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.826813][ T3459] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 64.836997][ T4667] ext4 filesystem being mounted at /root/syzkaller-testdir2362950631/syzkaller.4gocXb/60/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 64.866577][ T3440] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.935336][ T4682] loop2: detected capacity change from 0 to 512 [ 64.974224][ T4685] loop5: detected capacity change from 0 to 512 21:20:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 64.975991][ T4686] loop4: detected capacity change from 0 to 512 [ 64.982092][ T4682] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 64.987348][ T3438] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.012101][ T3452] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.016190][ T4682] ext4 filesystem being mounted at /root/syzkaller-testdir878583990/syzkaller.7mttjB/62/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.050068][ T4685] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.061059][ T4680] loop1: detected capacity change from 0 to 512 [ 65.067927][ T4686] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.092928][ T4696] loop0: detected capacity change from 0 to 512 21:20:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 65.102733][ T4695] loop3: detected capacity change from 0 to 512 [ 65.110897][ T4686] ext4 filesystem being mounted at /root/syzkaller-testdir4244108334/syzkaller.XfUVf5/50/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.128008][ T3445] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.137003][ T4685] ext4 filesystem being mounted at /root/syzkaller-testdir1908168200/syzkaller.K9eRgr/52/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.156376][ T4696] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.174230][ T4700] loop2: detected capacity change from 0 to 512 [ 65.197814][ T4695] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.211840][ T4696] ext4 filesystem being mounted at /root/syzkaller-testdir2362950631/syzkaller.4gocXb/61/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.228238][ T4700] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 21:20:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) [ 65.254368][ T4700] ext4 filesystem being mounted at /root/syzkaller-testdir878583990/syzkaller.7mttjB/63/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.265851][ T4695] ext4 filesystem being mounted at /root/syzkaller-testdir4180799603/syzkaller.SGTB0y/62/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.300100][ T3438] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:03 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:03 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 65.337653][ T3440] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.363228][ T3452] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.372581][ T3459] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:04 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 65.407464][ T4709] loop0: detected capacity change from 0 to 512 [ 65.432473][ T4714] loop5: detected capacity change from 0 to 512 [ 65.446401][ T4680] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.447171][ T3445] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.458931][ T4714] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.481591][ T4714] ext4 filesystem being mounted at /root/syzkaller-testdir1908168200/syzkaller.K9eRgr/53/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.497714][ T4680] ext4 filesystem being mounted at /root/syzkaller-testdir4032611420/syzkaller.fztKdi/42/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.556803][ T4709] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.656671][ T4709] ext4 filesystem being mounted at /root/syzkaller-testdir2362950631/syzkaller.4gocXb/62/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 65.663945][ T3459] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.724575][ T3438] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:04 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 65.801331][ T3447] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:04 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:04 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 66.016979][ T4743] loop1: detected capacity change from 0 to 512 21:20:04 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 66.161316][ T4743] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.279169][ T4743] ext4 filesystem being mounted at /root/syzkaller-testdir4032611420/syzkaller.fztKdi/43/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 66.310927][ T4130] ================================================================== [ 66.319039][ T4130] BUG: KCSAN: data-race in generic_fillattr / shmem_symlink [ 66.326336][ T4130] [ 66.328663][ T4130] read-write to 0xffff8881026fa9f0 of 8 bytes by task 3541 on cpu 0: [ 66.336725][ T4130] shmem_symlink+0x31b/0x390 [ 66.341321][ T4130] vfs_symlink+0xc2/0x1a0 [ 66.345660][ T4130] do_symlinkat+0xe3/0x340 [ 66.350087][ T4130] __x64_sys_symlink+0x56/0x60 [ 66.354861][ T4130] do_syscall_64+0x44/0x110 [ 66.359368][ T4130] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 66.365283][ T4130] [ 66.367610][ T4130] read to 0xffff8881026fa9f0 of 8 bytes by task 4130 on cpu 1: [ 66.375143][ T4130] generic_fillattr+0x144/0x2f0 [ 66.379977][ T4130] shmem_getattr+0x17b/0x200 [ 66.384546][ T4130] vfs_statx+0x266/0x430 [ 66.388769][ T4130] vfs_fstatat+0xcd/0x100 [ 66.393082][ T4130] __se_sys_newfstatat+0x58/0x260 [ 66.398087][ T4130] __x64_sys_newfstatat+0x55/0x60 [ 66.403091][ T4130] do_syscall_64+0x44/0x110 [ 66.407575][ T4130] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 66.413453][ T4130] [ 66.415757][ T4130] value changed: 0x00000000000000c8 -> 0x00000000000000dc [ 66.422840][ T4130] 21:20:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x8050, &(0x7f00000000c0)=ANY=[], 0xff, 0x598, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x4ead) r1 = open(&(0x7f0000002000)='./bus\x00', 0x14f942, 0x0) sendfile(r1, r1, 0x0, 0x80000000000081) 21:20:05 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 66.425143][ T4130] Reported by Kernel Concurrency Sanitizer on: [ 66.431267][ T4130] CPU: 1 PID: 4130 Comm: udevd Not tainted 6.6.0-syzkaller-15156-g13d88ac54ddd #0 [ 66.440451][ T4130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 66.450485][ T4130] ================================================================== [ 66.485960][ T3447] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 66.542923][ T4777] loop1: detected capacity change from 0 to 512 [ 66.578004][ T4777] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 21:20:05 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 66.616270][ T4777] ext4 filesystem being mounted at /root/syzkaller-testdir4032611420/syzkaller.fztKdi/44/file0 supports timestamps until 2038-01-19 (0x7fffffff) 21:20:05 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) [ 66.726584][ T3447] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:20:05 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:05 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:05 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:05 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) [ 67.237212][ T4836] __nla_validate_parse: 54 callbacks suppressed [ 67.237224][ T4836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:20:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:05 