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"}) 14:19:52 executing program 0: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0xcd43fe309f30d633}, 0x10) [ 165.126335][ T9427] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 165.127952][ T9431] loop3: detected capacity change from 0 to 1024 14:19:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)={0x34, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x34}]}]}]}, 0x34}}, 0x0) 14:19:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c2010012", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:52 executing program 4: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private1}}) [ 165.137865][ T25] audit: type=1400 audit(1656080392.110:300): avc: denied { getopt } for pid=9426 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 165.144834][ T9431] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 165.157908][ T9427] device bond39 entered promiscuous mode 14:19:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x2, @remote={0xac, 0x10, 0x3}}, @l2tp={0x2, 0x0, @empty}, @phonet, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='syz_tun\x00'}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000001c0)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @name="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"}) [ 165.234710][ T9444] loop3: detected capacity change from 0 to 1024 [ 165.235362][ T9427] device veth119 entered promiscuous mode [ 165.235620][ T9427] bond39: (slave veth119): Enslaving as an active interface with an up link [ 165.247210][ T9444] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 14:19:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:52 executing program 0: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000480), 0x10) 14:19:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8}, 0x48) 14:19:52 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @private0}}}, 0x3a) 14:19:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c2010012", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:52 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1}}], 0x2, 0x0, 0x0) 14:19:52 executing program 0: bpf$ITER_CREATE(0xe, 0x0, 0x0) 14:19:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) [ 165.332568][ T9451] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 165.336613][ T9458] loop3: detected capacity change from 0 to 1024 14:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x2, &(0x7f0000000300)=@raw=[@map_val], &(0x7f0000000340)='GPL\x00', 0x1ff, 0xcb, &(0x7f0000000380)=""/203, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 165.360651][ T9451] device bond40 entered promiscuous mode [ 165.365220][ T9458] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 165.374759][ T9451] device veth121 entered promiscuous mode [ 165.374994][ T9451] bond40: (slave veth121): Enslaving as an active interface with an up link [ 165.432455][ T9474] loop3: detected capacity change from 0 to 1024 [ 165.435072][ T9474] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 165.436116][ T9468] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 165.443298][ T9468] device bond41 entered promiscuous mode 14:19:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:52 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f0000000340)=@framed={{}, [@alu={0x0, 0x0, 0x4}]}, &(0x7f0000000380)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000580)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000640), 0x8, 0x10, 0x0}, 0x80) 14:19:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000180)="aebde861", 0x4) 14:19:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="83dd53acbd1887b56ecc7bd851544c83", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="0d2754d312d02c15f3f5a61a93644d69", 0x10) 14:19:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) [ 165.491782][ T9468] device veth123 entered promiscuous mode [ 165.492007][ T9468] bond41: (slave veth123): Enslaving as an active interface with an up link 14:19:52 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x1c, 0x1, &(0x7f0000000240)=@raw=[@kfunc], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x7600, &(0x7f0000000240)=@raw=[@kfunc], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x85, &(0x7f00000002c0)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:52 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0xa003) [ 165.566753][ T9483] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 165.573456][ T9486] loop3: detected capacity change from 0 to 1024 [ 165.590091][ T9486] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 14:19:52 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8993, &(0x7f0000000000)={'gre0\x00', 0x0}) 14:19:52 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8940, &(0x7f0000000000)) 14:19:52 executing program 4: clock_gettime(0x0, &(0x7f0000000600)={0x0}) pselect6(0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640)={r0}, &(0x7f00000006c0)={&(0x7f0000000680)={[0xb9d]}, 0x8}) [ 165.614826][ T9483] device bond42 entered promiscuous mode [ 165.671766][ T9483] device veth125 entered promiscuous mode [ 165.671949][ T9483] bond42: (slave veth125): Enslaving as an active interface with an up link 14:19:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:52 executing program 0: socket(0xa, 0x2, 0x8) 14:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:52 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8940, &(0x7f0000000000)) 14:19:52 executing program 1: bpf$ITER_CREATE(0x1b, 0x0, 0x0) 14:19:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000580)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680), 0x10}, 0x80) [ 165.766527][ T9507] __nla_validate_parse: 4 callbacks suppressed [ 165.766542][ T9507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 165.766628][ T9511] loop3: detected capacity change from 0 to 1024 [ 165.778205][ T9511] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 14:19:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:52 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x89a0, &(0x7f0000000000)) [ 165.812667][ T9512] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:19:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00'}) [ 165.853815][ T9520] loop3: detected capacity change from 0 to 1024 [ 165.877966][ T9525] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 166.119344][ T80] tipc: Node number set to 10005162 14:19:53 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20012043, 0x0) 14:19:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x1, &(0x7f0000000240)=@raw=[@kfunc], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x85, &(0x7f00000002c0)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2efccb8f344e026c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, r1, 0xffffffffffffffff}, 0x14}}, 0x0) 14:19:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f00000002c0)) 14:19:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:53 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8904, &(0x7f0000000000)) 14:19:53 executing program 4: socket(0x11, 0x3, 0x4) 14:19:53 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8941, 0x0) [ 166.501023][ T9537] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 166.509694][ T9535] loop3: detected capacity change from 0 to 1024 14:19:53 executing program 4: socket(0x2, 0x0, 0x201) 14:19:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:53 executing program 4: bpf$PROG_LOAD_XDP(0x14, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:53 executing program 0: bpf$PROG_LOAD_XDP(0x16, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 166.567520][ T9536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 166.584260][ T9550] loop3: detected capacity change from 0 to 1024 14:19:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan4\x00'}) 14:19:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x280900, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) 14:19:53 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) accept$unix(r0, 0x0, 0x0) 14:19:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) [ 166.679301][ T9560] loop3: detected capacity change from 0 to 1024 [ 166.684940][ T9560] EXT4-fs mount: 138 callbacks suppressed [ 166.684955][ T9560] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 166.686165][ T9560] EXT4-fs error (device loop3): ext4_lookup:1812: inode #12: comm syz-executor.3: deleted inode referenced: 14 [ 166.698626][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:19:53 executing program 4: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8947, &(0x7f0000000000)={'gre0\x00', 0x0}) 14:19:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000700), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0101"], 0x48}}, 0x0) [ 166.745613][ T9567] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 166.751738][ T9570] loop3: detected capacity change from 0 to 1024 14:19:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x16, 0x0, 0x6436, 0x8001, 0x311}, 0x48) 14:19:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) [ 166.784518][ T9570] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 166.787387][ T9570] EXT4-fs error (device loop3): ext4_lookup:1812: inode #12: comm syz-executor.3: deleted inode referenced: 14 [ 166.790354][ T9569] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:19:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x2, &(0x7f0000000300)=@raw=[@map_val], &(0x7f0000000340)='GPL\x00', 0x1ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:53 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x300}}], 0x2, 0x0, 0x0) sendmsg$sock(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 166.794773][ T9569] bond43 (uninitialized): Released all slaves [ 166.828875][ T1840] EXT4-fs (loop3): unmounting filesystem. [ 166.849922][ T9587] loop3: detected capacity change from 0 to 1024 14:19:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:53 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @local}}}}) 14:19:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB='A'], 0x14}}, 0x0) 14:19:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0xfc, 0x0, 0x0, 0x1}, 0x48) 14:19:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, 0x0, 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) [ 166.890024][ T9587] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 166.900774][ T9587] EXT4-fs error (device loop3): ext4_lookup:1812: inode #12: comm syz-executor.3: deleted inode referenced: 14 [ 166.926182][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:19:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)={0x64, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x4c, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @loopback}}}}]}]}, 0x64}}, 0x0) 14:19:53 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x6e00, &(0x7f0000000240)=@raw=[@kfunc], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x85, &(0x7f00000002c0)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:53 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000580)={'ip6gre0\x00', &(0x7f0000000500)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0x700}}) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, 0x0, 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) [ 166.961358][ T9595] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:19:54 executing program 4: bpf$ITER_CREATE(0x15, 0x0, 0x0) 14:19:54 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000000)) [ 166.965343][ T9601] loop3: detected capacity change from 0 to 1024 [ 166.990975][ T9601] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 166.995947][ T9601] EXT4-fs error (device loop3): ext4_lookup:1812: inode #12: comm syz-executor.3: deleted inode referenced: 14 [ 167.005325][ T9595] bond43 (uninitialized): Released all slaves [ 167.018476][ T1840] EXT4-fs (loop3): unmounting filesystem. [ 167.033834][ T9606] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 167.054086][ T9614] loop3: detected capacity change from 0 to 1024 [ 167.088095][ T9614] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 167.109130][ T9614] EXT4-fs error (device loop3): ext4_lookup:1812: inode #12: comm syz-executor.3: deleted inode referenced: 14 [ 167.135128][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:19:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0xfffffff7, 0x0, 0x5, 0x0, 0x1}, 0x48) 14:19:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x12, 0x4, 0x0, 0x5}, 0x48) 14:19:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, 0x0, 0x0) statx(r0, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:54 executing program 1: clock_gettime(0x4, &(0x7f0000000200)) 14:19:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000007900)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000040)="8b", 0x1}], 0x1, &(0x7f0000000080)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0xa}}], 0x20}], 0x1, 0x0) 14:19:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:54 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x40086602, 0x0) [ 167.224608][ T9629] loop3: detected capacity change from 0 to 1024 [ 167.243262][ T9629] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 167.244166][ T9629] EXT4-fs error (device loop3): ext4_lookup:1812: inode #12: comm syz-executor.3: deleted inode referenced: 14 [ 167.244351][ T9631] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:19:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x92d, 0x1, 0x6}, 0x48) 14:19:54 executing program 1: connect$llc(0xffffffffffffffff, 0x0, 0x0) [ 167.265198][ T1840] EXT4-fs (loop3): unmounting filesystem. [ 167.267243][ T25] audit: type=1400 audit(1656080394.240:301): avc: denied { write } for pid=9630 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 167.293356][ T9631] bond43 (uninitialized): Released all slaves [ 167.302210][ T9642] loop3: detected capacity change from 0 to 1024 [ 167.307953][ T25] audit: type=1400 audit(1656080394.280:302): avc: denied { setattr } for pid=9640 comm="syz-executor.1" path="socket:[41674]" dev="sockfs" ino=41674 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 167.331214][ T9642] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 167.332326][ T9642] EXT4-fs error (device loop3): ext4_free_inode:355: comm syz-executor.3: bit already cleared for inode 13 [ 167.339497][ T9641] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 167.352442][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:19:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 14:19:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:54 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) 14:19:54 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x5452, &(0x7f0000000000)={'gre0\x00', 0x0}) 14:19:54 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000014c0)={'tunl0\x00', &(0x7f0000001440)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}}}) 14:19:54 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91e5dd6b3a3f80b2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:54 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8936, 0x0) 14:19:54 executing program 4: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x11, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xe) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000024c0)='./file0/file1\x00', 0x0, 0x0, 0x0) [ 167.537812][ T9658] loop3: detected capacity change from 0 to 1024 [ 167.569211][ T9658] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 14:19:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x59}, @jmp]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x85, &(0x7f0000000580)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 167.583322][ T9658] EXT4-fs error (device loop3): ext4_free_inode:355: comm syz-executor.3: bit already cleared for inode 13 [ 167.584023][ T9661] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 167.599851][ T1840] EXT4-fs (loop3): unmounting filesystem. [ 167.619148][ T9670] loop3: detected capacity change from 0 to 1024 [ 167.639521][ T25] audit: type=1400 audit(1656080394.610:303): avc: denied { listen } for pid=9671 comm="syz-executor.4" lport=46323 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 14:19:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:54 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3a0, &(0x7f0000000240)=@raw=[@kfunc], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x85, &(0x7f00000002c0)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, 0x0, 0x0, 0x0, 0x0) 14:19:54 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8911, &(0x7f0000000000)={'gre0\x00', 0x0}) [ 167.653460][ T9670] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 167.654358][ T9670] EXT4-fs error (device loop3): ext4_free_inode:355: comm syz-executor.3: bit already cleared for inode 13 [ 167.671587][ T1840] EXT4-fs (loop3): unmounting filesystem. [ 167.706914][ T25] audit: type=1400 audit(1656080394.680:304): avc: denied { accept } for pid=9671 comm="syz-executor.4" lport=46323 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 167.778679][ T9691] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 167.783163][ T9687] loop3: detected capacity change from 0 to 1024 14:19:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_proto_private(r0, 0x8982, 0x0) 14:19:54 executing program 0: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, 0x0, 0x0, 0x0, 0x0) 14:19:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 14:19:54 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8982, 0x0) 14:19:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) [ 167.802125][ T25] audit: type=1400 audit(1656080394.770:305): avc: denied { setopt } for pid=9671 comm="syz-executor.4" lport=46323 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 167.802224][ T25] audit: type=1400 audit(1656080394.770:306): avc: denied { read } for pid=9671 comm="syz-executor.4" lport=46323 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 14:19:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:54 executing program 4: clock_gettime(0x3, &(0x7f0000000380)) [ 167.815030][ T9687] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 167.841051][ T9687] EXT4-fs error (device loop3): ext4_free_inode:355: comm syz-executor.3: bit already cleared for inode 13 [ 167.847782][ T1840] EXT4-fs (loop3): unmounting filesystem. [ 167.914650][ T9705] loop3: detected capacity change from 0 to 1024 14:19:54 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:19:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030", 0x3d, 0x1800}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001", 0x1b, 0x4400}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0xc000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) statx(r0, 0x0, 0x0, 0x0, 0x0) 14:19:54 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000000)={0x0, "a79e658ca177bdc2230390ae5358f738b8bec14e40b069afffae2caaecf8a9825c16430d5fd6113c6506c3bed3cbf03be4ed5e03c0309024766f27fb56cc33ab7f11cb0065fea3a046087de3d1bf84bb233219db7a41273f4d1e771b6767d640919c99fe58cb7e2b9196bbc1bde507a1e1b1ed86dd4950e6deff29c400"}) [ 167.958376][ T9705] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 14:19:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x4, &(0x7f0000000500)=@framed={{}, [@jmp]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x85, &(0x7f0000000580)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:55 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x300, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) 14:19:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000004, 0x12, r0, 0x0) [ 167.959641][ T9705] EXT4-fs error (device loop3): ext4_free_inode:355: comm syz-executor.3: bit already cleared for inode 13 [ 167.982783][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:19:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b05, &(0x7f0000000000)={'wlan1\x00'}) 14:19:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@getpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in=@private, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, 0x6e6bb8}}, 0x50}}, 0x0) [ 168.006549][ T25] audit: type=1400 audit(1656080394.970:307): avc: denied { create } for pid=9717 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 14:19:55 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:19:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000000c0)="d8", 0x1) [ 168.010470][ T25] audit: type=1400 audit(1656080394.990:308): avc: denied { ioctl } for pid=9717 comm="syz-executor.4" path="socket:[40734]" dev="sockfs" ino=40734 ioctlcmd=0x89e4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 168.027301][ T9725] loop3: detected capacity change from 0 to 1024 [ 168.028344][ T25] audit: type=1400 audit(1656080395.000:309): avc: denied { write } for pid=9715 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 168.061183][ T9725] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 168.066610][ T9725] EXT4-fs error (device loop3): ext4_free_inode:355: comm syz-executor.3: bit already cleared for inode 13 [ 168.112194][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:19:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:55 executing program 4: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x890b, &(0x7f0000000000)) 14:19:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:55 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}) 14:19:55 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x3a) 14:19:55 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x300}}], 0x2, 0x0, 0x0) 14:19:55 executing program 4: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x5411, &(0x7f0000000000)) 14:19:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a}, 0x48) 14:19:55 executing program 0: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_clone(0x8000, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0) 14:19:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x24, [@int, @array, @enum]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000380)=""/4096, 0x48, 0x1000, 0x1}, 0x20) 14:19:55 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 14:19:55 executing program 0: bpf$BPF_PROG_DETACH(0x1e, &(0x7f0000001540)={@map}, 0x10) 14:19:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xd}, 0x48) 14:19:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x36006) 14:19:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={0x0, &(0x7f0000000800)}, 0x20) 14:19:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x1, &(0x7f0000000240)=@raw=[@func], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xaa, &(0x7f00000002c0)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@fwd={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000400)=""/247, 0x27, 0xf7, 0x1}, 0x20) 14:19:55 executing program 0: bpf$PROG_BIND_MAP(0x23, 0x0, 0x7) 14:19:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}]}}, &(0x7f0000000080)=""/244, 0x42, 0xf4, 0x1}, 0x20) 14:19:55 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xe0003, 0x0) 14:19:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000600)='^', 0x1}], 0x2}, 0x0) 14:19:55 executing program 4: bpf$BPF_PROG_DETACH(0x22, &(0x7f0000001540)={@map}, 0x10) [ 168.559263][ T9780] device bond39 entered promiscuous mode [ 168.599121][ T9780] device veth115 entered promiscuous mode [ 168.603638][ T9780] bond39: (slave veth115): Enslaving as an active interface with an up link 14:19:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:55 executing program 1: bpf$BPF_PROG_DETACH(0x16, &(0x7f0000001540)={@map}, 0x10) [ 168.609132][ T9780] 8021q: adding VLAN 0 to HW filter on device batadv60 [ 168.614512][ T9780] device batadv60 entered promiscuous mode [ 168.614880][ T9780] bond39: (slave batadv60): Enslaving as an active interface with an up link [ 168.657632][ T9799] device bond40 entered promiscuous mode 14:19:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:19:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000080)=""/244, 0x26, 0xf4, 0x1}, 0x20) 14:19:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, 0x48) 14:19:55 executing program 1: bpf$BPF_PROG_TEST_RUN(0x3, 0x0, 0x0) 14:19:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) [ 168.673518][ T9799] device veth117 entered promiscuous mode [ 168.673809][ T9799] bond40: (slave veth117): Enslaving as an active interface with an up link [ 168.679019][ T9799] 8021q: adding VLAN 0 to HW filter on device batadv61 [ 168.679879][ T9799] device batadv61 entered promiscuous mode 14:19:55 executing program 4: bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0}, 0x48) 14:19:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 14:19:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xc, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:19:55 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) syz_clone(0x8000, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0) 14:19:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:19:55 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x0, 0x14}, 0xc) 14:19:55 executing program 0: socketpair(0x28, 0x0, 0xfff, &(0x7f0000000000)) [ 168.680122][ T9799] bond40: (slave batadv61): Enslaving as an active interface with an up link 14:19:55 executing program 3: syz_clone(0x24a00080, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 14:19:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, 0x80) 14:19:55 executing program 1: bpf$BPF_PROG_DETACH(0x13, &(0x7f0000001540)={@map}, 0x10) [ 168.818873][ T9810] device bond41 entered promiscuous mode 14:19:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:55 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000004440)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000003c0)="ea", 0x1}, {0x0}], 0x2}}], 0x1, 0x0) 14:19:55 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x81) 14:19:55 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000480), 0x10000, 0x0) 14:19:55 executing program 0: syz_clone(0x18002000, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 14:19:55 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000080)={0x8}, 0x0) 14:19:55 executing program 3: syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:19:55 executing program 1: syz_clone(0x20000000, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) [ 168.868358][ T9824] device veth119 entered promiscuous mode [ 168.868527][ T9824] bond41: (slave veth119): Enslaving as an active interface with an up link 14:19:55 executing program 0: getdents(0xffffffffffffffff, &(0x7f0000001480)=""/20, 0x14) 14:19:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:55 executing program 4: pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 14:19:55 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000004c0), 0x20200, 0x0) [ 168.873030][ T9810] 8021q: adding VLAN 0 to HW filter on device batadv62 [ 168.873669][ T9810] device batadv62 entered promiscuous mode [ 168.873857][ T9810] bond41: (slave batadv62): Enslaving as an active interface with an up link [ 168.954099][ T9851] device bond42 entered promiscuous mode 14:19:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:56 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x109200, 0x0) 14:19:56 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/219, 0xdb}, {&(0x7f0000000100)=""/24, 0x18}], 0x2}, 0x41) 14:19:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005480)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x33}, 0x0) 14:19:56 executing program 0: r0 = epoll_create(0x3) r1 = inotify_init1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000011c0)) 14:19:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000000)={0x14, 0x15, 0x0, 0x0, 0x0, "", [@generic='D']}, 0x14}, {&(0x7f0000000140)={0x14, 0x18, 0x1, 0x0, 0x0, "", [@generic='Q']}, 0x14}], 0x2}, 0x0) [ 168.985270][ T9851] device veth121 entered promiscuous mode [ 168.985539][ T9851] bond42: (slave veth121): Enslaving as an active interface with an up link [ 169.023663][ T9851] 8021q: adding VLAN 0 to HW filter on device batadv63 [ 169.024325][ T9851] device batadv63 entered promiscuous mode [ 169.024635][ T9851] bond42: (slave batadv63): Enslaving as an active interface with an up link 14:19:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000001700)}, 0x0) 14:19:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000000540)={0x10d8, 0x0, 0x0, 0x0, 0x0, "", [@generic="495702292c1a96a5de7c797674f5a4bf35529bb5d60723a3e7f64d876db74bfb97abd4bb0ef1318dd01ff0ed83fd4f1c38d67d8cf3f0659ad283725515e81134e711fbd295e447d12ce4c1b5ebee23175caf", @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x10d8}, {&(0x7f00000005c0)={0x1210, 0x0, 0x0, 0x0, 0x0, "", [@generic="1e45e5dc22a97afae1c9acf64af3e86c564604ebac684014dcf43e42777634652dde48e288ac3a766f13b85f4f43ef697368baf174188c371334a2bfb8c60cba1925b0a4dbf764da97b79ea87bdad3fa6e015f2aabb2301b3ff37e7f0fd40749e8c16b3707fd", @generic="82155daf917ad44342a96e9c72b4ede25b61a46ce55cd7c640df1f4701b4a1c7e7ff4fe7dacda03ee1b7b951b302ba87b9dde264732c9e8b1eda7498f6c1ba404d312e265cfe4de868f88a6deb29141d19febfde7f548eb68fa5dc76489dc6dfd573cc33f7a69ab13186b10c7a891130a0aa9216248e681bf4fa9a76f4edb68e063a9f7b8618d7c0ce228c3c0ffca5558ee09dcea77382401547ec41da9fb9f52fc4db53568ff83cf7e4ab4457b712b4adeaf02da52a89", @nested={0x10dd, 0x0, 0x0, 0x1, [@generic="0987bdfd023a27d190c15382d8a56639cb09ca3e7ca693fb73bfc4bf88172423e90eb0f68c101bbf024b2f3ceba6ee5ffe57dd44928c8c7345ad793f520273d0606022719f694adc290c91a1858a6cb652fcc788152b67512ca5c5d014b72a3c8f9b4cf4cb727816a3", @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @ipv4}, @generic="763915556a83cdcf27e148ccd8df6c2506cb9d070a87ccee7d041a6f1bcd0216c4c3d87a6b0800000000000000fbb7de4bf3da767498e15e74ee098546f0c22abff771fedd8d7e393157ef1268e74da785dbf2bdd3c487149f1d4e6f930ecadc76a860aac766fe3432acfdb8e25b222f9ce8bef6396450423e8607f7019d3866be7d87e67d2d9abc55db081b06ae96", @typed={0x8, 0x0, 0x0, 0x0, @pid}]}]}, 0x1210}, {&(0x7f0000001800)={0x10}, 0xfffffffffffffc55}], 0x3}, 0x0) 14:19:56 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 14:19:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x163, 0x0, 0x0) 14:19:56 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x103) [ 169.155831][ T9877] device bond43 entered promiscuous mode [ 169.181853][ T9889] device veth123 entered promiscuous mode [ 169.182095][ T9889] bond43: (slave veth123): Enslaving as an active interface with an up link 14:19:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000140)={0x14, 0x1a, 0x1, 0x0, 0x0, "", [@generic='Q']}, 0x14}], 0x1}, 0x0) 14:19:56 executing program 4: r0 = epoll_create(0x5) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000011c0)) 14:19:56 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$char_usb(r0, 0x0, 0xfffffd1e) 14:19:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{0x0, 0x14}], 0x1}, 0x0) 14:19:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000000140)={0x18, 0x3c, 0xb00, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x1}, 0x0) 14:19:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="1400000015000000000000000000000044000000f628352f599e71f27ae24e0adf6ab0bb52f0c693853801fcb7cb512e4308a4ee6903b7f01cab65079442581f6d45e749dc6fc42d74f6812c66f5c000a06ba7328fbd3a4149e9d9196073c7fe5d0807c247b747e1930d861b8620a21fb9a2a547a53221f9"], 0x14}, {&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, "", [@generic='Q']}, 0xffffff4a}], 0x2}, 0x0) 14:19:56 executing program 4: r0 = epoll_create(0x3) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000011c0)={0x30000001}) 14:19:56 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x202201, 0x0) read$char_usb(r0, 0x0, 0x0) [ 169.187960][ T9877] 8021q: adding VLAN 0 to HW filter on device batadv64 [ 169.188469][ T9877] device batadv64 entered promiscuous mode [ 169.188736][ T9877] bond43: (slave batadv64): Enslaving as an active interface with an up link 14:19:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:56 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) read$char_usb(r0, 0x0, 0xfffffffffffffd24) 14:19:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000000)={0x10}, 0x10}, {&(0x7f0000000140)={0x13, 0x18, 0x0, 0x0, 0x0, "", [@generic='Q']}, 0x14}], 0x2}, 0x0) [ 169.271261][ T9903] device bond44 entered promiscuous mode [ 169.287300][ T9910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60 sclass=netlink_route_socket pid=9910 comm=syz-executor.3 [ 169.330263][ T9918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9918 comm=syz-executor.4 [ 169.340255][ T9903] device veth125 entered promiscuous mode [ 169.340573][ T9903] bond44: (slave veth125): Enslaving as an active interface with an up link [ 169.373973][ T9917] 8021q: adding VLAN 0 to HW filter on device batadv65 14:19:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:56 executing program 3: clock_gettime(0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x2, &(0x7f0000000300)=@raw=[@map_val], &(0x7f0000000340)='GPL\x00', 0x1ff, 0xcb, &(0x7f0000000380)=""/203, 0x41100, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x21, 0x0, &(0x7f0000000040)) 14:19:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x0, 0x4, 0xbf, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 14:19:56 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 14:19:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x42, 0x0, &(0x7f0000000100)) 14:19:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x18, 0x0, &(0x7f0000000100)) 14:19:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x5}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000600)=""/138, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x6bf, 0x0, &(0x7f0000000040)) 14:19:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x23, 0x0, &(0x7f0000000040)) [ 169.374744][ T9917] device batadv65 entered promiscuous mode [ 169.375064][ T9917] bond44: (slave batadv65): Enslaving as an active interface with an up link 14:19:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x1600bd74, 0x0, &(0x7f0000000100)) [ 169.470805][ T9938] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 169.486891][ T9938] device bond45 entered promiscuous mode [ 169.501674][ T9938] device veth127 entered promiscuous mode 14:19:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x2, 0x2, 0x7fff, 0x0, 0x1}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 14:19:56 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x15, 0x3, &(0x7f0000000580)=@framed, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006180)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_ttl={{0x14}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@dev}, {@dev}, {@local}, {@remote}, {@remote}]}]}}}], 0x5000}}], 0x1, 0x0) 14:19:56 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x2}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000600)=""/138, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:56 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x2}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000600)=""/138, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x3a, 0x0, &(0x7f0000000100)) 14:19:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x14, 0x0, 0x0) [ 169.501925][ T9938] bond45: (slave veth127): Enslaving as an active interface with an up link [ 169.508477][ T9938] 8021q: adding VLAN 0 to HW filter on device batadv66 [ 169.509265][ T9938] device batadv66 entered promiscuous mode [ 169.519228][ T9938] bond45: (slave batadv66): Enslaving as an active interface with an up link 14:19:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x2, 0x2, 0x2, 0x0, 0x1}, 0x48) 14:19:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x7, 0x0, &(0x7f0000000040)) 14:19:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb, 0x0, 0x0, 0x70}, 0x48) [ 169.634212][ T9957] device bond46 entered promiscuous mode 14:19:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) [ 169.707196][ T9957] device veth129 entered promiscuous mode [ 169.707412][ T9957] bond46: (slave veth129): Enslaving as an active interface with an up link [ 169.725874][ T9971] 8021q: adding VLAN 0 to HW filter on device batadv67 [ 169.726508][ T9971] device batadv67 entered promiscuous mode [ 169.726858][ T9971] bond46: (slave batadv67): Enslaving as an active interface with an up link 14:19:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0x7, 0x2a, [@sec_chan_ofs={0x3e, 0x1}]}]}, 0x28}}, 0x0) 14:19:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @private}}}}) 14:19:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, 0x0, 0x0) 14:19:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @link_local}, 0x10) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) 14:19:57 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002400)={0x6, 0x1, &(0x7f0000002180)=@raw=[@func], &(0x7f0000002200)='syzkaller\x00', 0x4, 0xc6, &(0x7f0000002240)=""/198, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)={0x3, 'vlan1\x00'}) 14:19:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}, 0x18) 14:19:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@remote, @in6=@private1}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xffffffffffffff8f) 14:19:57 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @empty, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @multicast, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x0) [ 170.104898][ T9983] validate_nla: 1 callbacks suppressed [ 170.104911][ T9983] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 170.163425][ T9983] device bond47 entered promiscuous mode 14:19:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) 14:19:57 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x100000b, 0x11, r0, 0x0) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 14:19:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x4d, 0x0, &(0x7f0000000100)) 14:19:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x6cb, 0x0, &(0x7f0000000040)) 14:19:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) 14:19:57 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 14:19:57 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 14:19:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 170.324232][ T9994] device veth131 entered promiscuous mode [ 170.324475][ T9994] bond47: (slave veth131): Enslaving as an active interface with an up link [ 170.348349][ T9983] 8021q: adding VLAN 0 to HW filter on device batadv68 [ 170.348988][ T9983] device batadv68 entered promiscuous mode [ 170.349262][ T9983] bond47: (slave batadv68): Enslaving as an active interface with an up link 14:19:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)) 14:19:57 executing program 3: socketpair(0x26, 0x0, 0x0, &(0x7f00000014c0)) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff01000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) [ 170.405063][T10015] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:19:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000042c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000004700)={0x0, 0x0, &(0x7f00000046c0)={&(0x7f0000001840)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010393000000000000000200000014000184"], 0x28}}, 0x0) 14:19:57 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0xd, 0x3, &(0x7f0000000580)=@framed, &(0x7f00000005c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000600)=""/138, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x7, &(0x7f0000000100)=@framed={{}, [@ldst={0x0, 0x3}, @initr0, @ldst]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000080)) [ 170.456420][T10015] device bond48 entered promiscuous mode [ 170.476274][T10015] device veth133 entered promiscuous mode [ 170.476594][T10015] bond48: (slave veth133): Enslaving as an active interface with an up link 14:19:57 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0xb, 0x0, 0x7) 14:19:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0xb, 0x0, 0x0) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff01000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:57 executing program 0: pipe(&(0x7f0000001380)) syz_genetlink_get_family_id$batadv(&(0x7f0000001400), 0xffffffffffffffff) 14:19:57 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x38, 0x0, 0x0) [ 170.509519][T10015] 8021q: adding VLAN 0 to HW filter on device batadv69 [ 170.510280][T10015] device batadv69 entered promiscuous mode 14:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures}) 14:19:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) [ 170.510556][T10015] bond48: (slave batadv69): Enslaving as an active interface with an up link [ 170.567160][T10042] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:19:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd80, 0x0, 0x0) 14:19:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x41, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x298, 0xffffffff, 0x1e0, 0xe0, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'dummy0\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0\x00', 'wlan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 14:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x298, 0xffffffff, 0x1e0, 0xe0, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'dummy0\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0\x00', 'wlan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 14:19:57 executing program 1: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8942, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff01000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0xa, 0x0, &(0x7f0000000040)) [ 170.581057][T10042] device bond49 entered promiscuous mode [ 170.625586][T10042] device veth135 entered promiscuous mode 14:19:57 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={r0}, 0x10) 14:19:57 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@map=r0, 0xffffffffffffffff, 0x7}, 0x10) 14:19:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth1_virt_wifi\x00'}) [ 170.625770][T10042] bond49: (slave veth135): Enslaving as an active interface with an up link [ 170.644259][T10042] 8021q: adding VLAN 0 to HW filter on device batadv70 [ 170.645095][T10042] device batadv70 entered promiscuous mode [ 170.646126][T10042] bond49: (slave batadv70): Enslaving as an active interface with an up link 14:19:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x3, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@getchain={0x23, 0x66, 0x1}, 0x24}}, 0x0) 14:19:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x2, 0x2, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, 0x0}, 0x20) [ 170.676004][T10065] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 170.688315][T10065] device bond50 entered promiscuous mode [ 170.712649][T10065] device veth137 entered promiscuous mode [ 170.712967][T10065] bond50: (slave veth137): Enslaving as an active interface with an up link [ 170.725809][T10065] 8021q: adding VLAN 0 to HW filter on device batadv71 [ 170.726394][T10065] device batadv71 entered promiscuous mode 14:19:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x30, 0x0, 0x0) 14:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002340)=[{{&(0x7f0000000000)={0x2, 0x4e21, @dev}, 0x10, 0x0}}, {{&(0x7f00000014c0)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000001680)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x38}}], 0x2, 0x0) 14:19:57 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8520"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@remote, @loopback}, 0xc) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0xffffffff, 0x1e0, 0xe0, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'dummy0\x00', 'batadv_slave_1\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}}]}, @REJECT={0x28}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0\x00', 'wlan0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0xa0, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) [ 170.726783][T10065] bond50: (slave batadv71): Enslaving as an active interface with an up link [ 170.807239][T10079] __nla_validate_parse: 14 callbacks suppressed [ 170.807253][T10079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 14:19:57 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8916, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 14:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'gre0\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x0, 0x7, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 170.902243][T10097] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 170.924639][T10097] device bond43 entered promiscuous mode 14:19:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:57 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, &(0x7f0000001200)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:57 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x48, 0x0, 0x7) 14:19:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000007c0)=@base={0x9, 0x21, 0x20, 0x81}, 0x48) 14:19:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, 0x0, 0x0) 14:19:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 14:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 14:19:58 executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000b00)={r0, 0xffffffff, 0x0}, 0x10) 14:19:58 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x1a, 0x0, 0x0) 14:19:58 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x2, 0x0, 0x0) 14:19:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x6, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x9}, {0x5}, {}, {0x8, 0x1}]}, @ptr={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000140)=""/212, 0x5e, 0xd4, 0x1}, 0x20) [ 171.020712][T10110] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 171.061050][T10110] device bond44 entered promiscuous mode [ 171.074288][T10120] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 14:19:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:58 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) 14:19:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006180)=[{{&(0x7f0000000000)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x14, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0xe3}]}}}], 0x18}}], 0x1, 0x0) 14:19:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd7e, 0x0, 0x0) 14:19:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x33, 0x0, 0x7) 14:19:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}) 14:19:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000b80)={'batadv0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl2\x00', r1, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000580)={'syztnl2\x00', 0x0}) 14:19:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000200)=""/183, 0x2e, 0xb7, 0x1}, 0x20) 14:19:58 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 14:19:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000000)="3825f730535f54b21231b38a0e01b8dfe192705995c4257deddefd90e2e58ee94532909b", &(0x7f0000000040)=""/139, &(0x7f0000000100)="7ae29183ba675bfb6040c310223ecc530678aea8e356ee4c9e4184f76a1507df13d8cad68fa7a180db5c5d327d24f4e1e1c5f2686bdab9563b8827047146ee055d962010de7efc234fcda5cfca99c5e3ed77bdce7dbe383f53093c01bb28a547c63e2bf3", &(0x7f0000000180)="fbc632521e48df40782a03f7635094c327fea7ac23865f2a5aa2dbb437de98c93c332ab37daed01b82d063b1d968815a52af55439b756bee17b23dabfadfd76406f2d51c982843767c2f01c86eb3b3b73cceb9c7c23d2395b0857a61", 0x4, 0x1, 0x4}, 0x38) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000b80)={'batadv0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl2\x00', r1, 0x29, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r3, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x10, 0x140a, 0x20, 0x70bd2c, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 171.222583][T10137] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 171.244942][T10137] device bond45 entered promiscuous mode [ 171.245124][T10146] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 14:19:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:58 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r0, 0xe000, 0x0}, 0x10) 14:19:58 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x42, 0x0, 0x0) 14:19:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f00000000c0)={0x0, 'batadv_slave_1\x00', {0x4}, 0xe87}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) r3 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r3, &(0x7f0000000080)="a3ad", 0x2, 0x0, &(0x7f0000000140)={0x11, 0xf6, r2, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'erspan0\x00', &(0x7f0000000000)={'gre0\x00', r2, 0x700, 0x8000, 0x7, 0xfff, {{0x8, 0x4, 0x0, 0xb, 0x20, 0x66, 0x0, 0x1, 0x2f, 0x0, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x6, [@dev={0xac, 0x14, 0x14, 0x26}]}, @lsrr={0x83, 0x3, 0x50}]}}}}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, 0x0, 0x0) 14:19:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:58 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8905, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 14:19:58 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x17, &(0x7f0000001200)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000000b6c0)={0x0, 0x0, &(0x7f000000b680)={0x0}}, 0x0) 14:19:58 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) 14:19:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x6c7, 0x0, &(0x7f0000000040)) [ 171.460887][T10162] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 171.461551][T10162] bond51 (uninitialized): Released all slaves 14:19:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) 14:19:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000000)="3825f730535f54b21231b38a0e01b8dfe192705995c4257deddefd90e2e58ee94532909b", &(0x7f0000000040)=""/139, &(0x7f0000000100)="7ae29183ba675bfb6040c310223ecc530678aea8e356ee4c9e4184f76a1507df13d8cad68fa7a180db5c5d327d24f4e1e1c5f2686bdab9563b8827047146ee055d962010de7efc234fcda5cfca99c5e3ed77bdce7dbe383f53093c01bb28a547c63e2bf3", &(0x7f0000000180)="fbc632521e48df40782a03f7635094c327fea7ac23865f2a5aa2dbb437de98c93c332ab37daed01b82d063b1d968815a52af55439b756bee17b23dabfadfd76406f2d51c982843767c2f01c86eb3b3b73cceb9c7c23d2395b0857a61", 0x4, 0x1, 0x4}, 0x38) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000b80)={'batadv0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl2\x00', r1, 0x29, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00'}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x10, 0x140a, 0x20, 0x70bd2c, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000580)={'syztnl2\x00', 0x0}) [ 171.513318][T10169] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 171.518798][T10169] device bond46 entered promiscuous mode [ 171.520968][T10171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.520983][T10171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.520992][T10171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.521004][T10171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.521013][T10171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.521059][T10171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.521067][T10171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.521078][T10171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.521086][T10171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.521097][T10171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:19:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x88, 0x66, 0x0, &(0x7f0000000100)) 14:19:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 14:19:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x5, 0x0, &(0x7f0000000040)) 14:19:58 executing program 1: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0xa1, 0x0, 0x0, @multicast2, @rand_addr=0x64010102, {[@noop, @lsrr={0x83, 0x17, 0x0, [@dev, @empty, @rand_addr, @broadcast, @rand_addr]}, @generic={0x0, 0x5, "192ffc"}, @lsrr={0x83, 0x1b, 0x0, [@multicast2, @private, @private, @remote, @local, @remote]}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}, @ra={0x94, 0x4}, @generic={0x0, 0x11, "063d76919a276eb564bbc7fedca621"}, @timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@remote}, {@dev}, {}, {@loopback}]}]}}}}}) 14:19:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x4a, 0x0, 0x0) 14:19:58 executing program 3: socketpair(0x2, 0x2, 0x1, &(0x7f00000000c0)) 14:19:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @private=0xa010100}, @nl, @l2tp={0x2, 0x0, @empty}}) 14:19:58 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) [ 171.521105][T10171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.521117][T10171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:19:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000040)=@rc={0x1f, @fixed}, 0x80, 0x0}, 0x0) 14:19:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x6c1, 0x0, &(0x7f0000000040)) [ 171.708191][T10190] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 171.709152][T10190] bond51 (uninitialized): Released all slaves [ 171.740664][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 171.740675][ T25] audit: type=1400 audit(1656080398.720:315): avc: denied { create } for pid=10203 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 171.759163][T10196] device bond47 entered promiscuous mode 14:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x2000) 14:19:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000021c0)={0x6, 0x3, &(0x7f0000001f40)=@framed, &(0x7f0000001fc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=[0xffffffffffffffff]}, 0x80) 14:19:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:19:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006180)=[{{&(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_ttl={{0x14}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@dev}, {@dev}, {@local}, {@remote}, {@remote}]}]}}}], 0xf}}], 0x1, 0x0) 14:19:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:19:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x12, 0x0, &(0x7f0000000100)) 14:19:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, &(0x7f0000001200)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 14:19:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}, 0x24040004) 14:19:58 