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:05 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) [ 67.279119][ T4836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 67.305824][ T4836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:20:05 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:05 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:06 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:06 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:06 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000688c0)={0x0, [], 0x0, "f74f29972b4562"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1c00, 0x0, 0x3) 21:20:06 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 67.401116][ T4850] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 67.429258][ T4850] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:20:06 executing program 3: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x88800, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffff8, r5}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xe4b}, [@map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @generic={0xec, 0x4, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x800, 0xc, &(0x7f0000000180)=""/12, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0xbc7, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r5]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) sendfile(r2, r1, 0x0, 0x80001d00c0d0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000100), 0x0, 0x0) 21:20:06 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 67.478716][ T4850] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:20:06 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:06 executing program 3: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:06 executing program 1: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:20:06 executing program 3: setfsgid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 67.558256][ T4867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:20:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) [ 67.616617][ T4867] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 67.647921][ T4867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:20:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) [ 67.686621][ T4884] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 21:20:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) [ 67.762614][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 67.762625][ T27] audit: type=1400 audit(1699392006.354:218): avc: denied { open } for pid=4888 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 67.788293][ T27] audit: type=1400 audit(1699392006.354:219): avc: denied { kernel } for pid=4888 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 21:20:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) 21:20:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x24, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x1, 0x0, 0x0, {{0x0, 0x9}, "98"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x54}}, 0x0) [ 67.882144][ T27] audit: type=1400 audit(1699392006.474:220): avc: denied { create } for pid=4888 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 21:20:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x100000000, 0x0) ioctl$BLKTRACESETUP(r0, 0x401070cd, 0x0) 21:20:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x64}, 0x48) 21:20:06 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) [ 67.933186][ T27] audit: type=1400 audit(1699392006.474:221): avc: denied { sys_admin } for pid=4888 comm="syz-executor.0" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 67.993725][ T27] audit: type=1400 audit(1699392006.584:222): avc: denied { getopt } for pid=4910 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 67.997878][ T4915] ieee802154 phy0 wpan0: encryption failed: -22 21:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:06 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) 21:20:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 21:20:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x71, 0x11, 0x78}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 21:20:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x100000000, 0x0) ioctl$BLKTRACESETUP(r0, 0x401070cd, 0x0) 21:20:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x64}, 0x48) [ 68.038506][ T27] audit: type=1400 audit(1699392006.594:223): avc: denied { write } for pid=4913 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 21:20:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x64}, 0x48) 21:20:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x64}, 0x48) 21:20:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x100000000, 0x0) ioctl$BLKTRACESETUP(r0, 0x401070cd, 0x0) 21:20:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x71, 0x11, 0x78}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 21:20:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) [ 68.086549][ T4920] ieee802154 phy0 wpan0: encryption failed: -22 21:20:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 21:20:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 21:20:06 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) 21:20:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x100000000, 0x0) ioctl$BLKTRACESETUP(r0, 0x401070cd, 0x0) 21:20:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x71, 0x11, 0x78}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 21:20:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 21:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 21:20:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 21:20:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x71, 0x11, 0x78}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 21:20:06 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) 21:20:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:06 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) [ 68.322214][ T4954] ieee802154 phy0 wpan0: encryption failed: -22 [ 68.332619][ T4958] ieee802154 phy0 wpan0: encryption failed: -22 [ 68.421398][ T4968] ieee802154 phy0 wpan0: encryption failed: -22 [ 68.486269][ C0] hrtimer: interrupt took 36490 ns 21:20:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:07 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) 21:20:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:07 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="38db013a5c714cd3622d7ba9cf13a172f6c6c6bec815", 0x16}}, 0x0) 21:20:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) [ 68.733575][ T4977] ieee802154 phy0 wpan0: encryption failed: -22 21:20:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) [ 68.839964][ T4989] ieee802154 phy0 wpan0: encryption failed: -22 21:20:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x8, 0x0, 0x4, 0x20100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000007fffffff, 0xab8a}, 0x8820, 0x100000200, 0x1000, 0x8, 0xb2df, 0x0, 0x0, 0x0, 0x57, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000640)=ANY=[], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0xec49b08f3b940e2d, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x6108, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x40001, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x6388848d}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) 21:20:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0