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x29, 0x17, 0x0, 0x7) 14:19:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000001200)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000003340)) 14:19:58 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000021c0)={0x6, 0x3, &(0x7f0000001f40)=@framed, &(0x7f0000001fc0)='GPL\x00', 0xfbc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:19:58 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e00)={0x6, 0x8, &(0x7f0000001c80)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @btf_id, @btf_id, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000001d00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 171.929587][T10221] device bond48 entered promiscuous mode [ 171.952392][T10227] bond51 (uninitialized): Released all slaves 14:19:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:59 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f0000003780)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) [ 172.057055][T10249] device bond49 entered promiscuous mode 14:19:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0xd, 0x0, 0x0) 14:19:59 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x0) 14:19:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd74, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x298, 0xffffffff, 0x1e0, 0xe0, 0x0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'dummy0\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0\x00', 'wlan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 14:19:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89b0, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}}}}) 14:19:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x48, 0x0, &(0x7f0000000100)) 14:19:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002340)=[{{&(0x7f0000000000)={0x2, 0x4e21, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001480)=[@ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0x18}}, {{&(0x7f00000014c0)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000001680)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}, @ip_ttl={{0x14}}], 0x48}}], 0x2, 0x0) 14:19:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={0x0}}, 0x0) 14:19:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001300)={'sit0\x00', &(0x7f0000001200)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @dev}}}}) 14:19:59 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x3cf, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)={r0}, 0x4) 14:19:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x6, 0x15, 0x0, &(0x7f0000000040)) [ 172.154488][T10259] device bond50 entered promiscuous mode [ 172.166916][ T25] audit: type=1400 audit(1656080399.140:316): avc: denied { bind } for pid=10264 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 14:19:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:59 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 14:19:59 executing program 1: pipe2(&(0x7f0000000c00)={0xffffffffffffffff}, 0x0) bind$inet(r0, 0x0, 0x0) 14:19:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:19:59 executing program 3: r0 = getpgrp(0x0) setpgid(0x0, r0) 14:19:59 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 14:19:59 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/94) 14:19:59 executing program 3: setsockopt$sock_int(0xffffffffffffff9c, 0xffff, 0x0, &(0x7f0000000000), 0x4) msync(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 14:19:59 executing program 4: getgroups(0x1, &(0x7f0000000580)=[0xffffffffffffffff]) 14:19:59 executing program 1: r0 = socket(0x18, 0x3, 0x0) accept$inet(r0, 0x0, 0x0) 14:19:59 executing program 0: chown(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 14:19:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) [ 172.364466][T10283] device bond51 entered promiscuous mode [ 172.415604][ T25] audit: type=1400 audit(1656080399.390:317): avc: denied { accept } for pid=10295 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 14:19:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:59 executing program 3: setsockopt$sock_int(0xffffffffffffff9c, 0xffff, 0x0, &(0x7f0000000000), 0x4) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) msync(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5) 14:19:59 executing program 1: pipe2(&(0x7f0000000c00)={0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 14:19:59 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) 14:19:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) 14:19:59 executing program 4: pipe2(&(0x7f0000000c00)={0xffffffffffffffff}, 0x0) dup(r0) 14:19:59 executing program 0: setrlimit(0x8, &(0x7f0000000000)={0x0, 0x7fffffffffffffff}) 14:19:59 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)=""/88, 0xfffffffffffffe7f}, {&(0x7f0000000140)=""/107, 0x91}, {&(0x7f00000001c0)=""/209}], 0x2) 14:19:59 executing program 4: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0xfffffffffffffffd}) 14:19:59 executing program 1: pipe2(&(0x7f0000000c00)={0xffffffffffffffff}, 0x0) getsockname$inet(r0, 0x0, 0x0) 14:19:59 executing program 3: r0 = epoll_create1(0x0) r1 = dup(r0) lseek(r1, 0x0, 0x0) 14:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmmsg(r1, 0x0, 0x0, 0x0) [ 172.594273][T10308] device bond52 entered promiscuous mode 14:19:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f000000a980)=[{{0x0, 0x0, 0x0, 0x10060026137e6d0b}}], 0x1, 0x0) 14:19:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) 14:19:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) connect(r0, &(0x7f0000000000)=@nl=@proc, 0x80) 14:19:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, 0x0, 0x0, 0x8000) 14:19:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000004c00), 0x0, 0x8000) 14:19:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e1000a303004c000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4080) 14:19:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000002c0)="ebfa57f1875114ccbc1d4ec04c04985d60df8907b010756291818eef91b1fc8eb0501a336f2b280935e0d16827ab166fbb79882cdd5746da2b90e3d1e947a6a1ecb9889de7416dd89694fd356963aeebdf505bad324a3a2ada9d8859d9d1b382a0eb903727a36cd10053350c2710c77c0e7efe737ecefb9b7a20e5815938e6a21c4596922943ed2c5d8f1e65c8681de78bb2aeb010fcaa50af4088371f1900975ca4f7c4d34f8c42f9a9071f117751f18cecf1e3ffaa7c19eafab923a7cd27362be69dfc0f4b9d71ee1c6a61235aa012fcdfc61fbd5c9fe3a861c690f13e6fe2a3a85fad3dd297", 0xe7}, {&(0x7f00000000c0)="3110e75499079b0b4df28c4aa3644e9b8c70ee112e7753d6", 0x18}, {&(0x7f00000003c0)="4a66965d0456e5758c030c488fc0a111ca2166b071e4d18b04da2866c53aef1e2f12a5b714cecac3671aa8e82e1b7478480e946a0708c33d9eb07781a6aeec9d954ecbb219a3212a72bce2dfac1eecf4eb1456bb5fef44b4b6b62fed58e850874770e074823b0c6b34e060129a48fc6d1864fc4833876eb4f92deb32edca4a7643e60e3d92f1960bed5fa3f9d4c02b878b77ef66da040cb4adfe431faedde83690e8b87134c5bf85cc8aa41753d27ea1c47f7acb4723347d2da07a60905bded29141b53e2317f42dba79dc756d1450dcc92a5e", 0xd3}, {&(0x7f0000001340)="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", 0xe2e}, {0x0}, {&(0x7f0000000200)="e9", 0x1}], 0x6, &(0x7f0000000680)=[{0x10}, {0x10}], 0x20}, 0x0) 14:19:59 executing program 4: socketpair(0x23, 0x0, 0x2, &(0x7f0000002700)) 14:19:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0x1d}, 0x48) 14:19:59 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x15, 0x0, 0x0) 14:19:59 executing program 4: syz_clone(0x21000000, &(0x7f0000000000)="39ce8a3dc7f2c4db0900daf8cc3547528083c57d92f34bb3f0f4ca1ec0d202f049b810b8189ab70c31dc19cf402e387b78c13ef332ef515d36de191b26764769f694580dc979e1556d43f9", 0x4b, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="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") bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x14) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='blkio.throttle.io_serviced\x00', 0x0, 0x0) syz_clone(0x40001400, &(0x7f0000001140)="5abea49e72e3d3a49b4ae314fe04f139010e10013eea3831e425c35f4c61408b9d926cfb6e63834e5864d0b32d7f9a497f16ed247e6ff3c960d5f95a04933a9f1cc7df7af51f971de419a89ab789981936dff3054b6964b6795d943039f77ce6f08f726284f7447a87ffc2d2e9e01d9d5b4e6e18a0ef037373038b1dab6cacf236e30f7d10a623bb1a7aa993fcb00655e22af0263d3919704dd062260a53ce32f0652b0f1e0b120aa1aa7db387614ca14a09b52e11e469737ae264", 0xbb, &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)="cacac90167cdd4707b7f672fcafbe0f6caed888e5cdbcf3f42d037066d63e81c2a55885f65035f6f1faec7b8eb06b7f16c9c8ff794b15f23f12a69caea891c3887f7abaa4b1f78143984c484c9ce6e6a269359d582fd181159") ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x12) [ 172.834671][T10333] device bond53 entered promiscuous mode [ 172.837869][ T25] audit: type=1400 audit(1656080399.810:318): avc: denied { open } for pid=10341 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 14:19:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:19:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e1000a303004c000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 14:19:59 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000001040)='4', &(0x7f0000001140)="92"}, 0x48) 14:19:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) 14:19:59 executing program 0: syz_clone(0x160800, 0x0, 0x0, 0x0, 0x0, 0x0) [ 172.913279][T10347] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.914522][T10347] bond0: (slave team0): Enslaving as an active interface with an up link [ 172.937392][T10357] bond0: (slave team0): Releasing backup interface 14:19:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x3, 0xdb, &(0x7f0000000200)=""/219, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 172.944195][T10357] bridge0: port 3(team0) entered blocking state [ 172.944225][T10357] bridge0: port 3(team0) entered disabled state [ 172.946034][T10357] device team0 entered promiscuous mode [ 172.946091][T10357] device team_slave_0 entered promiscuous mode 14:20:00 executing program 3: syz_clone(0x80120000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:00 executing program 0: syz_clone(0x21000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="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") bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) syz_clone(0x40001400, 0x0, 0x0, &(0x7f0000001200), &(0x7f0000001240), 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 172.946134][T10357] device team_slave_1 entered promiscuous mode [ 173.025195][T10360] 8021q: adding VLAN 0 to HW filter on device team0 14:20:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x3, &(0x7f0000000880)=@framed, &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 14:20:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eb", 0x1}], 0x1}, 0x0) [ 173.026573][T10360] bond0: (slave team0): Enslaving as an active interface with an up link [ 173.075825][T10365] device bond54 entered promiscuous mode [ 173.076432][T10367] bond0: (slave team0): Releasing backup interface [ 173.079202][T10367] bridge0: port 3(team0) entered blocking state [ 173.079228][T10367] bridge0: port 3(team0) entered disabled state 14:20:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:00 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000009c0)={&(0x7f0000000380)=@l2tp={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000ac0)="1c", 0x1}], 0x1}, 0x0) 14:20:00 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x40}, 0x0, 0x4, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x4040060) 14:20:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) [ 173.087511][T10367] device team0 entered promiscuous mode [ 173.087523][T10367] device team_slave_0 entered promiscuous mode [ 173.087630][T10367] device team_slave_1 entered promiscuous mode 14:20:00 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, 0x0, 0x0) 14:20:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x00'}) [ 173.209370][ T25] audit: type=1400 audit(1656080400.180:319): avc: denied { kernel } for pid=10391 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 14:20:00 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001680)={0x6, 0x5, &(0x7f0000000480)=@framed={{}, [@cb_func]}, &(0x7f0000000500)='GPL\x00', 0x3, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:20:00 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x80000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:00 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x2, 0x0, 0x0) [ 173.266876][T10392] device bond55 entered promiscuous mode 14:20:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:20:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) recvmsg(r0, &(0x7f0000000e00)={0x0, 0x0, 0x0}, 0x0) [ 173.366741][ T25] audit: type=1400 audit(1656080400.340:320): avc: denied { read } for pid=10418 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 173.371362][T10415] device bond56 entered promiscuous mode 14:20:01 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:20:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0x1, &(0x7f0000000c80)=@raw=[@jmp], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0x9c, &(0x7f0000001fc0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:01 executing program 0: syz_clone(0x20001200, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:20:01 executing program 4: syz_clone(0x0, &(0x7f0000000000)="e763453c660d3e59ec13730080", 0xd, &(0x7f00000001c0), 0x0, 0x0) 14:20:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:20:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:01 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000ac0)="1c", 0x1}], 0x42}, 0x0) 14:20:01 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map, 0xffffffffffffffff, 0x4}, 0x10) 14:20:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'team_slave_1\x00', @dev}) 14:20:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:20:01 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000180)='z', 0x1}, {0x0, 0x40030000000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:20:01 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80002, 0x0) [ 174.052952][T10425] device bond57 entered promiscuous mode [ 174.067568][T10426] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:01 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x700) 14:20:01 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x22, 0x0, 0x0) 14:20:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'team_slave_1\x00', @dev}) 14:20:01 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0xc, 0x0, 0x0) 14:20:01 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x60182, 0x0) [ 174.099712][ T25] audit: type=1400 audit(1656080401.080:321): avc: denied { read } for pid=10435 comm="syz-executor.1" dev="nsfs" ino=4026532391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.099776][ T25] audit: type=1400 audit(1656080401.080:322): avc: denied { open } for pid=10435 comm="syz-executor.1" path="pid:[4026532391]" dev="nsfs" ino=4026532391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.180597][T10446] device bond58 entered promiscuous mode 14:20:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:01 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000ac0)="1c", 0x1}], 0x1}, 0x0) 14:20:01 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xcb) 14:20:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) 14:20:01 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x41ff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x20010, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x402, 0x0, 0x0, 0xf, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, r1, 0x2) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e1000a303004c000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) 14:20:01 executing program 1: perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x1, 0x13}, 0x48) 14:20:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x15, 0x3, &(0x7f0000000880)=@framed, &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6}, 0x48) 14:20:01 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:20:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) [ 174.327435][T10464] device bond59 entered promiscuous mode [ 174.327682][T10469] device team0 left promiscuous mode [ 174.327701][T10469] device team_slave_0 left promiscuous mode [ 174.327991][T10469] device team_slave_1 left promiscuous mode [ 174.328598][T10469] bridge0: port 3(team0) entered disabled state [ 174.338663][T10469] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.350946][T10469] bond0: (slave team0): Enslaving as an active interface with an up link [ 174.352959][T10473] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 174.372478][T10469] syz-executor.3 (10469) used greatest stack depth: 10408 bytes left [ 174.465940][T10486] device bond60 entered promiscuous mode 14:20:01 executing program 3: bpf$BPF_PROG_ATTACH(0x11, &(0x7f0000000080), 0x14) 14:20:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="050000f1"], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0x9c, &(0x7f0000000d00)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:02 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x23, 0x0, 0x0) 14:20:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) 14:20:02 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)='q', 0x7ffff000}], 0x1}, 0x0) 14:20:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e1000a303004c000e0021000f00000002800000121f", 0x2e}], 0x1}, 0x0) 14:20:02 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000800), 0x141000, 0x0) 14:20:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000b80)={'batadv0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl2\x00', r1, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) socket$inet6_udp(0xa, 0x2, 0x0) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) [ 175.151846][T10497] validate_nla: 20 callbacks suppressed [ 175.151860][T10497] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:20:02 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)='q', 0xffffff1f}], 0x1}, 0x0) 14:20:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x94, &(0x7f0000000080)=""/148, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:02 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)='q', 0x1}], 0x1, 0x0, 0x1000000}, 0x0) 14:20:02 executing program 4: syz_clone(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) syz_clone(0x40001400, &(0x7f0000001140), 0x0, &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)="cacac90167cdd4707b7f672fcafbe0f6caed888e5cdbcf3f42d037066d63e81c2a55885f65035f6f1faec7b8eb06b7f16c9c8ff794b15f23f12a69caea891c3887f7abaa4b1f78143984c484c9ce6e6a269359d582fd181159a791d81a83c821") bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 175.164251][T10497] device bond61 entered promiscuous mode [ 175.164364][T10502] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 175.205143][T10504] netlink: 'syz-executor.0': attribute type 33 has an invalid length. 14:20:02 executing program 1: socketpair(0x6, 0x0, 0x0, &(0x7f0000000240)) [ 175.254323][T10510] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:20:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) 14:20:02 executing program 1: bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000000)={@map=0x1}, 0x92) 14:20:02 executing program 3: openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000240)='<', 0x1}], 0x1}, 0x0) 14:20:02 executing program 0: socketpair(0xa, 0x1, 0x6, &(0x7f0000000980)) [ 175.269901][T10510] device bond62 entered promiscuous mode [ 175.313370][ T25] audit: type=1400 audit(1656080402.290:323): avc: denied { create } for pid=10522 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 14:20:02 executing program 1: perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:02 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x280}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) getpid() r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x4040060) 14:20:02 executing program 4: socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)) 14:20:02 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@name, 0x10, 0x0}, 0x0) [ 175.389909][T10533] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 14:20:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x94, &(0x7f0000000080)=""/148, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x7}, 0x48) 14:20:02 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1d, 0x0, 0x0) [ 175.432999][ T25] audit: type=1400 audit(1656080402.410:324): avc: denied { create } for pid=10539 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 175.481132][T10533] device bond63 entered promiscuous mode [ 175.482519][T10544] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@mark={{0x14}}], 0x18}, 0x0) 14:20:02 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f00000008c0)='syzkaller\x00', 0xbd, 0xad, &(0x7f0000000000)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x16, 0x0, 0x7, 0x3ff, 0x1000, r1, 0x1, '\x00', 0x0, r1, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f40)={0xca885c0e1a4ff8c7, 0x5, &(0x7f0000000b40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @exit, @map_fd={0x18, 0x2}, @exit], &(0x7f0000000b80)='GPL\x00', 0x401, 0x0, 0x0, 0x100, 0xa, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x4, 0x2ba0, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)={&(0x7f0000000880)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x1, 0x7ff, 0x6, 0x1209, r1, 0xf7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) bpf$ITER_CREATE(0x21, 0x0, 0x0) 14:20:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)='q', 0xfffffdef}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000005dc0)) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:20:02 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x280}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) getpid() r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x4040060) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:20:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100), 0x88) 14:20:02 executing program 4: r0 = socket(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x1) [ 175.653528][T10560] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 175.673150][T10560] device bond64 entered promiscuous mode [ 175.686080][T10566] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:02 executing program 3: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000004c0)={0x0, 0x4, 0x0, 0x9}, 0x10) 14:20:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 14:20:02 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f0000000740)={0x0, 0x2, "d8e7"}, &(0x7f0000000840)=0xa) [ 175.717245][T10572] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 175.747877][T10572] device bond65 entered promiscuous mode 14:20:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:20:02 executing program 1: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) 14:20:02 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) recvmsg(r1, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x1) 14:20:02 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000000)="e4", 0x1, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 14:20:02 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) recvmsg(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/223, 0xdf}, 0x2) 14:20:02 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@abs={0x8}, 0x3, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000200)="f5f8181aaf10ce6609fb029baf94217dd51736ebd08d2e4369447bb2e979e48658013c223a33fadbfbe1779e47ab50046727d395861e2a2b30b74a3379450e830fec07519bc1f1f8927928440cd9d29ab71fc827aa23c3a4f0b0e441e9e3d6e801a1f8da76a03e25388ff4ba5204f1254e2dc8cf7466411a3ea881923e1762a21cdb0769e788bcaee1f45f23", 0x8c}], 0x10000000000001a3}, 0x0) 14:20:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 175.918439][T10586] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 175.934513][T10586] device bond66 entered promiscuous mode 14:20:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x14, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0x8) 14:20:02 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 14:20:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x4) 14:20:02 executing program 4: r0 = socket(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/110, 0x6e}, 0x0) [ 175.934635][T10598] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:03 executing program 0: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000180), &(0x7f0000000300)=0x8) 14:20:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @init={0x14}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xb4}, 0x0) 14:20:03 executing program 4: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 14:20:03 executing program 3: syz_emit_ethernet(0x1fff, &(0x7f0000000cc0)={@broadcast, @empty, @val, {@ipv6}}, 0x0) [ 176.015763][T10605] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 176.035107][T10605] device bond67 entered promiscuous mode 14:20:03 executing program 4: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x98) 14:20:03 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0xfe23367f27f0c4fe, 0x0) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) bind$unix(r1, &(0x7f0000000100)=ANY=[], 0xa) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 14:20:03 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000000580)=[@rights], 0x10}, 0x1) [ 176.102527][T10621] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 176.140012][T10621] device bond68 entered promiscuous mode 14:20:03 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 176.140133][T10627] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 176.250419][T10648] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 176.272281][T10648] device bond69 entered promiscuous mode 14:20:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f00000000c0)=@un=@abs={0x8}, 0x8) 14:20:03 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 14:20:03 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd664aeb860188230100000000000000000000000000000001000000000003"], 0x0) 14:20:03 executing program 3: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000000)=0x4, 0x4) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:20:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002540)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000002440)=[@authinfo={0x10}, @sndrcv={0x2c}, @sndrcv={0x2c}, @sndrcv={0x2c}, @init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @prinfo={0x14}], 0xd8}, 0x0) 14:20:03 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 14:20:03 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000440)={0x0, @in, 0xfffff538, 0x0, 0x0, 0x0, 0x800}, 0x98) 14:20:03 executing program 1: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 14:20:03 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) chown(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) [ 176.395287][T10659] device bond70 entered promiscuous mode [ 176.399250][T10665] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 176.481681][T10680] device bond71 entered promiscuous mode 14:20:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff010000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:03 executing program 3: r0 = socket(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000045c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000004500)=[@init={0x14}, @sndinfo={0x1c}], 0x30}, 0x0) 14:20:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f0000000740), &(0x7f0000000840)=0x8) 14:20:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002540)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x88) 14:20:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 14:20:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x0, 0x394}, 0x98) 14:20:03 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd66"], 0x0) 14:20:03 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000700)=@in6={0x1c, 0x1c, 0x2}, 0x1c) r1 = socket(0x1c, 0x10000001, 0x0) dup2(r1, r0) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 14:20:03 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) [ 176.580839][T10696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 176.621520][T10692] device bond72 entered promiscuous mode 14:20:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff01000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 14:20:03 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x4000) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000000)="81", 0x1, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 14:20:03 executing program 0: syz_emit_ethernet(0x16, &(0x7f0000000000)={@local, @remote}, 0x0) 14:20:03 executing program 4: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 14:20:03 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000cc0)={@local, @local, @val, {@ipv6}}, 0x0) 14:20:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000000c0)={r3}, &(0x7f0000000180)=0x8) 14:20:03 executing program 4: sync() socket$inet6_sctp(0xa, 0x0, 0x84) 14:20:03 executing program 1: r0 = socket(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000045c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000004500)=[@init={0x14}], 0x14}, 0x0) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000300)="1d", 0x1, 0x100, &(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) [ 176.765915][T10720] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:03 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 176.838073][T10725] device bond73 entered promiscuous mode 14:20:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff01000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:03 executing program 0: r0 = socket(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001600)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000001580)=[@sndrcv={0x2c}], 0x2c}, 0x0) 14:20:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 14:20:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@prinfo={0x14}], 0x14}, 0x0) 14:20:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000), 0x4) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000100), 0xc) 14:20:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000080), &(0x7f0000000000)=0x8) 14:20:03 executing program 0: setresgid(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 14:20:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10}, 0x10) 14:20:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000580)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[], 0x20}, 0x0) 14:20:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)=ANY=[@ANYBLOB="01", @ANYRES32=0x0], &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000000c0)={r3}, &(0x7f0000000180)=0x8) 14:20:03 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f0000000280)={0x0, 0x2, "0895"}, &(0x7f0000000000)=0xa) [ 177.022371][T10751] device bond74 entered promiscuous mode [ 177.022445][T10760] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff01000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:04 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x10281, 0x0) 14:20:04 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) listen(r1, 0x0) 14:20:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001640)={&(0x7f00000011c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 14:20:04 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x200, 0x0) 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 14:20:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ff}, 0x14) 14:20:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000001c0), 0x88) 14:20:04 executing program 1: r0 = socket(0x2, 0x1, 0x84) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:04 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000240), &(0x7f0000000300)=0x90) 14:20:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x8001, 0x394}, 0x98) 14:20:04 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000440)=@in6={0x1c, 0x1c, 0x3}, 0x1c) [ 177.202818][T10785] device bond75 entered promiscuous mode [ 177.202912][T10790] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:20:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:04 executing program 4: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x8007, &(0x7f0000000040)=ANY=[@ANYRES8], 0x14) 14:20:04 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) 14:20:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000840)={&(0x7f0000000180)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000740)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast1}, @authinfo={0x10}, @authinfo={0x10}, @sndrcv={0x2c}, @dstaddrv4={0x10, 0x84, 0x9}, @authinfo={0x10}, @sndrcv={0x2c}], 0xbc}, 0x0) 14:20:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), 0x90) 14:20:04 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000001480)={0x0, 0x0, 0x0, 0xfffffff7}, 0x14) 14:20:04 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 14:20:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x40000100, 0x0, 0x0, 0x0, 0x8}, 0x98) 14:20:04 executing program 1: syz_emit_ethernet(0x1fff, &(0x7f0000000000)=ANY=[@ANYRES8], 0x0) 14:20:04 executing program 0: r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cdg\x00', 0x4) 14:20:04 executing program 4: openat(0xffffffffffffff9c, 0x0, 0xb21406b411acea65, 0x0) [ 177.414950][T10811] device bond76 entered promiscuous mode [ 177.433930][T10821] device bond51 entered promiscuous mode 14:20:04 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x28, 0x0) 14:20:04 executing program 1: recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/94, 0x5e, 0x0, &(0x7f0000000080)=@un=@abs={0x8}, 0xfffffffffffffea3) 14:20:04 executing program 0: r0 = socket(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@un=@file={0xa}, 0xa) 14:20:04 executing program 4: r0 = socket(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) 14:20:04 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="0a016c6530"], 0xa, 0x0}, 0x0) 14:20:04 executing program 1: r0 = socket(0x2, 0x1, 0x84) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000000300)=[@rights, @rights], 0x20}, 0x0) 14:20:04 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000440)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 14:20:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x8) [ 177.484177][T10821] bond51: (slave veth139): Enslaving as an active interface with a down link 14:20:04 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x27, 0x0, &(0x7f00000000c0)) 14:20:04 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 14:20:04 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x803, 0x0) 14:20:04 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000001480), 0x88) [ 177.544151][T10848] device bond77 entered promiscuous mode [ 177.566563][T10855] device bond52 entered promiscuous mode 14:20:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, &(0x7f0000001300)="1f", 0x1, 0x0, &(0x7f0000001380)=@in={0x10}, 0x10) 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) 14:20:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 14:20:04 executing program 4: bpf$OBJ_GET_MAP(0x1d, 0x0, 0x0) 14:20:04 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) 14:20:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x401c5820, 0x0) 14:20:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[{0x10}], 0x10}, 0x0) 14:20:04 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42001, 0x0) [ 177.659810][T10855] bond52: (slave veth141): Enslaving as an active interface with a down link 14:20:04 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) 14:20:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 14:20:04 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000900)={r2}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x3, 0x0, 0x2, 0x6, 0x1, 0xfffffffffffffff0}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0x9, 0x63, &(0x7f0000000140)=""/99, 0x40f00, 0x4, '\x00', r0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0x4, 0x10001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)=[r1, r2, 0x1]}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:20:04 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 177.719632][T10883] device bond78 entered promiscuous mode [ 177.749034][T10892] device bond53 entered promiscuous mode 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 14:20:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000000)="bf727c4e25a1ce9727", 0x0}, 0x48) 14:20:04 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x402, 0x0) 14:20:04 executing program 4: openat$tun(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 14:20:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:20:04 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x688600, 0x0) 14:20:04 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={0x0, 0x0, 0x18}, 0x10) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0)) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@array]}, {0x0, [0x0, 0x0]}}, 0x0, 0x34}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) gettid() 14:20:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x4}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/139, 0x35, 0x8b, 0x1}, 0x20) [ 177.819356][T10892] bond53: (slave veth143): Enslaving as an active interface with a down link [ 177.857606][T10912] device bond79 entered promiscuous mode 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 14:20:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c1c39977dc4d0c2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 14:20:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000004680)=@base={0x0, 0x0, 0x0, 0x0, 0x84, 0xffffffffffffffff, 0x10001}, 0x48) 14:20:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002180)={0x0, 0x0, 0x0}, 0x0) [ 177.903096][T10921] device bond54 entered promiscuous mode 14:20:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x80086601, 0x0) 14:20:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) close(r0) 14:20:04 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x101) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x2, 0x18}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getpid() syz_clone(0x222100, 0x0, 0x0, &(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)="c1ebd65cd7224d1b45a6156bdb92255926e9e6f4d3a32ac1695f4a7206ab87cc9438ca5f6160b8b58bb83c89aa6ad855ab1d32f0b313c0d649803f21fc59ab9bc20544d26bc34e7a233658aa4c379700bade30a27d8ed602efffcd4fee9e4d2a8f658c6f946f895f5da503038ad38fbf2d1d9df37dcdc0de0bcf5dcd35442731222ca02a7758ac2c2118db225ff9d1c2b6ca788ade6305fc20") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) openat$cgroup(0xffffffffffffffff, &(0x7f0000001ec0)='syz0\x00', 0x200002, 0x0) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000001f00)={'ipvlan0'}, 0xa) 14:20:04 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=@raw=[@cb_func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 14:20:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 14:20:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x14, 0x0, 0x8, 0x9}, 0x48) 14:20:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) [ 177.978287][T10921] bond54: (slave veth145): Enslaving as an active interface with a down link [ 177.984244][T10932] device bond80 entered promiscuous mode 14:20:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x24) 14:20:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003040)={0x11, 0x2, &(0x7f0000001f40)=@raw=[@map_idx_val], &(0x7f0000001f80)='GPL\x00', 0x0, 0x1000, &(0x7f0000001fc0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:05 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002c40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000001c00)="bb", &(0x7f0000001c40)="a7"}, 0x48) 14:20:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x24) [ 178.032038][T10951] device bond55 entered promiscuous mode [ 178.057723][T10953] device bond81 entered promiscuous mode 14:20:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 14:20:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0xfe, 0x0, 0x0, 0x40444, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x40, 0x0, 0x0, 0x6, 0x0, 0xfffffffd}, 0x0, 0xfffffffff7ffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1d400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x6, @perf_config_ext={0x4000000000000003, 0x4e}, 0x0, 0x400000000000004, 0xfffffc01, 0x6, 0x1814, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r0, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x3f, 0x40, 0x7, 0x0, 0x9, 0x124a7c, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x4f0000000, 0x8, 0x2, 0x3ff, 0x7fff, 0x7, 0x0, 0x3ff}, 0x0, 0x1, r1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x795d02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'gretap0\x00', 0x1000}) ioctl$TUNSETOFFLOAD(r3, 0x400454c9, 0x13) socketpair(0x22, 0x6, 0x800005, &(0x7f0000000380)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000002c0)=0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) sendmsg$inet(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000280), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) 14:20:05 executing program 4: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000180)) 14:20:05 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x7fffffff}, 0x8) [ 178.093141][T10951] bond55: (slave veth147): Enslaving as an active interface with a down link 14:20:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f00000001c0)=""/208, 0x26, 0xd0, 0x1}, 0x20) 14:20:05 executing program 4: syz_clone(0x40940080, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000200)="c167a43f67fdac80d674d178e1bb97618ffb7e1694e34ba033d223a235ac0523410298f00dede7bafaabf67c78df212891777d00027db9eab49b6e2853d2ffb5136c15") recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000340)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x0) 14:20:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x24) 14:20:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000a40)={&(0x7f00000008c0)=@abs, 0x6e, &(0x7f0000000980)=[{0x0}], 0x1}, 0x2002) 14:20:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x24) [ 178.175291][T10975] device bond56 entered promiscuous mode [ 178.178518][T10973] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.178609][T10973] bridge0: port 1(bridge_slave_0) entered disabled state 14:20:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000180)) 14:20:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:20:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, &(0x7f00000005c0)=[{0x18, 0x0, 0x0, "e2"}, {0x10}], 0x28}, 0x0) [ 178.232355][T10975] bond56: (slave veth149): Enslaving as an active interface with a down link [ 178.232502][T10973] device bridge_slave_1 left promiscuous mode [ 178.232589][T10973] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.233136][T10973] device bridge_slave_0 left promiscuous mode [ 178.233267][T10973] bridge0: port 1(bridge_slave_0) entered disabled state 14:20:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 14:20:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:05 executing program 4: perf_event_open$cgroup(&(0x7f0000001e40)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:20:05 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x18}, 0x10) 14:20:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={0x0, &(0x7f0000000c40)=""/217, 0x0, 0xd9}, 0x20) 14:20:05 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 178.342891][T10996] device bond57 entered promiscuous mode [ 178.415364][T10996] bond57: (slave veth151): Enslaving as an active interface with a down link 14:20:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0_macvtap\x00'}) 14:20:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) 14:20:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002640)={0x6, 0x1, &(0x7f00000023c0)=@raw=[@call], &(0x7f0000002400)='syzkaller\x00', 0x6, 0x8d, &(0x7f0000000100)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 14:20:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:20:06 executing program 3: syz_clone(0x0, &(0x7f0000000cc0), 0x0, 0x0, 0x0, 0x0) 14:20:06 executing program 3: renameat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x0) 14:20:06 executing program 2: setsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, 0x0, 0x0) 14:20:06 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) readv(r0, &(0x7f00000011c0)=[{0x0}], 0x1) 14:20:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r1, &(0x7f00000000c0)=""/187, 0xbb, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000002c0)="de730bb37fee7f5c668d72ebdb63f7031245c7adf08444eebea1f9c52ef7e91fd3f48d3e5faefd688d4180c3e3a0be4ece1b8c3efdd210c74da1e9bdec341a5ff36225d0e1fa7cc5b5dc4fc24c98df0bbd2962d2b5c5806b749a530a1bd9db85bef1e77770356acba7790cbde4b88e10f092d274e57be12963932596cafd75085b1e6388997be58c5a8d8960b2a6b6cd36c1f180113301678b8b35a3a145f5f3a82d8fe946574427bc51ea59703ff3dc8f0066c997", 0xb5}, {&(0x7f0000000380)="34dee09bb6299016784ce860eb9fb923ce17601c6c8e64515e4c3f629faf024523e1a732be324fb215e07af6427ba5c191f4b583b6102a1c1e579651734514c93675536ea69e3b526b3b2903cf257abde844d20ef78fd98e26749b89e77b160c256c3e42829589883620c9d479827f5ebdec4f92ed31459f57aab0b6af", 0x7d}, {&(0x7f0000000400)="274cfe20bb10ab516257ace38017bbbb20288c8067a0fbb42bb4ce4372c3ef879f8fd7f5fb3caa233e3bc00e0c1abdd0ff1dcf31c474910f81e5e12f96aa10", 0x3f}], 0x3}, 0x0) 14:20:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pim6reg1\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 14:20:06 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$getflags(r0, 0x3) 14:20:06 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) [ 179.121248][T11025] device bond58 entered promiscuous mode 14:20:06 executing program 3: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000001c40), 0xc) 14:20:06 executing program 1: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 14:20:06 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001f00)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 14:20:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:20:06 executing program 4: pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 14:20:06 executing program 2: socket$inet(0x2, 0x3, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 14:20:06 executing program 3: open$dir(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 14:20:06 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 179.278710][T11025] bond58: (slave veth153): Enslaving as an active interface with a down link 14:20:06 executing program 4: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 14:20:06 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) 14:20:06 executing program 0: chown(0x0, 0x0, 0x0) 14:20:06 executing program 1: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 14:20:06 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:20:06 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}}, @init={0x14}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xa4}, 0x0) 14:20:06 executing program 0: bpf$BPF_LINK_CREATE(0x14, &(0x7f0000000340), 0x10) [ 179.401217][T11056] device bond59 entered promiscuous mode 14:20:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:20:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x4020940d, &(0x7f0000000040)) 14:20:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) 14:20:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vcan0\x00', 0x1}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000140)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000200)) 14:20:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 14:20:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x401054d6, 0x0) 14:20:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x801054db, &(0x7f0000000040)) 14:20:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x4, 0x40005, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0}, 0x20) [ 179.479558][T11056] bond59: (slave veth155): Enslaving as an active interface with a down link 14:20:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 14:20:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x401054d5, 0x0) [ 179.563059][T11085] device bond60 entered promiscuous mode 14:20:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)) 14:20:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30f) [ 179.654300][T11085] bond60: (slave veth157): Enslaving as an active interface with a down link 14:20:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:20:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) 14:20:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x8924, &(0x7f0000000040)) 14:20:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x800454e0, &(0x7f0000000040)={0x0, 0x1, [@broadcast]}) 14:20:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) 14:20:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000380)}, 0x20) [ 179.755472][T11114] device bond61 entered promiscuous mode 14:20:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x8, [@multicast]}) 14:20:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) 14:20:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) [ 179.807107][T11114] bond61: (slave veth159): Enslaving as an active interface with a down link 14:20:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, 0x0, &(0x7f00000002c0)) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:20:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x4020940d, &(0x7f00000001c0)={'lo\x00'}) 14:20:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x800454e0, &(0x7f0000000040)={0x0, 0x1, [@broadcast]}) 14:20:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e0, 0x0) 14:20:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x8924, 0x0) 14:20:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x4, 0x40005, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x18}, 0x48) 14:20:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) 14:20:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00'}) [ 179.939244][T11134] device bond62 entered promiscuous mode 14:20:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x1, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) 14:20:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x800454e0, &(0x7f0000000040)={0x0, 0x1, [@broadcast]}) 14:20:07 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000600)={0xfffffffffffffffc, 0x0, 0x0}, 0x0) 14:20:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x3}]}}, &(0x7f0000000200)=""/177, 0x2a, 0xb1, 0x1}, 0x20) [ 180.003925][T11134] bond62: (slave veth161): Enslaving as an active interface with a down link 14:20:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) 14:20:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x300, [@broadcast]}) 14:20:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 14:20:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) [ 180.095812][T11157] device bond63 entered promiscuous mode [ 180.133432][T11157] bond63: (slave veth163): Enslaving as an active interface with a down link 14:20:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vcan0\x00', 0x1}) ioctl$TUNSETCARRIER(r0, 0x400454cd, &(0x7f0000000200)) 14:20:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x800454e0, &(0x7f0000000040)={0x0, 0x1, [@broadcast]}) 14:20:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) 14:20:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) 14:20:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) [ 180.167320][T11166] validate_nla: 25 callbacks suppressed [ 180.167335][T11166] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 180.174354][T11166] device bond64 entered promiscuous mode [ 180.204117][T11166] bond64: (slave veth165): Enslaving as an active interface with a down link [ 180.262255][T11177] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 180.269181][T11177] device bond65 entered promiscuous mode [ 180.303492][T11177] bond65: (slave veth167): Enslaving as an active interface with a down link 14:20:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454d0, 0x301) 14:20:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000380), 0x0}, 0x20) 14:20:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454dd, &(0x7f0000001340)) 14:20:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x0, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x4, [@broadcast, @random="b7536095423f", @random="759879c9b497", @dev]}) 14:20:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) 14:20:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x40049409, &(0x7f00000001c0)={'lo\x00'}) 14:20:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) 14:20:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) 14:20:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x2, [@broadcast, @random="b7536095423f"]}) [ 180.919824][T11186] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 180.939574][T11186] device bond66 entered promiscuous mode 14:20:08 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x18000000000000}, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x80604e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000980)=0x6) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x91201, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8f8}, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup(r1, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200)=' \x8e\r\n#\x1c\xf8=\xf4\x00'}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000680)='lo:\x96o\x18\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x0, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETFILTEREBPF(r0, 0x800454dd, 0x0) [ 181.006646][T11186] 8021q: adding VLAN 0 to HW filter on device batadv87 [ 181.008589][T11186] bond66: (slave batadv87): making interface the new active one [ 181.008605][T11186] device batadv87 entered promiscuous mode 14:20:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)=ANY=[@ANYBLOB="000001ff"]) 14:20:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) [ 181.018171][T11186] bond66: (slave batadv87): Enslaving as an active interface with an up link [ 181.052203][T11203] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 181.073978][T11203] device bond67 entered promiscuous mode 14:20:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) write$cgroup_type(r0, 0x0, 0x0) 14:20:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 14:20:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x113}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'hsr0\x00', 0x400}) 14:20:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4002}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x7, [@local, @broadcast, @dev, @local, @remote, @multicast, @local]}) [ 181.137210][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 181.137224][ T25] audit: type=1400 audit(1656080408.110:326): avc: denied { write } for pid=11201 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 14:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x0, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x4003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30c) 14:20:08 executing program 0: select(0x40, &(0x7f0000000100), &(0x7f0000000280)={0x7}, 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, 0x0, 0x0) [ 181.188120][T11214] 8021q: adding VLAN 0 to HW filter on device batadv88 [ 181.190380][T11214] bond67: (slave batadv88): making interface the new active one [ 181.190420][T11214] device batadv88 entered promiscuous mode 14:20:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={0x10}, 0x10) 14:20:08 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x0) rename(&(0x7f0000000000)='./file0\x00', 0x0) [ 181.192701][T11214] bond67: (slave batadv88): Enslaving as an active interface with an up link 14:20:08 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f00000001c0)="35d3225ed32869b9c988cb1cd1253a4928fc4d2fc0975ad91fd1c48640ea3c45c758ddf8e5521b66e906564b9d47e1f268e37a37344593a226551d536f8d67b2b2f0758d80dc1a96a065f92c7098f32906cc624e466737a9dc892166def7e9ba7f665cf69c82f01f0d02e1f845a708b606536a0eda11817cc19bcf1bbf14e1cafec5b3f2ec9d0b3c852913848ec81633c9f69eaf5423c56138eabf3dd6d5919892f5473072bb66a934d7920962842c48f8e0d2456f7817a012155b9217c7cec877b06256865132437fadbd78df65e2d18d339d3752e737a55c6cb0f9890fe6804ce3a15c635102034f7f50dbd5206f7842f4c1d6a8918d55e07682e183e7a80ca5a33fda82f3c3d7e579948ff07f0540b00f3e8e248a0c372531aa0e515204230a46cb44fb4782ce055cfcf474ca52b91fc23cfd27c57a14bd08908d0d4f62bf109df0a2940ac47c77663ffbadda73a65b780aecb480639aa2b758379231fe0d9ac336153514787faedd95e4085457665102f1ac0c18544b5ae45b66d3c26b47cbc7b1f1c31a2d9b5b997f66d534d2192f8fd56875a3ea6397089911f92fb4b6da6bf6ead15b8615fa9be4870c76153dbdc6df8609f13fa2d1f576dbe5e776a3fff7d54c2751aecce8c579a25f495b64ddb620d103fb3ec80767663edce5690b3f43195d7f2d902b3eb5a108d12556d8057e98ab198289f122a7e819186e281427d73cc1229efde08f33a2989ad7acf09eadef86f39a9d46cad1dd2fc1e61980eb30952f17842b98eead902b14e1a9a17662676d48d07a7e06ce571639ec2b342d248d838a20a620fa16be4aadda340ec5ce7fcec6d6d3ad077b4dab12b53da9797ed6de141e392d236dd42a5ccc7b2609e7f3f7ad8fed97507363d5ce44991ebf2ffad6fe277f3e52b030f9adb4b4d42b46ffe53756bc54f079edeff33de6840aa41c56448f3a8bc9903509aaec58bb833db93c510805629f1c02c37ff63095a41abc7c09fa114da5b3edbc82ed9d7df66a06b05ea8ce6f68b8e139b74013592991a90d6e0e38c3f21becf507f3183301ddf36d81448ec915fef377de63bee8ce4caf0b667f2bbdc8b5b04a9d44b620f4fa1dab3a393e0ff6ebc5b95f69a023a1010475d726dd1cf38749bd95a3b7a6b48867e8174f2a87049ea71a3afb61f68517bfcbbe4ad3c9fd57a92d37a8646d29eefb3514177587977cf8413256e7dab204a901c289adb8269c0a3d2a18f6eeb8b80cfb6921555e5fcd7c257c61f0856cd42cef3e2f5ef3f44d68d8a021feb9e1fb2c219c793c3c47e23e3e481073c4721ce893effbd333bb30749bca67e342fc1590d1d7a72adc4222c7c73ba8f9f37eb952ee51ca88b43f34010a17d65c829796c6c8945e466b320119c07fee356945a75bc9ca8c432909e71fb66e895942e9fff91eb05972cfcb8b2de524bcaaf39ff8c8c5c907598965fa86ffedf3a17caeaed3b9fda622fdb23f90963114e7b618ca4645fde90627d56f8e2402bbce7ed9c2d3077115efe58459c626a2feaef6eacde6e615a87a693ca5a7794090d367751ec2d84d473bf571e670c29c5fbd8c4466b01dd312f805ba39149219de478687a28b9c9b5fcf788a04cccc244398e11e4de7237f94b9430cf0f89006260367e8d44274bfb8ad64c14b63a1c4cb552bdd6e7eb64243993653062dec197d1e3992f1eaae6ac2a9daaf08db875108105dc1d3f3a4ef10d54d4a164d2494b6ce03db72b0ff7e3f62d927a30acf4fb1f51cb1916dc5f0139d981c63fac77434c360af448d932087e034a2f7d613f4550e63e606553eaeeae43c5f0095d7d17d772d30593519cecf69f8a668be06f51e8845966b2addb30ef3c8b09ffc1383cf91de201e7ba4edcb596ee0b6a945641614f70f83cf4116a9d9e100704fcd1abb32b0d4de3b672ba47190672f1d85dcff79a1b324292958790404ab22300d065280b1866212ea571222eef07ff274fcba02e8878b1763c3797bc3ffd4c16170dcea4c6a8536fe73a91bbee2b40a338b681d887fa79f00bf9382abbc6b799a4a29397f1ad9a393ceb8ca30b34b4860420057d03e3cf2ac37187bcf76b946069f47f6c815cdce5dc6446f341ac63cc986853c3bd80762ee2fdd3256268f7cabf14e6ad617deb2093e2d50e57b5aa143d7e8f8357c97d87d8ef3bb9c641792a17ad7980b7876d72ce6d8c7275f27c8d080cb70f6e7834886e45683a92da772d5dd52a020dc5d34be3cfa7926c9ca5f7b01b839d7867ce8453031f46255006d17cfbd58fef609a27f9b8879a56d2d55748ac4aed1a89ca3046e852dd78aee2f0b797d7c284f87dd26cf7b76b6433bb86222ee09987ccda70fd35d3af75e7fa3f530ca38dcaa5a938978b25e001cc6fa63601ed3d51a506c4ba6ed1258638a2d4bc45fcf92a64180ec48fa89f4912c2d15fa07b67ee5caf677a6c6bd8569c8de623e8a86df72cad88e0b079006d442866b4a38291416fdf14df17f887b24135742f089ec240f1a7c22a7dc42f3a28a314177477a48459695f54dd764a3eba946bac0f6218b276746434037ce6aa4409ee3a98b3459de6c1bc73dbb25113dac4c5c864fcf4c699783c7c64630ab4d3777c287d36e52b1492224d2d9929689c392d3afc519e81c130f09cd116697592c13616cde213e044c47506a80c5d9a5020427f101f1df2bdeb671d4d87ed43f48f4252902c3129379659135c34327563f4f3c32b4cc29b7f77295db2ccc1aae07c5080b45c2475f7a9ca93352945f706c94141e93cfa8b355b897ef187d7a88810f094a3d0183b6d06bd8654dff3416c23a34687bb93ce0f7b54d89c8b5ae045c3ddb1c40730e6b8a2d9c0887ca90da95a4f6473585939a4cfb64f70d3d6b2f2e46e3ab0d116bccaf1b3cb52a87fe5f1b257b6bb0c69421e82a63ad180817ef340989bb17c760c71a137e5bbc074524eb463e2b9f544a26adc9e10cacef40d87975d2e1c28aa753cb86b2a4f99c563ac9e26810f2a986306452605123be0ef02b0769bba8fb9580f4919efd88adcbaeeccd8e3904e99ab5dc782d2831a724006dd284f362f8d96273649ac85782ab7bb21ed178ca229f6fc738a18bafea0cf1b5bb50f46b8b52a69f3da3c6d08f221a1b1e94c56443b85101f93832acf7018cc5e01ed9cd657844565a261c1df00868b88c8887c665500b94f73b54dc044270cf255d227113350a870788aac3c0132ea8526da6541c1e69fe14a64f6787e756d5f904151b0a9fe40698a2510a65a1f55c7a0a427aa0b8ad4c9b64373e1e192b8c312083212eac5e185fd02a6a9d72e0ce96481341f73a2aa0a91f85ecc2db88aa56917654b46a4717fbbb619427135330bc665bcde79ac2d0ee2e8ee7ed3ee16c0a59b08a3bee1dc559a038b5c7aab737e5c760dd3422fdc637d1d5cbf3520b4dd077196d5dc807d1a3b6e84e43e5d04dca58d3c2ae6171e53a2be0f803cfe3f274a6a4e71cd3e892ec0b7a1e4573d083896b160e54a766b6a80ab42d67e94f2e7d8b73e7a24804985163b8f7859d0491edd120cbac9056fac82eff9af130515dddb68a4ad9f9ca70262cfe97035a82bf0b5811ef9bcb2d7c1ce2b577de6e1af3b05db2689c7c9805a747f8e3c6f853ebe91897e4c3bef59c9e88bbcf85ee220566c44843fe5689182501b1367334dc66c0999b3c5d0ea31465e899df19a2cf1ea9b289864f62c5573db1a6507c9c712ca19ec6fbe84eb7437bf3c89e005742991367746d38b349dd0ca45916e64c5a06e8750a771e5cd7472806b840cdb6dec0c0a0df273dfc3d1045938ddd10183e528cfb166eb88376d1b2af62d88e1c5f461fab1b5e6a022df897de247d4f3e98c65b84984e6e4c383bf23e2e392c369ed7ed441311a4d49cf754a59362f816d61cbdb68f5d8258247dc67a955f1c860ad616e03419a40e03bb94908681466de26f2e5680adea49c10311b2dce8a3f4103e1000c39c42416a6b1fe3b24599f98a398776c2f621ed7d913ddaf3efe553be330ac2e5fc5d081550c3baa6acd7eda6af8dee8bae9409eb815379ddb679e30301c3e30aaf726796aa9c10ac59f3474a218c4f07a6a4b960d9fd8c182e37d3716a30b6bad09bcc5550e6cdfd2e40f5b4bca456e21426e600e54143e2773011d88b266b9738237d753718537156b3ae847509d4e2d662689de630cb7f4fb898c394e30250cad9ff9b718c13448aece14c1bac7b7802f92cd31c2626c611bb30aaa3200c0fd33d8b1291db2af4f6e3e46d849e4d224733a19bd4c92a7187b50463a694d624ed258929c833afc8d845ecd3d42feaa3e37b15f43de675888a5129605716d33d9d80d3dbad0e8cd1215c737799a9260e1844a8f81376d311192ee82707c4fb5e643e2586cff5f6d2798de9e4ab052b8e918cb303dd7fc25597dc294b8365183864a85f7a12ae5211e010fba20f59d4d2a57aa0e4b38c52878ac70e3afb7f3eb8a4223dbf0821f670df268abe5b82c89b7d8f9168f3d8a29c831c62fa1b81ed9ae16baffe26e6f37a56ac0c789925c2a7f546c691da1fb1328bf882cd2e28925b323827bfda98d61bfbec29c56433aafe38199143176555b244e22e7b608320e8b1b64209e0c07f3dac5d163792192a832d3015d33b97946bc2acc2a52e257d75604471b1e1675607829ff356efa2aa45dc709c5adc77968857f4a433f2804a480de5a90d8c1c0bf2d7c8eaefbbdcaf22ace9b80ecdec3dc5fe57fb4b65debc37b2ede0a04cb90a3609300505e5bd5458e0bd63a34d4a8a55eeff98c0fa8c394432a0906e976d06449b05be987adae6c523ad69628cc48a3bb4d5203ab20f1d7115e7e50b03973f9720845247c2714135d992a0cefce314e65532e4bec91e68c4f886a4e12cad7e4e7471c31288090c9c2eea573052a0c3a9f339b00e3b7c2f711a5ddc712eeacc0a25d343a4597d2f3800eb9901bd67b00552cf5d94f51bed7b9a056ee129e46284f23a96eb20b666350e97b7274b23a3f76dbd36a15efeb062a6aba54ceb8e09ea1e713137ae030854d7c8e157e1ace6a6c01b62883af2f3751edc0c0de7efbc20743941bfdf6df84d4139b9c534b3e21cae08728e0fc8eb825f37fb4aeaf8e034a9e2c580e9b200046b5388b469772b91eb0e93ab99bbe2417d69e62bd7fd12639adbd26cefe42f1cbf4895ce550df69096c46516af4d188346f68916711896ac97284dbae3d81d35b5bddff881d7a858c609ac590cbdcfa673ff1970c4f3b58e733f1690c3f4acfa51ac898161ef02162a9dbc4778a14171448e6569dfa4b1a4b9efdbbf68104fd5ebba418ffd817257d2330d3e239836d45b3daaa122b3d7902cdd8eb816beb66b0a2c6e61bacb80e6a15535b16c0d5047a0be96de0e3e9ef9a37935cfc720a5a6a86c3d806c9cc194e3a13e5f5f415e3a8dff87bbf0b8c7e292eae0c6bbe4f12c8eaf1f23733da20002a2b4a1430056aa0484439985b4f08f7ac43f05a7394b19b3740a37e17f63a3e06b88f3a667286048dc056a1bc07fad30de64834e4301beb21ac4c3a36d8569583e0ec5ed3a2d3c02685522ea6000cd5880b421f25e6fc46dff045603afde94039373b298a010d023955e2cb28b0db289cb0e91176115af63d7a266ba4f48a48d0bff111cfc38de9be11a21ef67349e1ce93636215f67651eadf0f12e69e06679da298ece858164bdd0c644263c1993db247bd0af65cd0f66fb0ca784369a2dc2109b57d77f83aff2ae0d9a0f3819f5576468bdba78aa7f32f7efe9", 0xff1, 0x0, &(0x7f0000000100)={0x1c}, 0x1c) 14:20:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x100}, 0x98) 14:20:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x6, 0x4) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=""/94, 0x5e}, 0x1) 14:20:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x18, 0x3, &(0x7f0000001380)=@framed, &(0x7f00000013c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 181.293944][T11226] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 181.314221][T11226] device bond68 entered promiscuous mode 14:20:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'net_prio'}]}, 0xa) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 14:20:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x18, 0x3, &(0x7f0000001380)=@framed, &(0x7f00000013c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001500), 0x8, 0x10, 0x0}, 0x80) 14:20:08 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 181.381224][T11226] 8021q: adding VLAN 0 to HW filter on device batadv89 [ 181.418307][T11226] bond68: (slave batadv89): making interface the new active one 14:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}, @ldst={0x1, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xffa, &(0x7f0000000100)=""/4090, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 14:20:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYRES8], 0xfd45) 14:20:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x30, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0xfffffffffffffeff}, 0x4a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0xfffffffffffffeff}, 0x4a0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:20:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x18, 0x3, &(0x7f0000001380)=@framed, &(0x7f00000013c0)='syzkaller\x00', 0x8, 0xeb, &(0x7f0000001400)=""/235, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x18, 0x3, &(0x7f0000001380)=@framed, &(0x7f00000013c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001500), 0x8, 0x10, 0x0}, 0x80) 14:20:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}, @ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x1800}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xffa, &(0x7f0000000100)=""/4090, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001940)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:20:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}, @ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x1800}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xffa, &(0x7f0000000100)=""/4090, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 14:20:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}, @ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x1800}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xffa, &(0x7f0000000100)=""/4090, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 181.418326][T11226] device batadv89 entered promiscuous mode [ 181.421119][T11226] bond68: (slave batadv89): Enslaving as an active interface with an up link 14:20:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x408, 0x1, 0x1, "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"}], 0x408}, 0x0) 14:20:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x17, 0x0, 0xea92, 0x1f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 14:20:08 executing program 1: syz_clone(0x40000080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)="94b89a20a4cc8b3f93c493fe746733b747134d9c263fac0aee6f14f690069ab517ed41a74c73b4508ee657f19f7ccf80b42b1178d8d3d333b8ce94e8e383c03c25c0ccbd9939433390fe5cbd1e2cf607da95128fca439304c00202534b30b346c49c659018bae30ac829916d5a7cb5") [ 181.518178][T11264] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:08 executing program 0: bpf$OBJ_GET_PROG(0x16, &(0x7f0000000040)={0x0, 0x0, 0x18}, 0x10) 14:20:08 executing program 3: getpid() syz_open_procfs$namespace(0x0, 0x0) gettid() syz_clone(0x40000080, &(0x7f0000000040)="d5", 0x1, 0x0, 0x0, &(0x7f00000001c0)) 14:20:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={0x0, &(0x7f0000000340)=""/221, 0x0, 0xdd}, 0x20) 14:20:08 executing program 4: syz_clone(0x40000080, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 14:20:08 executing program 0: socketpair(0x28, 0x0, 0xa, &(0x7f0000000000)) [ 181.538323][T11264] device bond69 entered promiscuous mode [ 181.602123][T11264] 8021q: adding VLAN 0 to HW filter on device batadv90 [ 181.603755][T11264] bond69: (slave batadv90): making interface the new active one 14:20:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) unlink(0x0) socketpair(0x9, 0x1, 0xf8, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) 14:20:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0x3}]}}, &(0x7f0000000340)=""/221, 0x26, 0xdd, 0x1}, 0x20) 14:20:08 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') unlink(&(0x7f0000000140)='./file0\x00') 14:20:08 executing program 0: syz_clone(0x40000080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)="94b89a20a4cc8b3f93c493fe746733b747134d9c263fac0aee6f14f690069ab517ed41a74c73b4508ee657f19f7ccf80b42b1178d8d3d333b8ce94e8e383c03c25c0ccbd9939433390fe5c") 14:20:08 executing program 2: bpf$OBJ_GET_PROG(0x2, 0x0, 0x700) 14:20:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@jmp]}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 181.603771][T11264] device batadv90 entered promiscuous mode [ 181.605464][T11264] bond69: (slave batadv90): Enslaving as an active interface with an up link [ 181.727090][T11287] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 181.736759][T11287] device bond70 entered promiscuous mode 14:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:08 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xe12, 0x10, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f0000000000)) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x40000000, 0xffffffffffffffff, 0x1) r2 = perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x80, 0x8, 0x0, 0xa, 0x8, 0x0, 0x9, 0x18403, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x353b, 0x0, @perf_bp={&(0x7f0000000280)}, 0x48e0, 0x3ff, 0x9, 0x4, 0xfff, 0x4, 0x100, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, r0, 0x8, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3, 0x40441, 0xe, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x6}) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x2, &(0x7f0000000280)=ANY=[], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)}, 0x80) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x5, 0xd6, 0x6, 0xf0, 0x0, 0x2, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x6, @perf_config_ext={0x1, 0x5}, 0x2004, 0x7ae, 0x3, 0x6, 0x200, 0x4, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, 0x0, 0x5, r0, 0x8) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x80, 0xfa, 0x20, 0x5, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x10000}, 0x218, 0x3, 0x2, 0x8, 0x10000, 0x3, 0x2, 0x0, 0x401, 0x0, 0x9}, 0x0, 0x6, r1, 0x1) 14:20:08 executing program 1: getpid() getpid() gettid() syz_clone(0x40000080, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs$namespace(0x0, 0x0) 14:20:08 executing program 3: syz_clone(0x24003000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)="ea") [ 181.784486][T11287] 8021q: adding VLAN 0 to HW filter on device batadv91 [ 181.786109][T11287] bond70: (slave batadv91): making interface the new active one [ 181.786126][T11287] device batadv91 entered promiscuous mode [ 181.787874][T11287] bond70: (slave batadv91): Enslaving as an active interface with an up link [ 181.873804][T11312] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 181.891501][T11312] device bond71 entered promiscuous mode 14:20:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x22) 14:20:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x1}) 14:20:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8000000000000008, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x27000) close(r2) openat$cgroup_ro(r1, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) 14:20:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x17, 0x0, 0xea92, 0x1f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 14:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) [ 181.926082][T11312] 8021q: adding VLAN 0 to HW filter on device batadv92 [ 181.928030][T11312] bond71: (slave batadv92): making interface the new active one 14:20:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:20:09 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x266080, 0x0) 14:20:09 executing program 1: getpid() syz_clone(0x40000080, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() [ 181.928047][T11312] device batadv92 entered promiscuous mode [ 181.943397][T11312] bond71: (slave batadv92): Enslaving as an active interface with an up link [ 181.978374][T11326] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 182.005293][T11326] device bond72 entered promiscuous mode 14:20:09 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4}]}, &(0x7f0000001380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:09 executing program 0: socketpair(0xa, 0x3, 0x3a, &(0x7f0000002e40)) 14:20:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x1}]}]}}, &(0x7f0000000380)=""/216, 0x3e, 0xd8, 0x1}, 0x20) 14:20:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0xc, 0x2, [@const]}}, &(0x7f0000000340)=""/221, 0x26, 0xdd, 0x1}, 0x20) [ 182.083080][T11326] 8021q: adding VLAN 0 to HW filter on device batadv93 [ 182.107484][T11326] bond72: (slave batadv93): making interface the new active one [ 182.107502][T11326] device batadv93 entered promiscuous mode [ 182.122481][T11326] bond72: (slave batadv93): Enslaving as an active interface with an up link 14:20:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x5f, 0x61]}}, &(0x7f0000000240)=""/225, 0x2a, 0xe1, 0x1}, 0x20) 14:20:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = perf_event_open(0x0, 0x0, 0x8000000000000008, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x904, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x20, 0x5, 0x66604cdb, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x1}, 0x0, 0x2, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) 14:20:09 executing program 2: syz_clone(0x54002000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000000c0)="c3c2f5bdcc0271a5f387e6237e6f8130d37167dfb527d6f10d43c294f8f91f9781a6997001c26c89251ad428db67c92c2c4e86953621461d96d4051f5317a91a00154490e893b51cd8aae54e61f2f3e10de1ad978b59e8f0398824c227f76a2fd42e35953be1ffcafa32272f03563fe81cf0bd30c32784d5f5c29270bbbce99d7eefff41643222c23795ee25d28886696eb17ac6f20914aefa97f53099355d36da15648a831368d37981716837085a18bb25ad4b1da143a5db", 0xb9}, {&(0x7f0000000180)="674e43c4c99a37f9b6aa65ac1a6ab29d7445ff1592dee63c3ff4db7213c299d77fc0beae4d890cd7f9f087e74b72d2ec62d8fd57eb437f2b4b2925b2597ec2faa52d71d493338b560547cfd30e804ecaee86aec198f699da876f81099482ee024bcafe296fedc7cb2d745f1296f69b8ba9a245161cbf6e7931babfc2706ee2c6fc3284", 0x83}, {&(0x7f0000000240)="cece52a5566af27550993df6e049b1300eeef72b7dced16d0ff6ea143b2d0e178d", 0x21}, {0x0}, {&(0x7f0000000440)="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", 0xd64}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:20:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x3c7, 0x0, 0x3f, 0x0, 0x1}, 0x48) 14:20:09 executing program 1: syz_clone(0xc18e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:09 executing program 3: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9058, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8913, &(0x7f0000000080)) 14:20:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x904, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x20, 0x5, 0x66604cdb, 0x0, 0x7fffffffffffffff, 0x9, 0x9, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) [ 182.832280][T11357] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 182.866555][T11357] device bond73 entered promiscuous mode 14:20:09 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000000)=""/225, 0xe1}, {&(0x7f0000000100)=""/10, 0xa}, {&(0x7f0000000140)=""/146, 0x92}, {&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000280)=""/187, 0xbb}, {&(0x7f0000000340)=""/12, 0xc}, {&(0x7f0000000380)=""/142, 0xfffffffffffffe11}], 0x7) [ 182.950364][T11357] 8021q: adding VLAN 0 to HW filter on device batadv94 [ 182.955004][T11357] bond73: (slave batadv94): making interface the new active one 14:20:10 executing program 3: mmap(&(0x7f00009e5000/0x400000)=nil, 0x400000, 0x0, 0x1011, 0xffffffffffffffff, 0x0) 14:20:10 executing program 0: r0 = socket(0x18, 0x2, 0x0) writev(r0, &(0x7f00000003c0)=[{0x0}], 0x1) 14:20:10 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f0000000140)=[{r0, 0x4}], 0x1, 0x0) 14:20:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:10 executing program 2: r0 = socket(0x2, 0x2, 0x0) r1 = dup2(r0, r0) shutdown(r1, 0x2) 14:20:10 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 14:20:10 executing program 2: r0 = open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) poll(&(0x7f0000000080)=[{r0, 0x4}, {r0, 0x1}], 0x2, 0x0) chown(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) [ 182.955036][T11357] device batadv94 entered promiscuous mode [ 182.959290][T11357] bond73: (slave batadv94): Enslaving as an active interface with an up link 14:20:10 executing program 2: open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) r0 = geteuid() fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, 0x0, 0x0) 14:20:10 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000440)="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", 0x298706afd9f373d9) 14:20:10 executing program 2: r0 = socket$inet6(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$sock_int(r1, 0xffff, 0x1002, &(0x7f00000000c0), 0x4) [ 183.133787][T11375] device bond74 entered promiscuous mode [ 183.173745][T11375] 8021q: adding VLAN 0 to HW filter on device batadv95 [ 183.175642][T11375] bond74: (slave batadv95): making interface the new active one [ 183.175659][T11375] device batadv95 entered promiscuous mode [ 183.177635][T11375] bond74: (slave batadv95): Enslaving as an active interface with an up link 14:20:10 executing program 4: r0 = socket(0x2, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = dup2(r0, r1) getsockname$inet(r2, 0x0, &(0x7f0000000080)) 14:20:10 executing program 0: r0 = socket(0x18, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs, 0x8) 14:20:10 executing program 2: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000400)=[{&(0x7f00000002c0)='g', 0x1}], 0x1) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) dup2(r2, r1) 14:20:10 executing program 1: r0 = socket(0x2, 0x2, 0x0) read(r0, 0x0, 0x0) 14:20:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:10 executing program 3: open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) 14:20:10 executing program 1: open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 14:20:10 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0xa82, 0x0) pwritev(r0, &(0x7f0000001200)=[{&(0x7f0000000000)="fc", 0x1}], 0x1, 0x0, 0x0) r1 = dup(r0) writev(r1, &(0x7f00000004c0)=[{&(0x7f0000000140)="cf332c40e92eb3332a24947da4e4604931b4c5df2f6fbee310963e78abf16d8fcd927453d1895e2e63a5b3c5bd861eceb9e66a844513c6d1b85c8482cec6bbbe46a6b594359861347ad15ae447b889826e58543bbd42e5e60386b1e0fb9f267070c7bae8ab8fd08f881fc34e0ff2f2b9a5cee4590765931ed98fb615dc6cb72236af297a6adf26af029c988ae236409f62d8cb4cff9eac5808a8f9e1b376529986ab3cf616c89ff80d3db0b326b72b8cb3d6993a30970347b4fd16ebca361b1e0a2e50d9cfcb1d535755cde054323cfc7d5693b32148c941712fe0f695831e", 0xdf}, {&(0x7f0000000240)="e39223fc4cd32eb83dd2357e049f63677834e821193ab23f5d8431d52b1f9961b16c1cec0832702dd89da480eb8de03ea13eac2e0e5258816340e1669218428029c7478f6bf9fcc5d1dd239a29af626f31f4349c176ddeec59bf3afe268dd989fb5cf6baf041be3df750bbbae682edc2744d6700a6ffe51833c8663e2744908670925b520ce59d29d62f6b40fba306661e6cbfea2ccfd63be418bf9d6f64e30c1a623dbae94e6612a80fffeb0074d70d6b9679f12835fe9ce68311b699270e0881b25772d611df68a711c1ea5f182b28386156cbbdc3fc01a58198d65c1e72c68e5c7eec9ca4800da1204ea4", 0xec}, {&(0x7f0000000340)="861b404a756bef1c2e5208781ae06457a0bd3e6dc70146d3151c287bbfaf5fb6fc7a7ac821f08652e4510e238cf2d03b48c5a44185a62fef3c0d4bffc5fa4dd759c34a410f60af88c4df85ba37999387d8a807523490815f05685b43afc71d2982fd684b86ec998cc1d939a7229f01855fc707977b", 0x75}, {&(0x7f0000001240)="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", 0x5c1}], 0x4) 14:20:10 executing program 0: open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) r0 = geteuid() chown(&(0x7f0000000000)='./file0\x00', r0, 0x0) 14:20:10 executing program 2: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0xffffffffffff8001}, 0x10) 14:20:10 executing program 3: r0 = open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) lseek(r0, 0x0, 0x2) poll(&(0x7f0000000080)=[{r0, 0x1}], 0x1, 0x0) 14:20:10 executing program 0: r0 = open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) readv(r0, &(0x7f0000000f00)=[{0x0}], 0x1) [ 183.338665][T11400] device bond75 entered promiscuous mode 14:20:10 executing program 4: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000000), 0x4) 14:20:10 executing program 2: r0 = socket(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 14:20:10 executing program 3: pipe(&(0x7f00000005c0)={0xffffffffffffffff}) fcntl$lock(r0, 0x1, 0x0) 14:20:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x4011}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000005c0)) 14:20:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:10 executing program 2: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) poll(&(0x7f0000000080)=[{r2, 0x84}], 0x1, 0x0) 14:20:10 executing program 0: fchmodat(0xffffffffffffffff, 0x0, 0xc38727983724ccd6) 14:20:10 executing program 3: open(&(0x7f0000000b40)='./file0\x00', 0x200, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 14:20:10 executing program 2: r0 = socket(0x18, 0x1, 0x0) poll(&(0x7f0000000140)=[{r0, 0x4}], 0x1, 0x0) 14:20:10 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x200, 0x4afe013dc63786b6) [ 183.443402][T11400] 8021q: adding VLAN 0 to HW filter on device batadv96 [ 183.445044][T11400] bond75: (slave batadv96): making interface the new active one 14:20:10 executing program 0: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x10000000) 14:20:10 executing program 3: unlinkat(0xffffffffffffff9c, &(0x7f00000507c0)='./file0\x00', 0x0) 14:20:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000001680), 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 14:20:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x6, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x804, 0x0, "4efd100000ab00000049a21f00000000000000089f0000e86a20b4f1ff001600"}) 14:20:10 executing program 4: syz_open_dev$evdev(&(0x7f0000001680), 0x0, 0x2c0400) 14:20:10 executing program 2: ptrace(0x20, 0x0) [ 183.445061][T11400] device batadv96 entered promiscuous mode [ 183.446830][T11400] bond75: (slave batadv96): Enslaving as an active interface with an up link [ 183.523044][T11431] device bond76 entered promiscuous mode 14:20:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:10 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f0000c2b000/0x2000)=nil, &(0x7f0000e10000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x28d, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, 0x0, 0x0) 14:20:10 executing program 0: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000e74000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x1032, 0xffffffffffffffff, 0x10000000) 14:20:10 executing program 1: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000a2b000/0x3000)=nil, 0x3000, 0x0, 0x100010, r1, 0x10000000) 14:20:10 executing program 2: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x0, 0x0, &(0x7f00008f3000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 14:20:10 executing program 4: syz_io_uring_setup(0x6e36, &(0x7f0000000080), &(0x7f0000cc5000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 183.612080][T11446] 8021q: adding VLAN 0 to HW filter on device batadv97 [ 183.613926][T11446] bond76: (slave batadv97): making interface the new active one [ 183.613942][T11446] device batadv97 entered promiscuous mode 14:20:10 executing program 3: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000e74000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000080)) syz_io_uring_setup(0x4a46, &(0x7f0000000240), &(0x7f0000aff000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 14:20:10 executing program 1: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000006, 0x12, r0, 0x0) 14:20:10 executing program 0: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000e74000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x1032, 0xffffffffffffffff, 0x10000000) [ 183.616077][T11446] bond76: (slave batadv97): Enslaving as an active interface with an up link 14:20:10 executing program 2: syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x307, &(0x7f0000000180), &(0x7f0000ca6000/0x2000)=nil, &(0x7f0000e0e000/0x3000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_setup(0x7e89, &(0x7f0000000280)={0x0, 0xc569}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ad5000/0x3000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 14:20:10 executing program 4: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000e74000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7, 0x12, r0, 0x0) 14:20:10 executing program 0: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) syz_io_uring_setup(0x4bf5, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 183.720444][T11462] device bond77 entered promiscuous mode 14:20:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0xffffff1f}, 0x0) 14:20:10 executing program 1: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000e74000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f000093e000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 14:20:10 executing program 4: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f00007fe000/0x800000)=nil, 0x1ffff000, 0x0, 0x12, r0, 0x0) 14:20:10 executing program 2: syz_io_uring_setup(0x4e81, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x4c9d, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000240)) 14:20:10 executing program 0: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f00007fe000/0x800000)=nil, 0xffffe000, 0x0, 0x10, r0, 0x0) 14:20:10 executing program 3: syz_io_uring_setup(0x39e8, &(0x7f00000000c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ac4000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000080), &(0x7f0000000140)) 14:20:10 executing program 1: syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ca6000/0x2000)=nil, &(0x7f0000e0e000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x7e89, &(0x7f0000000280)={0x0, 0xc569}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ad5000/0x3000)=nil, &(0x7f0000000300), &(0x7f0000000340)) [ 183.813327][T11476] 8021q: adding VLAN 0 to HW filter on device batadv98 [ 183.824586][T11476] bond77: (slave batadv98): making interface the new active one [ 183.824603][T11476] device batadv98 entered promiscuous mode 14:20:10 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x33fe0}}, 0x0) 14:20:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004080), 0x0, 0x80c0) 14:20:10 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40480a4, 0x0, 0x0) [ 183.826393][T11476] bond77: (slave batadv98): Enslaving as an active interface with an up link 14:20:10 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x240008c0, 0x0, 0x0) [ 183.941107][T11491] device bond78 entered promiscuous mode 14:20:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:11 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, 0x0, 0x14) 14:20:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000700), 0x0) 14:20:11 executing program 3: r0 = syz_io_uring_setup(0x1e4c, &(0x7f0000000000), &(0x7f0000b32000/0x1000)=nil, &(0x7f0000aff000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000006, 0x12, r0, 0x0) syz_io_uring_setup(0x6e36, &(0x7f0000000080), &(0x7f0000cc5000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 14:20:11 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8010, 0x0, 0x3a) 14:20:11 executing program 2: r0 = socket(0x1, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) [ 183.999967][T11491] 8021q: adding VLAN 0 to HW filter on device batadv99 [ 184.001956][T11491] bond78: (slave batadv99): making interface the new active one [ 184.001973][T11491] device batadv99 entered promiscuous mode 14:20:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 14:20:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e22, 0x0, @private0}, 0x1c, 0x0}, 0x0) 14:20:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 14:20:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000240)="fa083a1c512705fbf9392a2237717ca8db3ac83a7405339f08bc88297f3bea44092fd3f3e07fe7d7fe2ec87bea5e40c5fc3c735ae23a7c0a236562416697ba9a7b544f058e6d05299a560a4e1eae40c017d2ffd168bcf61eeffd36ab24c58944467ab5a5f5c30d5165efa3a0c7ed779d8cf5c8ad061ac32b04017d7f3a8d63f872f81469ef3f8c2af32372e0693c043708", 0x91, 0x0, 0x0, 0x0) 14:20:11 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001e00), 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, 0x0, 0x0) [ 184.003729][T11491] bond78: (slave batadv99): Enslaving as an active interface with an up link [ 184.118958][T11512] device bond79 entered promiscuous mode 14:20:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter, 0x48) 14:20:11 executing program 1: getsockopt$MRT(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)) getresuid(&(0x7f0000002480), &(0x7f00000024c0), &(0x7f0000002500)) 14:20:11 executing program 2: setrlimit(0x0, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) 14:20:11 executing program 4: select(0x40, &(0x7f0000000100), 0x0, 0x0, 0x0) 14:20:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000000c0)={'wg2\x00'}) 14:20:11 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0xffffffff, 0x8) [ 184.170181][T11512] 8021q: adding VLAN 0 to HW filter on device batadv100 [ 184.172186][T11512] bond79: (slave batadv100): making interface the new active one [ 184.172201][T11512] device batadv100 entered promiscuous mode 14:20:11 executing program 0: seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000100)) 14:20:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x9}]}) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) 14:20:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf}, 0x48) 14:20:11 executing program 3: pselect6(0x40, &(0x7f0000000040)={0x5}, 0x0, 0x0, &(0x7f0000000300), 0x0) 14:20:11 executing program 0: futex(&(0x7f0000000100), 0xd, 0x0, 0x0, 0x0, 0x0) [ 184.174255][T11512] bond79: (slave batadv100): Enslaving as an active interface with an up link [ 184.277506][ T25] audit: type=1400 audit(1656080411.250:327): avc: denied { setopt } for pid=11547 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 184.317601][T11544] device bond80 entered promiscuous mode [ 184.370489][T11544] 8021q: adding VLAN 0 to HW filter on device batadv101 14:20:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:11 executing program 2: setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000000)={@multicast2, @private, 0x0, "9c4af6d197a94849c65dd06e39d936b32c2742798477a395d4f7eba60da4f44f"}, 0x3c) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) 14:20:11 executing program 0: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) 14:20:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) [ 184.372668][T11544] bond80: (slave batadv101): making interface the new active one [ 184.372684][T11544] device batadv101 entered promiscuous mode [ 184.374544][T11544] bond80: (slave batadv101): Enslaving as an active interface with an up link [ 184.453823][T11560] device bond81 entered promiscuous mode [ 184.463581][T11560] 8021q: adding VLAN 0 to HW filter on device batadv102 [ 184.465116][T11560] bond81: (slave batadv102): making interface the new active one [ 184.465170][T11560] device batadv102 entered promiscuous mode [ 184.467269][T11560] bond81: (slave batadv102): Enslaving as an active interface with an up link 14:20:12 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000980), 0xffffffffffffffff) 14:20:12 executing program 3: clock_settime(0x0, &(0x7f0000000740)={0x0, 0x989680}) 14:20:12 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0xbc4, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105500, &(0x7f0000000040)=@usbdevfs_connect={0xa1, 0x5517, 0x48000000}) 14:20:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 14:20:12 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) 14:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:12 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000980), 0xffffffffffffffff) 14:20:12 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000001e00), 0x40403, 0x0) 14:20:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x18}, 0x18}}, 0x0) [ 185.049814][ T25] audit: type=1400 audit(1656080412.030:328): avc: denied { write } for pid=11565 comm="syz-executor.2" name="001" dev="devtmpfs" ino=125 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 14:20:12 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0, r0) 14:20:12 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 14:20:12 executing program 4: getresuid(0x0, 0x0, 0x0) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) [ 185.055633][T11564] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11564 comm=syz-executor.0 [ 185.093396][T11569] device bond82 entered promiscuous mode [ 185.094010][T11567] usb usb2: usbfs: process 11567 (syz-executor.2) did not claim interface 23 before use 14:20:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @dev}}}}) 14:20:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) [ 185.100727][ T25] audit: type=1400 audit(1656080412.078:329): avc: denied { append } for pid=11577 comm="syz-executor.0" name="vsock" dev="devtmpfs" ino=231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 185.100938][ T25] audit: type=1400 audit(1656080412.078:330): avc: denied { ioctl } for pid=11577 comm="syz-executor.0" path="/dev/vsock" dev="devtmpfs" ino=231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 185.169873][T11569] 8021q: adding VLAN 0 to HW filter on device batadv103 [ 185.181064][T11569] bond82: (slave batadv103): making interface the new active one [ 185.181122][T11569] device batadv103 entered promiscuous mode 14:20:12 executing program 2: socket(0x2, 0x0, 0x1000) 14:20:12 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0xe181, 0x0) 14:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:12 executing program 1: futex(&(0x7f0000000100), 0xd, 0x0, &(0x7f0000000140)={0x77359400}, 0x0, 0x0) 14:20:12 executing program 3: select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x5f}, 0x0) 14:20:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001200), 0xffffffffffffffff) [ 185.205425][T11569] bond82: (slave batadv103): Enslaving as an active interface with an up link 14:20:12 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x20, r0, 0x201, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 14:20:12 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000001e00), 0x474001, 0x0) 14:20:12 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000080)) 14:20:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e7e1fc40a6de4c28a2c3627f6ec42b47010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000280004daf4655fddf4655fddf4655f004000000000040040", 0x1d, 0x2100}, {&(0x7f0000000140)='\b', 0x1, 0x2180}, {0x0, 0x0, 0x800010000}], 0x0, &(0x7f00000003c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) 14:20:12 executing program 3: futex(&(0x7f0000000100)=0x2, 0xd, 0x0, 0x0, 0x0, 0x0) 14:20:12 executing program 0: add_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)="ed", 0x1, 0xfffffffffffffffe) [ 185.276883][T11603] validate_nla: 9 callbacks suppressed [ 185.276898][T11603] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x1, &(0x7f00000000c0)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c}, 0x1c}}, 0x0) [ 185.334487][T11603] device bond83 entered promiscuous mode [ 185.382246][T11603] 8021q: adding VLAN 0 to HW filter on device batadv104 [ 185.397539][T11603] bond83: (slave batadv104): making interface the new active one [ 185.397558][T11603] device batadv104 entered promiscuous mode [ 185.406465][T11622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11622 comm=syz-executor.0 14:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 14:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@GTPA_TID={0xc}, @GTPA_VERSION={0x8}]}, 0x28}}, 0x0) 14:20:12 executing program 1: bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) 14:20:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000002280)={0x1c, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 14:20:12 executing program 0: syz_emit_ethernet(0x9e, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "770de6", 0x68, 0x21, 0x0, @private0, @rand_addr=' \x01\x00', {[@srh={0x0, 0x4, 0x4, 0x2, 0x6, 0x0, 0x0, [@loopback, @rand_addr=' \x01\x00']}, @hopopts={0x0, 0x0, '\x00', [@jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private1]}], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "94bd08", 0x0, "985ae9"}, "87132a335ae0411a"}}}}}}, 0x0) 14:20:12 executing program 4: syz_open_procfs(0x0, &(0x7f00000003c0)='comm\x00') [ 185.413069][T11603] bond83: (slave batadv104): Enslaving as an active interface with an up link 14:20:12 executing program 3: clock_adjtime(0x3, &(0x7f0000000200)) 14:20:12 executing program 2: bpf$LINK_GET_NEXT_ID(0x9, &(0x7f0000000000)={0x80000001}, 0x8) 14:20:12 executing program 1: bpf$LINK_GET_NEXT_ID(0x2, &(0x7f0000000000)={0x80000001}, 0x8) 14:20:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/keycreate\x00') write$tun(r0, &(0x7f0000000080)={@void, @void, @eth={@broadcast, @dev, @val, {@mpls_mc}}}, 0x16) 14:20:12 executing program 4: r0 = timerfd_create(0x8, 0x0) timerfd_gettime(r0, &(0x7f0000000440)) [ 185.508048][T11637] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 185.537268][T11637] device bond84 entered promiscuous mode 14:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:12 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x8c0, 0x0, 0x7}, 0x18) 14:20:12 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='setgroups\x00') 14:20:12 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='oom_score_adj\x00') syz_open_procfs(0x0, &(0x7f0000000440)='fd/3\x00') 14:20:12 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5413, 0x1ffff000) 14:20:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffe}, 0x0) 14:20:12 executing program 2: setpriority(0x0, 0xa6, 0x0) 14:20:12 executing program 0: memfd_create(&(0x7f0000000200)='source_mac_is_multicast\x00', 0x0) [ 185.578644][T11637] 8021q: adding VLAN 0 to HW filter on device batadv105 [ 185.582973][T11637] bond84: (slave batadv105): making interface the new active one 14:20:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x18}, 0x48) 14:20:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter, 0x48) 14:20:12 executing program 3: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x804, 0x0) 14:20:12 executing program 0: socket(0x0, 0x8080b, 0x0) [ 185.582992][T11637] device batadv105 entered promiscuous mode [ 185.585122][T11637] bond84: (slave batadv105): Enslaving as an active interface with an up link 14:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:12 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='environ\x00') 14:20:12 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000003740)=[{{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000c00)='G', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 14:20:12 executing program 0: bpf$MAP_CREATE(0x15, &(0x7f0000000540), 0x48) 14:20:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tun(r0, 0x0, 0x0) 14:20:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x20d}, 0x14}}, 0x0) 14:20:12 executing program 0: memfd_create(&(0x7f0000000000)='net/llc/core\x00', 0x7) 14:20:12 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000200)={@dev, @broadcast, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2c, 0x0, @rand_addr, @remote, {[@noop]}}}}}}, 0x0) [ 185.703484][T11671] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 185.719368][T11671] device bond85 entered promiscuous mode [ 185.733142][T11671] 8021q: adding VLAN 0 to HW filter on device batadv106 [ 185.734782][T11671] bond85: (slave batadv106): making interface the new active one 14:20:12 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='uid_map\x00') 14:20:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000001580)='auxv\x00') 14:20:12 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={'xcbc(seed-generic)\x00'}}) [ 185.734798][T11671] device batadv106 entered promiscuous mode 14:20:12 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="c2", 0x1}], 0x1, &(0x7f0000000280)=[{0x10}], 0x10}, 0x20008001) [ 185.736878][T11671] bond85: (slave batadv106): Enslaving as an active interface with an up link 14:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:12 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="12") sched_rr_get_interval(0x0, &(0x7f0000001100)) 14:20:12 executing program 1: clock_adjtime(0x0, &(0x7f0000000200)={0xffffffffffff7fff}) 14:20:12 executing program 0: r0 = socket(0x2, 0x5, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@mcast1}) 14:20:12 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{&(0x7f00000000c0)=@can, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 14:20:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 14:20:12 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x78c6a2688b579d56}, 0x10) 14:20:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c0f, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="020000000002000019000600600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 185.774351][T11684] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 185.812919][T11684] device bond86 entered promiscuous mode 14:20:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tun(r0, 0x0, 0xf0ffffff7f0000) 14:20:12 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 14:20:12 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000002340)='ns/time\x00') 14:20:12 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000003740)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000980)="16", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 185.870198][T11684] 8021q: adding VLAN 0 to HW filter on device batadv107 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:13 executing program 3: sysfs$1(0x1, &(0x7f0000000000)='/\x8a#@:#*%]{@\xbf-\x00') 14:20:13 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0x3, 0xfd}]}}, @address_request}}}}, 0x0) 14:20:13 executing program 4: socket$inet6(0xa, 0x2, 0x80000001) 14:20:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ee5458cb8cad7df, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 185.882216][T11684] bond86: (slave batadv107): making interface the new active one [ 185.882233][T11684] device batadv107 entered promiscuous mode 14:20:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 14:20:13 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "770de6", 0x48, 0x21, 0x0, @private0, @rand_addr=' \x01\x00', {[@srh={0x0, 0x4, 0x4, 0x2, 0x6, 0x0, 0x0, [@loopback, @rand_addr=' \x01\x00']}, @srh], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "94bd08", 0x0, "985ae9"}, "87132a335ae0411a"}}}}}}, 0x0) 14:20:13 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='numa_maps\x00') 14:20:13 executing program 4: bpf$MAP_CREATE(0xe, &(0x7f0000000540), 0x48) 14:20:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 185.909953][T11684] bond86: (slave batadv107): Enslaving as an active interface with an up link 14:20:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 14:20:13 executing program 2: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x204881, 0x20}, 0x18) [ 185.966132][T11713] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 186.020194][T11713] device bond87 entered promiscuous mode [ 186.040238][T11713] 8021q: adding VLAN 0 to HW filter on device batadv108 [ 186.042793][T11713] bond87: (slave batadv108): making interface the new active one 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000200)={@dev, @broadcast, @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @remote}}}}}, 0x0) 14:20:13 executing program 1: getgroups(0x1, &(0x7f0000000080)=[0xee01]) 14:20:13 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x601, 0x0) 14:20:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @broadcast, @val={@void, {0x8864}}, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "3ee716", 0x10, 0x21, 0x0, @mcast2, @rand_addr=' \x01\x00', {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b01710", 0x0, "41e7ed"}}}}}}}, 0x0) 14:20:13 executing program 4: memfd_create(&(0x7f0000000080)='-^t\x00', 0x3) [ 186.042810][T11713] device batadv108 entered promiscuous mode [ 186.046876][T11713] bond87: (slave batadv108): Enslaving as an active interface with an up link [ 186.130896][T11746] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 186.175658][T11746] device bond88 entered promiscuous mode [ 186.204158][T11746] 8021q: adding VLAN 0 to HW filter on device batadv109 [ 186.205988][T11746] bond88: (slave batadv109): making interface the new active one 14:20:13 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000003c0)={0x0}) select(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x6}, &(0x7f0000000380)={0x1c}, &(0x7f0000000400)={r0}) 14:20:13 executing program 0: memfd_create(&(0x7f0000000080), 0x0) 14:20:13 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000002100)) 14:20:13 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000540), 0x48) 14:20:13 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x313, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) 14:20:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000002280)={0x28, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 186.206058][T11746] device batadv109 entered promiscuous mode [ 186.207857][T11746] bond88: (slave batadv109): Enslaving as an active interface with an up link [ 186.275142][T11765] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:13 executing program 0: syz_emit_ethernet(0xaa, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa00ffffffffffff08004600009c00000000002f907800000000ac1414bbbd81e5443c"], 0x0) 14:20:13 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "770de6", 0x10, 0x21, 0x0, @private0, @rand_addr=' \x01\x00', {[], {{0x4e20, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "94bd08", 0x0, "985ae9"}}}}}}}, 0x0) 14:20:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/user\x00') 14:20:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x6, 0x0) [ 186.312944][T11765] device bond89 entered promiscuous mode [ 186.334542][T11765] 8021q: adding VLAN 0 to HW filter on device batadv110 [ 186.335047][ T25] audit: type=1400 audit(1656080413.308:331): avc: denied { connect } for pid=11772 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 14:20:13 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0x3}]}}, @address_request}}}}, 0x0) 14:20:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000100)=[{}], 0x8) 14:20:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000002280)={0x24, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) 14:20:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r1, 0x20d, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:20:13 executing program 4: openat2$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x80442, 0x0, 0x10}, 0x18) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000007c0)={0x48, 0x0, &(0x7f00000006c0)=[@register_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, &(0x7f0000000740)}) [ 186.366980][T11765] bond89: (slave batadv110): making interface the new active one 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[{0x10}], 0x10}, 0x20008001) 14:20:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x4, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)='\b', &(0x7f0000000700), 0x5, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f0000000040)=""/27, &(0x7f0000000240), &(0x7f0000000340), 0x1, r0}, 0x38) 14:20:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x0, 0x0, 0x0, 0x200}, 0x48) 14:20:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, r1, 0x1, 0x0, 0x0, {{}, {@void}}, [@NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_TDLS_PEER={0x4}]}]}, 0x1c}}, 0x0) 14:20:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@mcast2, @ipv4, @mcast2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1440208}) 14:20:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x20, r1, 0x20d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 186.367000][T11765] device batadv110 entered promiscuous mode [ 186.369100][T11765] bond89: (slave batadv110): Enslaving as an active interface with an up link 14:20:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 4: syz_emit_ethernet(0xfffffdef, &(0x7f0000000200)={@dev, @broadcast, @void, {@ipv4={0x800, @gre={{0x16, 0x4, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @remote, {[@timestamp_prespec={0x44, 0x3c, 0x0, 0x3, 0x0, [{@remote}, {@loopback}, {@dev}, {@loopback}, {@remote}, {@local}, {@broadcast}]}, @noop, @ra={0x94, 0x4}]}}}}}}, 0x0) 14:20:13 executing program 1: add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="f6", 0x1, 0xfffffffffffffffb) 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) [ 186.403046][T11790] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 186.417586][T11790] device bond90 entered promiscuous mode 14:20:13 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 14:20:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) [ 186.449890][ T25] audit: type=1400 audit(1656080413.428:332): avc: denied { setopt } for pid=11798 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 186.460331][T11790] 8021q: adding VLAN 0 to HW filter on device batadv111 [ 186.462379][T11790] bond90: (slave batadv111): making interface the new active one [ 186.462395][T11790] device batadv111 entered promiscuous mode [ 186.464498][T11790] bond90: (slave batadv111): Enslaving as an active interface with an up link [ 186.518551][T11813] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 186.519571][T11815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 186.551239][T11813] device bond91 entered promiscuous mode [ 186.565459][T11813] 8021q: adding VLAN 0 to HW filter on device batadv112 [ 186.567425][T11813] bond91: (slave batadv112): making interface the new active one [ 186.567441][T11813] device batadv112 entered promiscuous mode [ 186.575937][T11813] bond91: (slave batadv112): Enslaving as an active interface with an up link [ 186.634771][T11829] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:13 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={'cmac-aes-ce\x00'}}) 14:20:13 executing program 1: syz_emit_ethernet(0xe6, &(0x7f0000000200)={@dev, @broadcast, @void, {@ipv4={0x800, @gre={{0x25, 0x4, 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @remote, {[@timestamp_prespec={0x44, 0x54, 0x0, 0x3, 0x0, [{}, {@remote}, {@loopback}, {@dev}, {@broadcast}, {@broadcast}, {@loopback}, {@remote}, {@local}, {@broadcast}]}, @noop, @ra={0x94, 0x4}, @cipso={0x86, 0x24, 0x0, [{0x0, 0x12, "7672179bdfd1a18c44021aab199ccce1"}, {0x0, 0xc, "438a9d424bdd57af210c"}]}]}}}}}}, 0x0) 14:20:13 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 4: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='\x00', 0x0) 14:20:13 executing program 0: socket(0x23, 0x0, 0x5f) 14:20:13 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x8e082, 0x0) 14:20:13 executing program 1: socket(0x28, 0x0, 0x8000) 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:13 executing program 2: openat$sysfs(0xffffff9c, &(0x7f0000000140)='/sys/block/loop0', 0xa102, 0x0) 14:20:13 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x0, 0x0, 0x8}, 0x48) [ 186.682444][ T25] audit: type=1400 audit(1656080413.648:333): avc: denied { ioctl } for pid=11833 comm="syz-executor.4" path="socket:[49353]" dev="sockfs" ino=49353 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 186.684419][T11829] device bond92 entered promiscuous mode [ 186.729566][T11829] 8021q: adding VLAN 0 to HW filter on device batadv113 14:20:13 executing program 0: r0 = memfd_create(&(0x7f0000000000)='}$}!-\'\x00', 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) 14:20:13 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @broadcast, @val={@void, {0x8100, 0x0, 0x1}}, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "3ee716", 0x10, 0x21, 0x0, @mcast2, @rand_addr=' \x01\x00', {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b01710", 0x0, "41e7ed"}}}}}}}, 0x0) 14:20:13 executing program 2: bpf$LINK_GET_NEXT_ID(0x4, &(0x7f0000000000)={0x80000001}, 0x8) 14:20:13 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)) [ 186.734071][T11829] bond92: (slave batadv113): making interface the new active one [ 186.734088][T11829] device batadv113 entered promiscuous mode 14:20:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r0, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) 14:20:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 14:20:13 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) [ 186.741846][T11829] bond92: (slave batadv113): Enslaving as an active interface with an up link [ 186.911709][T11858] device bond93 entered promiscuous mode 14:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:13 executing program 4: syz_emit_ethernet(0xaa, &(0x7f0000000200)={@dev, @broadcast, @void, {@ipv4={0x800, @gre={{0x16, 0x4, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @remote, {[@timestamp_prespec={0x44, 0x3c, 0x0, 0x3, 0x0, [{@remote}, {@loopback}, {@dev}, {@loopback}, {@remote}, {@local}, {@broadcast}]}, @noop, @ra={0x94, 0x4}]}}}}}}, 0x0) 14:20:13 executing program 1: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000800)) 14:20:13 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf228", 0x4}], 0x1}}], 0x1, 0x0) 14:20:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) select(0x40, &(0x7f000000a4c0), &(0x7f000000a500)={0x8}, 0x0, 0x0) [ 186.968744][T11858] 8021q: adding VLAN 0 to HW filter on device batadv114 [ 186.971173][T11858] bond93: (slave batadv114): making interface the new active one [ 186.971190][T11858] device batadv114 entered promiscuous mode 14:20:14 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000002280)={0x1c, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) 14:20:14 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, 0x0, 0x0, 0x0) [ 186.973221][T11858] bond93: (slave batadv114): Enslaving as an active interface with an up link 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, 0x0, 0x0, 0x0) [ 187.072322][T11887] device bond94 entered promiscuous mode [ 187.078778][T11887] 8021q: adding VLAN 0 to HW filter on device batadv115 [ 187.093145][T11887] bond94: (slave batadv115): making interface the new active one [ 187.093162][T11887] device batadv115 entered promiscuous mode [ 187.095175][T11887] bond94: (slave batadv115): Enslaving as an active interface with an up link 14:20:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x7, 0x0, &(0x7f0000000100)) 14:20:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:14 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "770de6", 0x10, 0x21, 0x0, @private0, @rand_addr=' \x01\x00', {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "94bd08", 0x0, "985ae9"}}}}}}}, 0x0) 14:20:14 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@generic={0x0, 0x2}]}}, @address_request}}}}, 0x0) 14:20:14 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "770de6", 0x18, 0x21, 0x0, @private0, @rand_addr=' \x01\x00', {[@srh], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "94bd08", 0x0, "985ae9"}}}}}}}, 0x0) 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 14:20:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 14:20:14 executing program 0: socketpair(0xa, 0x1, 0x9c, &(0x7f0000000000)) 14:20:14 executing program 4: memfd_create(&(0x7f0000001380)='/dev/zero\x00', 0x4) 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0), 0x0, 0x0) 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0), 0x0, 0x0) 14:20:14 executing program 2: syz_clone3(&(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000b00)=""/233, 0xe9, 0x0, &(0x7f0000001c00)=[0x0], 0x1}, 0x58) [ 187.815793][T11908] device bond95 entered promiscuous mode 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0), 0x0, 0x0) 14:20:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @broadcast}}}}) 14:20:14 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001340)={0x0, 0x0, 0x18}, 0x10) [ 187.873435][T11908] 8021q: adding VLAN 0 to HW filter on device batadv116 [ 187.897649][T11908] bond95: (slave batadv116): making interface the new active one 14:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x22, 0x0, &(0x7f0000000100)) 14:20:14 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000001c0), 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/32, 0x20}], 0x1) 14:20:14 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:20:14 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x10840, 0x0) 14:20:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) [ 187.897668][T11908] device batadv116 entered promiscuous mode [ 187.899580][T11908] bond95: (slave batadv116): Enslaving as an active interface with an up link 14:20:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x16, 0x0, &(0x7f0000000100)) 14:20:14 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001000), 0x2, 0x0) 14:20:14 executing program 2: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) 14:20:15 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 187.954338][ T25] audit: type=1400 audit(1656080414.928:334): avc: denied { read } for pid=11937 comm="syz-executor.0" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 14:20:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:15 executing program 2: getsockopt$MRT6(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 14:20:15 executing program 4: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) 14:20:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) [ 187.954426][ T25] audit: type=1400 audit(1656080414.928:335): avc: denied { open } for pid=11937 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 187.981029][T11933] device bond96 entered promiscuous mode [ 188.052283][T11933] 8021q: adding VLAN 0 to HW filter on device batadv117 [ 188.055520][T11933] bond96: (slave batadv117): making interface the new active one [ 188.055582][T11933] device batadv117 entered promiscuous mode [ 188.058802][T11933] bond96: (slave batadv117): Enslaving as an active interface with an up link [ 188.114453][T11957] device bond97 entered promiscuous mode [ 188.152751][T11957] 8021q: adding VLAN 0 to HW filter on device batadv118 [ 188.154666][T11957] bond97: (slave batadv118): making interface the new active one [ 188.154686][T11957] device batadv118 entered promiscuous mode [ 188.156597][T11957] bond97: (slave batadv118): Enslaving as an active interface with an up link 14:20:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x2c, r1, 0x905, 0x0, 0x0, {0x2}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x2c}}, 0x0) 14:20:15 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:20:15 executing program 4: socketpair(0x27, 0x0, 0x0, &(0x7f0000000180)) 14:20:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 14:20:15 executing program 1: syz_io_uring_setup(0x1d8e, &(0x7f0000000300)={0x0, 0x0, 0x8}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0x9000)=nil, &(0x7f0000000140), &(0x7f0000000380)) 14:20:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000580)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_EXTENDED_ADDR={0xc}]}]}, 0x30}}, 0x0) 14:20:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000ac0)={'icmp\x00'}, &(0x7f0000000b00)=0x1e) 14:20:15 executing program 4: socket(0x2, 0x0, 0xb837) 14:20:15 executing program 2: add_key(&(0x7f0000000480)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000004c0)="2e7233c85a1b", 0x6, 0xfffffffffffffffc) 14:20:15 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)}}], 0x1, 0x0) [ 188.798522][ T25] audit: type=1400 audit(1656080415.768:336): avc: denied { create } for pid=11963 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 14:20:15 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, &(0x7f00000001c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffe) 14:20:15 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "b79a0b12a79ff34e945eae079eb6cb3d29627b8f2753f383c8b99b5bda87712eae4cd9f8c0419f62795a041dd8685f7d760c207d89f4e2136f96078f5ad76ccb"}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x2, r0, 0x0, 0x0, 0x0) 14:20:15 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "2d3bc525f094b915624dc038803456b5138c1ec7feb19517eaad0e500910f8da56f967a36f3f77b88324ab88fd795fbb77400c375ef67c5c7aa81928af5fdaed"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) 14:20:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x6200}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:15 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)}}], 0x1, 0x0) 14:20:15 executing program 0: syslog(0x4, &(0x7f0000000200)=""/174, 0xae) [ 188.847714][T11970] device bond98 entered promiscuous mode 14:20:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x585, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:16 executing program 4: r0 = fsopen(&(0x7f00000000c0)='tmpfs\x00', 0x0) fstat(r0, &(0x7f0000000000)) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)}}], 0x1, 0x0) 14:20:16 executing program 2: add_key(&(0x7f0000000480)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000004c0)="2e7233c85a1bef8a766b494bcf88f550f83ff014c6b536854d45a312a4d8135b3e0dced1d809", 0x26, 0xfffffffffffffffc) 14:20:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b1a, &(0x7f0000000000)={'wlan0\x00'}) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) 14:20:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 14:20:16 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) [ 189.022460][T11998] 8021q: adding VLAN 0 to HW filter on device batadv119 [ 189.024335][T11998] bond98: (slave batadv119): making interface the new active one [ 189.024353][T11998] device batadv119 entered promiscuous mode 14:20:16 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r0, 0x0, 0x0) 14:20:16 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/i2c-adapter', 0x4b0003, 0x0) [ 189.026397][T11998] bond98: (slave batadv119): Enslaving as an active interface with an up link [ 189.107921][T12011] device bond99 entered promiscuous mode 14:20:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:16 executing program 0: r0 = fsopen(&(0x7f00000000c0)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='nomand\x00', 0x0, 0x0) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 1: r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffe, 0x0, 0x0) 14:20:16 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "6cefb60dc64ce8151ae564895b1bd37e76cae151a41e58b492946cc8d5181916cd4add45eec710d57a6e5a52588ebd26a03f3fdbe439eb9cc9d7001b3ae09d9a"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r0}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'nhpoly1305-neon\x00'}}, 0x0, 0x0) 14:20:16 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000500)={0x0, "98b1e25328dc6ef89985c82f45b234773d38043060a0441a54d53e8342827d530b96defb31981d0e5f67109b60624da2ac8e49324a9f3042df22c52f6cbacd3a"}, 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0) 14:20:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x2c, r1, 0x905, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x4, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 14:20:16 executing program 2: socket(0x10, 0x2, 0x800) 14:20:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x1, 0x0) [ 189.126531][ T25] audit: type=1326 audit(1656080416.098:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12012 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72522e1109 code=0x0 [ 189.170192][T12011] 8021q: adding VLAN 0 to HW filter on device batadv120 14:20:16 executing program 4: r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 14:20:16 executing program 0: msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/81) [ 189.172110][T12011] bond99: (slave batadv120): making interface the new active one [ 189.172126][T12011] device batadv120 entered promiscuous mode 14:20:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:16 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x1490c0) 14:20:16 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) setfsuid(0xee00) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 4: add_key$fscrypt_v1(&(0x7f00000008c0), 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff8) 14:20:16 executing program 1: r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x1f) [ 189.174346][T12011] bond99: (slave batadv120): Enslaving as an active interface with an up link [ 189.236396][T12035] device bond100 entered promiscuous mode [ 189.278059][T12035] 8021q: adding VLAN 0 to HW filter on device batadv121 [ 189.282543][T12035] bond100: (slave batadv121): making interface the new active one [ 189.282562][T12035] device batadv121 entered promiscuous mode [ 189.285725][T12035] bond100: (slave batadv121): Enslaving as an active interface with an up link 14:20:16 executing program 0: msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x1008, 0x0) 14:20:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000b40)=ANY=[@ANYRES16], 0x6c}}, 0x0) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7002, 0x0) 14:20:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x1) 14:20:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 189.359030][T12050] device bond101 entered promiscuous mode 14:20:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x6, 0x0, 0x0) syz_clone(0x40000, 0x0, 0x0, &(0x7f0000003240), 0x0, 0x0) 14:20:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, 0x0, 0x0) 14:20:16 executing program 2: sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000e00), 0xffffffffffffffff) syz_genetlink_get_family_id$fou(&(0x7f0000003180), 0xffffffffffffffff) 14:20:16 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x511000, 0x0) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8b", 0x2}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x3}, 0x48) 14:20:16 executing program 2: setreuid(0xee00, 0x0) setreuid(0x0, 0x0) 14:20:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 189.433138][T12050] 8021q: adding VLAN 0 to HW filter on device batadv122 [ 189.438375][T12050] bond101: (slave batadv122): making interface the new active one [ 189.438393][T12050] device batadv122 entered promiscuous mode 14:20:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)={0x18, r2, 0xf21, 0x0, 0x0, {0x4}, [@HEADER={0x4}]}, 0x18}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={@rand_addr, 0x0, 0x0, 0x1, 0x2}}) r3 = socket$nl_route(0x10, 0x3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80001, 0x174) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)=ANY=[@ANYBLOB="2000000010000104000100"/20, @ANYRES32=r4, @ANYBLOB="92"], 0x20}}, 0x0) [ 189.440563][T12050] bond101: (slave batadv122): Enslaving as an active interface with an up link 14:20:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:16 executing program 2: ioperm(0x0, 0xe24, 0x0) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8b", 0x2}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 1: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000002c0)="eb3c8fe6ffff722e66617400020101000240008080f805", 0x17}, {&(0x7f0000000300)="255b7dfa2b878965853a5aa62dc55405e5401585fc3d7ff882b5b061ea6bf344bdf8478e2aa9e70af89757d8086c4e755208ec93eb493370e5af07fcc65eff6437a1fe16ea3acdcf6f3e8412af6d9c1b0e748813d868c4557b0d3e03ae149e8fadb67a60a9df9f2a2147ed497b7b686000e5a9755c8db45f5d0b93fa69195191447cbc028c263b2185b5ea6e629144dd39e8ffdb361dc5b5ccd1da6d53e418046a6ac22038eb57ac7cdee3f394980ca1aac1e3395b366b819205ff4ddd42a82384a69b0ebfe3e4251b73fd249f6270b74758db309ef36da4be6412", 0xdb, 0x80000001}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r2, 0x0, 0x6, &(0x7f0000001680)=""/59, &(0x7f0000000000)=0x3b) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$peeksig(0x4209, r3, &(0x7f0000000240)={0x8, 0x0, 0x6}, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}]) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x400) sendfile(r4, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r4, 0x4008f510, &(0x7f00000001c0)=0x867) ptrace$cont(0x20, r3, 0x6b, 0x1) ftruncate(r0, 0x7) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x1, 0xb1}, 0xb) 14:20:16 executing program 0: syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x4000) [ 189.554359][T12089] device bond102 entered promiscuous mode [ 189.571645][T12089] 8021q: adding VLAN 0 to HW filter on device batadv123 14:20:16 executing program 0: r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee01) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8b", 0x2}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 2: r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0xfffffffffffffffe) 14:20:16 executing program 0: fsopen(&(0x7f00000000c0)='bdev\x00', 0x0) 14:20:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x17, 0x0, 0x0) 14:20:16 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/ipc\x00') [ 189.577115][T12089] bond102: (slave batadv123): making interface the new active one [ 189.577133][T12089] device batadv123 entered promiscuous mode [ 189.579146][T12089] bond102: (slave batadv123): Enslaving as an active interface with an up link [ 189.620605][ T25] audit: type=1400 audit(1656080416.588:338): avc: denied { getopt } for pid=12108 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 14:20:16 executing program 4: r0 = msgget$private(0x0, 0x510) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000001040)=""/216) [ 189.686750][T12116] device bond103 entered promiscuous mode [ 189.716662][T12116] 8021q: adding VLAN 0 to HW filter on device batadv124 [ 189.718813][T12116] bond103: (slave batadv124): making interface the new active one 14:20:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf2", 0x3}], 0x1}}], 0x1, 0x0) 14:20:16 executing program 0: r0 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r0, 0x0, 0x0) [ 189.718830][T12116] device batadv124 entered promiscuous mode [ 189.743205][T12116] bond103: (slave batadv124): Enslaving as an active interface with an up link [ 189.808983][T12141] device bond104 entered promiscuous mode [ 189.816099][T12141] 8021q: adding VLAN 0 to HW filter on device batadv125 [ 189.818002][T12141] bond104: (slave batadv125): making interface the new active one [ 189.818018][T12141] device batadv125 entered promiscuous mode [ 189.827429][T12141] bond104: (slave batadv125): Enslaving as an active interface with an up link 14:20:17 executing program 1: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000002c0)="eb3c8fe6ffff722e66617400020101000240008080f805", 0x17}, {&(0x7f0000000300)="255b7dfa2b878965853a5aa62dc55405e5401585fc3d7ff882b5b061ea6bf344bdf8478e2aa9e70af89757d8086c4e755208ec93eb493370e5af07fcc65eff6437a1fe16ea3acdcf6f3e8412af6d9c1b0e748813d868c4557b0d3e03ae149e8fadb67a60a9df9f2a2147ed497b7b686000e5a9755c8db45f5d0b93fa69195191447cbc028c263b2185b5ea6e629144dd39e8ffdb361dc5b5ccd1da6d53e418046a6ac22038eb57ac7cdee3f394980ca1aac1e3395b366b819205ff4ddd42a82384a69b0ebfe3e4251b73fd249f6270b74758db309ef36da4be6412", 0xdb, 0x80000001}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r2, 0x0, 0x6, &(0x7f0000001680)=""/59, &(0x7f0000000000)=0x3b) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$peeksig(0x4209, r3, &(0x7f0000000240)={0x8, 0x0, 0x6}, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}]) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x400) sendfile(r4, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r4, 0x4008f510, &(0x7f00000001c0)=0x867) ptrace$cont(0x20, r3, 0x6b, 0x1) ftruncate(r0, 0x7) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x1, 0xb1}, 0xb) 14:20:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xf, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0xff9f}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:17 executing program 4: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000380)=""/4096, 0x1000) 14:20:17 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf2", 0x3}], 0x1}}], 0x1, 0x0) 14:20:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:20:17 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "190dbf58fb6b6d745c6148ab0ddb866bd9b8d2340e57632f807bb91e1ee5f7a60fb3b5bf6fc3a567bbdbb08ef76332301e598056c4b862e5b10410d2e5d4f29a"}, 0x48, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r0, 0x0) 14:20:17 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:20:17 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 14:20:17 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)="2b8bf2", 0x3}], 0x1}}], 0x1, 0x0) [ 190.449857][T12150] validate_nla: 12 callbacks suppressed [ 190.449872][T12150] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:17 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:17 executing program 3: add_key$fscrypt_v1(&(0x7f0000000200), 0x0, 0x0, 0xffffffffffffff20, 0x0) [ 190.499813][T12150] device bond105 entered promiscuous mode [ 190.582615][T12150] bond105: (slave veth211): Enslaving as an active interface with a down link 14:20:18 executing program 1: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000002c0)="eb3c8fe6ffff722e66617400020101000240008080f805", 0x17}, {&(0x7f0000000300)="255b7dfa2b878965853a5aa62dc55405e5401585fc3d7ff882b5b061ea6bf344bdf8478e2aa9e70af89757d8086c4e755208ec93eb493370e5af07fcc65eff6437a1fe16ea3acdcf6f3e8412af6d9c1b0e748813d868c4557b0d3e03ae149e8fadb67a60a9df9f2a2147ed497b7b686000e5a9755c8db45f5d0b93fa69195191447cbc028c263b2185b5ea6e629144dd39e8ffdb361dc5b5ccd1da6d53e418046a6ac22038eb57ac7cdee3f394980ca1aac1e3395b366b819205ff4ddd42a82384a69b0ebfe3e4251b73fd249f6270b74758db309ef36da4be6412", 0xdb, 0x80000001}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r2, 0x0, 0x6, &(0x7f0000001680)=""/59, &(0x7f0000000000)=0x3b) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$peeksig(0x4209, r3, &(0x7f0000000240)={0x8, 0x0, 0x6}, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}]) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x400) sendfile(r4, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r4, 0x4008f510, &(0x7f00000001c0)=0x867) ptrace$cont(0x20, r3, 0x6b, 0x1) ftruncate(r0, 0x7) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x1, 0xb1}, 0xb) 14:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002880)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002840)={&(0x7f0000004f80)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x7d, 0x4, "0b4fed04bd4e42bb13b188fbd6a644ae8e24ca4bb16b0b29ac6dd232bd22c20ad487d2defbe84a1ec9c9af18a6c48c0d91d7adb4192346d3c2452ae9374712e50208d1ca2dfd94b5e8cba119a3f7576e35dc327f448682b5d0e1073b6013822b887adb9ab41337bf07f4dfad9ba096c876118b22eb3567402b"}, @ETHTOOL_A_BITSET_MASK={0x71, 0x5, "cf00bd5a93519adaa90b8f2d275d4d6037ed3c6201e1af7e69841d57bdd40658964bdab0827a750eb3c8fd64f0830a8f8a011c97fc2f672fac373f96a2086e29731ca65159de9d9fb1b53f5f6c3ac47f8689e1c75e1ac0a7ea844c08f0f8f8d765cdf37bd891b0d07d9661f92b"}, @ETHTOOL_A_BITSET_BITS={0xb8, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '/{@&--:\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/ashmem\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',!^-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x107c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "7e6377bc8ff63248b6487f6d06af95a49887d2a31e5c9e0274a4057ee91e051b022430de6a1749e9bfe4b963b3a792d4c4aa0ced57b768c348bfc3b31f8150876d98da09124d3c40bf4464062bc17f0351ce55e337fd847334e618b95bb68ba5e277c1d380bad90fb2936b2171"}, @ETHTOOL_A_BITSET_VALUE={0x1001, 0x4, "c59857748e450396eca17022640fa1a8f1fe5272e5cde5736d259ddbb43f0639b4b149558f5189f20a902b2b9c81c3bf1614fc8ff737bb491bcb0593d7b8678e48f5bc03f0ca82c1185a7db94224666913300f2a203ebc07376868b44da1181af10dba6e6c1fb479deb7dd85acd5073cef91e8e9dd8eebb6f56b2e150f8f80f97bb166ed00a0fef41fcd5969e6e95d38e2521814b8e4bfccf8f8973e436d15583b884505389dad612f74a5027542023b27ca213275047976c4eef1b8431dd7debad8043dc0ebec830adbd2db9ef9574975e33bd3482e202948c8e87efa2b7b282ba72d0fdac8240f1c9b2abe29719696222779769e24273bdd3af5589b5eec9b5c1985c8d9b24cf67bd63a4bc2c858852f913d773acb98a001d6f30585c46401a829005851476128888d970f4b2f29e25557da3a23770b7bfe0f6a25f0205421daeac3d24479e96bfa4da7267ec9a9539d5c13a2e7f25e816e56f599f517e1de7b79bda9e50d054f262b8fef2276bfcb9ad450336f022be8a1f035d7d68061a19e64b6f98c92846de032ff5c21a777122017dbbf69db25e5b5c26912385c9f75a4cf7923fbac9e026fd7ea231eee7e0213ccfefc2d5f0a8694d197fb466fcff14b80cb8ea22100e1792e8454c6fdd50094e73149bb86d157bd088243780456f4b999bffb2b1955b79ac72c5f3b8a21ad71e2f0ac7de178bab3b522fd6148cd349896cc7ef488432c57df5f2636057635841cfe3f2c8d59dfca408147381980c0487850012b594de9286f6fce0e9811a141676e655e7d08e12cd95bedf3822dad56893ef2f37f2d9721e1872bf871db2d318c7e2ef3b5c8a000a452b7bcb2e16eecf5d1a2e8ea884a22df7959a897c0d3ddceeca377ca807274c407442f29b0737de32ae084f8f43578cd1cd1599a3f78b59af3ae3148dca039e5c6d6148835c007dc1bcc89eb9d3e40327bac379fc5b2a5b3fa9962b7b3d56ad88c37c53708700fce3a6b1ce1d9e83e725644d14dacbf833369a81d8dd8f64da84493e347f750b1fad531eaba7af0241771682dd63d3946d2ae77e0eae64eaf32056fcc50e25c35b6e7284a2b43a72e59b798406483f5ffbac941836efe071a4898a3430ee3300e8859bf2b191064ba9d1b1f409063f5a3834b982f4b8396b210ee6af98ac03d486f77482e838d257c5697845e89194fd5cfffdc171bba0ad21639228ae40c3747b65558e040ac44773bf0147f143810ff296c0b6e818b8a2116e4fe1d0d9868fcdd263eead9f308000cd35374580b05cb571e4e579074f345e3f20df2adbb1962796d37271ab3d7ede10b459fbddcd31d1a7f02bfe76d0c9435cc71c4187e402c635ddfa66806da01fac7aeae8402a2456001aa6d47ca7bd974492dc432ef4a23392df63ba1fbb8294c04653b5b5a18688dba3e0d0fa02fb38e2aaac5cc4be108bff6aa247eec56259a55235e4b52f62934b3148855b2d778c654fd080f56cf75cb486b63845078369f9d5fa0180e77173fd21545fc70cd6c3ce1942497841d8e627f76b285021d5dde7029f41a373120391bf42aa63d40da9f54f9cc2cbeb1e6a24ef4655a4811ea323c7027001a905445f581e53a1f7684f882282effd58088502a9865bb6ab3fa91e4f3962faedad06b4384bbf3ba1fe25bf9c6d6a106618f094a12cd852795d4cc0feb7ecddbeda5e1a760edefbbb47b3f99c8f7812cc8c8eebd67ed483290ec0e8e750884eb5b0f1806d5aa26db7b9f093ef7d75ef87f86704086a3617d4349f546a3c704aba5e516e75e3e1742359def2319ee711b61f48459432aaa4de0622f3b61498b7ff09503585862d854572eb1d21a5a66bb61c4649fcff6623df14acf0a264bb4ced903df7465f93b7b9d207a3280a69869c072ec70bcd0bfec94e5dda50e6a62d0cbef3dda606199d3b14f624e3c79d7776de7076166206d4d6b9a9237945e5021be6bafe4d2626362635a82d57f7e0b312819ad04209af59fda14a018c2b991f57804d4e959e3e8511dc4e8fbde7d566df74947b47107481937767ae05850eff1dc318fe6612e888ff9ac0eee99d08a0522a3fb3988a1993432ef6c5419dd2f912cf135f92be878d254a6d00cac82a1ece8393557f1ae9e2fdb87735cb34fe264c3d6a5be98161755c2263b023951831e0d1e524e0f79f2ee3017a934c3d7cb44387c7486182b98b7e2152ea0ff7ac7ccab53f2e3fec169b25552f65f809f5c0901c1c60f0c17c0de166593fccf593afef11230d5af07f5f4a4ea25e06edc00b0d14d2c2b7dcc70eea0230f886bdbb543d98ae5e7fede4deff94ca586ac88cccda1a29a1ceabbd244c631ef8f3fa3b4209789b41b4757b3db9802f8e175988d834867ebc3491d0ac30b17f5343d593eaf84da844b9bdee505aefb3411eff9b5878d30653cde174589f3d6ca73ad850ea1d77e80844bbc769a7a2be97e169aea1b5968997c1ec3c110b82b71958219b2b01a7c1ccd5fe6532ccce58bc4a2dc317cbc537cba12e568bd1137813a32545644f4cd20b88b1d3ead2a8f352780062c70c4efc6b23cfe35a76a6fb0712c4403940c2739db74605e28a3f1a3a3a9836623dbc45ac78d259ce4525e91ed37df98dc8f71024cb26e9403270cab37c4d304e0e308fa8f13c64a2a91940d3ecedff862a556a67056281a5051cf5f71d1f65aa6d8dce33e49d733a51eaa1ec0e012442d91064169134cf9c38f953c15dbf4718d2476fd1a1583d250fb133579880e014df535d8a89308099fa9e9bd049e9f2a099ec1b5e4ac35b297541149718bc670236f9592cb5c4b64b023850e5ed1fea6cc0c876253e7af1ed9f5fc0169fd21cb1335076dba1714629b255944344e140e2ab5ef6576b0473870f0b4e06942f94929c50408edc15bfea0348b17d98a2146337683b382e614ac385a387dcef70b0c4f14bf284e53d6336796d6c3c94f5cd63086412064c4ed33b2cf74fd4f264b704f5d101b4b762c55776cc5bb443d19435cb2352f9a63cac3572a630ee48847f112fe3656090906b57a413ac9d0159a2330de19ddbf9ceedffd657f6f5eeb99c306facbbfe2ffb28989f7140a9e5f3d1c45ef57154e81d42a0f2822910b6e16f2639f544bad220a78763b20f3a35589bed39b2261557404f7aac3b87128df54e3039384a9b4c3fa24abe3fa97f5f9579312c509b27d872e902ae213154d02861e3d56c1a3aaaa9a8ab7dbedde76018aa4147b21cbb6d721d86eb31a8e828e8cc39205393a0154954ce76b24c6cf62f780d75a2b40e60406e5f176feffc55e98c21eb1f707ff3e5cae276443b69368e22766b7ae3b461215e7ec93086b46e2010cf0aca20e804a1719ff985a38a02c58c72da3d9ca2e31dfe966aeeeffee99945e3729d3edbbb7a177ede65f8a8febb4b8b601c4e893083ead1feaf2acf515192e305717f5511ffb1783ee092319e252bc9ecb54934d079b97dce88902417df719acb7f1a3c7bc15d8511cd45a56de73f6d66b9ae45f746d35090a485fc2824deb63294293b77e8e544879222a431f3afabcdf77c2f38bf6a0435601ba77083d8525180673c5c980f21fc01f28f141741342b453dcb82e7ceb86ca1166668502d79a4a53c95fbfe1c18158711f2d22b8956154bb1ee736072ca1f8b5955196d31bef6cedf69c3169b70977845dd1c30565cfa6144aefae5d36a32365adb4b534f55c6d2468525b74b00c45d83db95af02cc2df1218bfc783880ab478c47a9975818c31abc78c8a2f7f1ef2c5c7890fdfc7d5bbdd56d3d064d9d226642e819bf803cd7529133c693ba644f6aebbfb51eb49b471787bb93f52ade6f7eb594a6452a119aee7a009795c1204a1a3cd405bc154cce1e68c0791806d02b42bb9e29ed085f40cc2a3ed6629e77744d319745ca67ec97d060130a65d8bbac8e98015dce241f5889f59c2a6157f985761a01ab52483757c2e54f499f4901b42522a970734d7b397ff01ffc2a6f226a7beb4bbf043d573bcaba93d63b78b8439c99afe8105bb29e6fd6fe1e15bb3109b8fab8fa92ae5e0f91e6a7dcbc1949a1c8dd25f57e243bb9149bff4893814129102dcae3e5948707e38db3f7433e26426d35acb461d8332fb1a136d54146af42e7b4826721a4cdcb87191cc937021f51cf18a2622d2fe79cdc3dc94307e8b3d16dcf79763c25ebb7bb17025515027394d62f49efd5edbf65680f8c6d159524541308b85a22b8045f37916d1e863c3c1f2a19167d4baf97da0cea243a8096e53613fbaa596568686b9f555ac2b1349d169f1c92e8e8bd6d5e17258212bbde179c4ec02636899810d491bec605d3df167215aa31e12cfd13a6620f5110a7146acef9ca8090afd0b424d7c5f756cf8b0fd6f06803609dca7ffb5506327ccb80004a7630cb9397cc29ba0a9f0fad8819e0a125607b4cc2e4ffee76de434febde054b9457e14d36a25f70f6d01ed7174bfdf23f76961b116f392c347989b2136b43ad545017c84dc7fd7ed1a014a7481b662a9c4cddefa8d0ab9c9af0ec2364b79987a7ac34e2c87a2a48d17b28af26722afa2c391accb591fcbe0e304cb9a025c6d128a1c4e8f2920bb086f3fc049596307be06aa25fb24b8b1f0bb06a0006881b587ba2aa1479c90b45af6a272a882db94b890c1569d9a23fcb0cd32bee8d258408025ec1b1ad73f474e5c2b9773d9a4d8651d3767b50ab230f5ea2566bd7041920bef9affe0669bb221f32787917774fbd7a97e46da8ff21804f169c59f536ff4d1897bdddc87a52406b68009855773c8ee2779e99c7b714a3af96b960f581af66bb270bcd950a3cb2c3c627d288ed823a7e4dc8549ab1dbdf7106cc493649b669dd7b259a48789b03e6c85fb52acbbed046f4482823f0566d55cfbe3a5289252f254537608e06d04d8332dd984cae596264cda1a306f4334ee4c0c3cc30679b3b17e71cf0614c99d04bb2379fe7c6783416c56626c125c1cd61cdc94d4b44e9282062d1d3f4701702381879911225d9ea712e04d7445155d78378bd2f133bff271af272419fb569fad20f2840f0f0ca5a274c3ea79f5ce96c84723fdf0c61fe508f1a3d993364fa6a90bbc0eca813234349c566fbad9e33c80c336d09100cbd53a924e159d6016ac0e599e95d9e825d9e69bb70a68b25d87965ed7acc666d137b5f18be2821d89bb66275ac9d400c03b500fd1828caa8a0aec224d6cef6e3ac8bf4fede68354ed6b395686d9bc43610a6d1e0ebb354b863e00a19351b452b1625111297eff44dba60fc657d4644432a4a8fa0820a558de5471bc672b97651f9fdba460ad85566653a1f03a7eb182e69daa1be023e6f9a78ce59d5744afb2b73dc942e9da3eecea4936d76651168a17f75650e527aa4a01ca1f3244bde48abad7196a600cd516eaa3752ac17d3a14e362b5025cf37d38c73682b1ec8c876c7d1e30bec352149ab1d60508076d5754cdddecb3169efe4be73f61afacbd764b36b9ee5e3e9d0b4a8e3e322336de526c948366fbe8ebb0c05cc679401886683128a5fed2b6d1e1a8faabe3c2f64b856a3f3655ec5840ec354d7ea58c8e18391693cb2aeb0eb2e9275cacfd13aadfe4636a11713d95c776756df15da31c252c2c383393e9fbea43db708cf581aa19a9271b9f8acbfac5fa708f15a07a5c662d7e3b9d5719b7e17048230b91d33a90b97088c683b72aa958a3135d630eb4cee24ce983745d7584aa6faae5f96b98a9f06ba0bcac0ec56b1a4452bfa632ba0c79a8dc094caac6ee07184ed9fe4c0cc988ca21e124f385917b18"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc1, 0x5, "8b86202f6570b787f3e29cdb21a5e650e419d156e6ffbc0bc1e849bddfd4eadecbceacb2e320a70675bef62812115f05338e2001e7066009e76bc5279674d7ca1ac2bd30c7af3ec3f207c0e711a4504827f8c6ec773bdbf789629a58996c4ac768815ac88bcc63dd7034e33bdfb039a4a3bf5332288c217b4bfb39f50d52051ece4bf3649da06307ebcc2d717f7a5ed09115ad7de3842cf63dfa433167edba8bad299b438cfb53102ede4029fff3384816709eaefe460e4cb4eae77112"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xad8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_BITS={0xdc, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/ashmem\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/ashmem\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/ashmem\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/ashmem\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '])\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x6d, 0x5, "05aa85ab3814236b386cefd10f149e4a77ea419d6d5c8641bea32c31a66674174157bec89c8834400b8adbe264349e8c49a49dbb373bb46af2fe92d0f73113b76fecb3b12efaaefa40cffb7df8e264f0eec5d02546f5270694cd2702f3da443e7dd8c8c6e07ba36e0f"}, @ETHTOOL_A_BITSET_MASK={0x5d, 0x5, "4242eae867b84894eec1c82949cf2ff7697bcff7cebd579a14a6b39f98bbc0e3048b553bd8f38ae5117c3088e5be013b83d21d8ea90d7a418100792668d695bd212f6656cd937ec4f46a3c26f0f3fee58faef107d25a0387bb"}, @ETHTOOL_A_BITSET_VALUE={0x921, 0x4, "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"}]}]}, 0x1ec4}}, 0x0) 14:20:18 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 14:20:18 executing program 3: r0 = open(&(0x7f0000000680)='./file0\x00', 0x200, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x31, r0, 0x0) 14:20:18 executing program 0: r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) readv(r0, &(0x7f0000000140)=[{0x0}], 0x1) 14:20:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:20:18 executing program 3: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 191.338706][ T25] audit: type=1400 audit(1656080418.308:339): avc: denied { map } for pid=12172 comm="syz-executor.2" path="/root/syzkaller-testdir3446952317/syzkaller.zfVJkQ/648" dev="sda1" ino=1156 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 14:20:18 executing program 4: r0 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2800) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x2000) 14:20:18 executing program 2: r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0, 0x0) fchown(r0, 0xee01, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x80000000000206, 0x0) 14:20:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0x2, 0x0, 0x3f, 0x1, 0x4, 0x7, 0x801}, 0x0) close(r1) perf_event_open(&(0x7f0000002700)={0x0, 0x80, 0x2e, 0x7, 0x20, 0x4, 0x0, 0x101, 0x20, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x908, 0x3, 0x7fffffff, 0x3, 0xffff, 0x6, 0x0, 0x0, 0x2, 0x0, 0x20}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) r2 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2040) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) socket(0x10, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x7fffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, 0x0, 0x30) 14:20:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1277, 0xffffffffffffffff) [ 191.371708][T12180] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 191.436349][T12180] device bond106 entered promiscuous mode [ 191.485558][T12193] bond106: (slave veth213): Enslaving as an active interface with a down link 14:20:19 executing program 1: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000002c0)="eb3c8fe6ffff722e66617400020101000240008080f805", 0x17}, {&(0x7f0000000300)="255b7dfa2b878965853a5aa62dc55405e5401585fc3d7ff882b5b061ea6bf344bdf8478e2aa9e70af89757d8086c4e755208ec93eb493370e5af07fcc65eff6437a1fe16ea3acdcf6f3e8412af6d9c1b0e748813d868c4557b0d3e03ae149e8fadb67a60a9df9f2a2147ed497b7b686000e5a9755c8db45f5d0b93fa69195191447cbc028c263b2185b5ea6e629144dd39e8ffdb361dc5b5ccd1da6d53e418046a6ac22038eb57ac7cdee3f394980ca1aac1e3395b366b819205ff4ddd42a82384a69b0ebfe3e4251b73fd249f6270b74758db309ef36da4be6412", 0xdb, 0x80000001}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r2, 0x0, 0x6, &(0x7f0000001680)=""/59, &(0x7f0000000000)=0x3b) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$peeksig(0x4209, r3, &(0x7f0000000240)={0x8, 0x0, 0x6}, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}]) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x400) sendfile(r4, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r4, 0x4008f510, &(0x7f00000001c0)=0x867) ptrace$cont(0x20, r3, 0x6b, 0x1) ftruncate(r0, 0x7) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x1, 0xb1}, 0xb) 14:20:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000140), 0x4) 14:20:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@nat={'nat\x00', 0x1b, 0x5, 0x4b0, 0x280, 0x280, 0xffffffff, 0xd8, 0xd8, 0x418, 0x418, 0xffffffff, 0x418, 0x418, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg0\x00', 'veth0_vlan\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast2, @rand_addr, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @loopback, @icmp_id, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'Mu'}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @private, @remote}}}}, {{@uncond, 0x0, 0x160, 0x198, 0x0, {}, [@common=@ttl={{0x28}}, @common=@unspec=@conntrack3={{0xc8}, {{@ipv4=@multicast2, [], @ipv6=@mcast1, [], @ipv6=@empty, [], @ipv6=@remote, [0xff000000]}}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @rand_addr, @rand_addr, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x510) 14:20:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x4c80, 0x0) 14:20:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 14:20:19 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, 0x0) 14:20:19 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x12}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:20:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000080)=""/144, 0x32, 0x90, 0x1}, 0x20) 14:20:19 executing program 2: socketpair(0x1e, 0x0, 0xfffffffb, &(0x7f0000000040)) [ 192.241826][T12209] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:19 executing program 0: socket(0x10, 0x2, 0x396b) 14:20:19 executing program 2: r0 = epoll_create(0x9a6) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x3000000f}) 14:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}], @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x4}]]}, 0x24}}, 0x0) [ 192.260405][T12204] x_tables: duplicate underflow at hook 1 [ 192.306105][T12209] device bond107 entered promiscuous mode [ 192.362462][T12219] bond107: (slave veth215): Enslaving as an active interface with a down link 14:20:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000140)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x70, r3}) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r4, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}]) r5 = signalfd4(r0, &(0x7f0000000040)={[0x1]}, 0x8, 0x0) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xc1, 0x8, 0x0, 0x2, 0xf, 0x10, "1e0964e7005e932783ea0be36c0e2acca7ac88fd9aa8c801b72b07b2e8e467fd02d6efa627c35104419d2e2c24d5a77d3a9a769cd889d4c52999966cf75a7fd8", "95b2a3a0e54448667cb18fe658cf17442ddb784f6c28f5519d5ee18007564c43ea33b5dd071c03b48db4063a6a59dcd346fdc73f73a5195496819866ebf7e73c", "df603e500c7aa2dc62b98812aa94f424317ee86c8eef8c8674b8cdeaa5efeff9", [0x4, 0x2]}) 14:20:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) 14:20:20 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 14:20:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180), 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0xa8) 14:20:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x74f}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6}]}, 0x24}}, 0x0) 14:20:20 executing program 1: r0 = socket(0x2, 0x2, 0x1) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) 14:20:20 executing program 2: io_setup(0x1, &(0x7f0000000440)=0x0) io_submit(r0, 0x1, &(0x7f0000000740)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff00000000}]) 14:20:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) eventfd2(0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r1, 0x2, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f0000000080)}]) 14:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) [ 193.101368][T12235] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) 14:20:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_getlink={0x20}, 0x20}}, 0x0) 14:20:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0xe9}]) 14:20:20 executing program 2: bpf$OBJ_GET_PROG(0xd, &(0x7f0000000080)={0x0, 0x2}, 0x10) 14:20:20 executing program 1: io_setup(0xca1, &(0x7f00000001c0)=0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x1ff, 0x0, 0x1, r2}]) 14:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 193.139490][T12235] device bond108 entered promiscuous mode [ 193.163460][ T25] audit: type=1400 audit(1656080420.138:340): avc: denied { setopt } for pid=12245 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 14:20:20 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x0) 14:20:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x30}, @val={0xc}}}}, 0x28}}, 0x0) [ 193.166429][T12235] bond108: (slave veth217): Enslaving as an active interface with a down link [ 193.258901][T12249] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x26}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000040)="a84829fa6eed856785", 0x9}]) 14:20:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote, 0x7}, 0x1c, 0x0}, 0x65cb88210f1aac8f) sendmsg$inet6(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}, 0x0) 14:20:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0xe, 0x0, 0x0, 0x6}, 0x48) [ 193.291810][T12249] device bond109 entered promiscuous mode [ 193.297342][ T25] audit: type=1400 audit(1656080420.268:341): avc: denied { ioctl } for pid=12261 comm="syz-executor.4" path="pid:[4026532377]" dev="nsfs" ino=4026532377 ioctlcmd=0x5460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 14:20:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0x117}]}, 0x1c}}, 0x0) 14:20:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) 14:20:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001980)={&(0x7f0000000480)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=[@hopopts_2292={{0x18}}, @flowinfo={{0x14}}], 0x30}, 0x0) 14:20:20 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, r0+60000000}}, &(0x7f0000000100)) 14:20:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='notify_on_release\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f00000003c0)='7', 0x1}], 0x1) 14:20:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x10}, @val={0xc}}}}, 0x28}}, 0x0) [ 193.337472][T12264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12264 comm=syz-executor.2 [ 193.358831][T12266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12266 comm=syz-executor.3 [ 193.386188][T12272] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:20:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000001800)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x72218d401fbb204a, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 14:20:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) accept4$packet(r0, 0x0, 0x0, 0x0) 14:20:20 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x10e, 0x3, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40410}, 0x20000000) eventfd2(0x3e6d, 0x1) io_submit(0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0]) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={@mcast2, 0xf}) 14:20:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x117}, @void}}}, 0x1c}}, 0x0) 14:20:20 executing program 3: bpf$OBJ_GET_PROG(0x16, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:20 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 14:20:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x14, 0x0, 0x0) [ 193.395751][T12249] bond109: (slave veth219): Enslaving as an active interface with a down link [ 193.448997][T12277] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:20:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r1, 0x1, &(0x7f00000004c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 14:20:20 executing program 3: r0 = socket(0x2, 0x2, 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x64}}, 0x40801) 14:20:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1025, 0xffffffffffffffff, 0x13da}, 0x48) 14:20:20 executing program 1: bpf$OBJ_GET_PROG(0xe, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 14:20:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffdef}]) 14:20:20 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180), 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e009d"], 0xa8) [ 193.475579][T12286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12286 comm=syz-executor.4 [ 193.479963][T12277] device bond110 entered promiscuous mode [ 193.556989][T12277] bond110: (slave veth221): Enslaving as an active interface with a down link 14:20:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1025, 0xffffffffffffffff, 0x13da}, 0x48) 14:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000500)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xc000, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 193.599472][ T25] audit: type=1400 audit(1656080420.568:342): avc: denied { write } for pid=12302 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 14:20:20 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000240)) clock_gettime(0x0, 0x0) timer_create(0x3, 0x0, &(0x7f0000000240)=0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, r1+60000000}}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0}) timer_settime(r0, 0x0, &(0x7f00000002c0)={{0x77359400}, {r2}}, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, r3+60000000}}, 0x0) 14:20:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1025, 0xffffffffffffffff, 0x13da}, 0x48) [ 193.643124][ T25] audit: type=1400 audit(1656080420.618:343): avc: denied { accept } for pid=12312 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 193.643261][T12311] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 193.685051][T12311] device bond111 entered promiscuous mode 14:20:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:20:20 executing program 2: syz_open_dev$loop(&(0x7f0000000040), 0xfffffffffffffffe, 0x147241) 14:20:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1025, 0xffffffffffffffff, 0x13da}, 0x48) 14:20:20 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 14:20:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) 14:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000500)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xc000, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x8, 0x0, r0, 0x0}]) 14:20:20 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='personality\x00') ioctl$NS_GET_PARENT(r0, 0x40305828, 0x20000000) 14:20:20 executing program 4: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:20 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000940)={{0x0, 0x989680}, {0x77359400}}, 0x0) [ 193.733806][T12311] bond111: (slave veth223): Enslaving as an active interface with a down link 14:20:20 executing program 0: bpf$OBJ_GET_PROG(0x15, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000000)=0xffffffffffffff4b) 14:20:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000500)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xc000, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x6b}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0x117}]}, 0x1c}}, 0x0) 14:20:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000003a00)={0x14, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x15}, {@void, @void, @void}}}, 0x14}}, 0x0) 14:20:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote, 0x7}, 0x1c, 0x0}, 0x65cb88210f1aac8f) sendmsg$inet6(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="a0ee101169d8ee9290eacf21adc2c47dff63b12ced31aaaf2b6b3bec83ea7df1000d58383bdcf8884c29e86ec3709ad2531c3fb33af4efa601ff24e3f1acef0d3d467b59a0b6eb58df91a872a53912c21c9f813cfe1fd1115968b28d3d3f1a97c358929d4ff1af232994fa975fc0f833d4b33a915858900510b9a6fc75053708447fdda403010b72656956135583462697f65d9e3c4ac3baf59d10d065ed2e969aa926fb0995ca1b0141d6c778e0f87359d9c66ae7f438cad63a853ca0ad6156ed6a757bcd7c", 0xc6}, {&(0x7f0000000400)="6bfb5ee1466a6a212064f6e3c8577e209dfe807de3add51c49bcc07ec1b51e942ec93802", 0x24}, {&(0x7f0000000440)="042a335bb516bc2ea986f52a80191303d88ebe7840d9164599b46ed295dce4ef102bef8dbd01", 0x26}, {&(0x7f0000000480)="6306b2c62df0e264a928650319dc4e7ba384796eaaf19728eb7e41b59225735e035c57a24e691eb8462a1da2315f0587d1bffe4d6aee9e6ef1472657fb4d8f", 0x3f}, {&(0x7f0000001840)="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", 0x3fe}], 0x5}, 0x0) [ 193.812412][T12342] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 193.848674][T12342] device bond112 entered promiscuous mode 14:20:20 executing program 4: r0 = socket(0x1e, 0x2, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xf0ff7f}}, 0x0) 14:20:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0, 0x4000}, 0x0) 14:20:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f00000000c0)={0x0, 0xbff0a3d2a5e3404a}, 0x4) [ 193.878538][T12342] bond112: (slave veth225): Enslaving as an active interface with a down link [ 193.925622][T12363] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000500)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xc000, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:20 executing program 0: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0x10}, 0x10) 14:20:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x11}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x4}]}, 0x1c}}, 0x0) 14:20:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast1, 0x9}, 0x1c) 14:20:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 193.957219][T12363] device bond113 entered promiscuous mode [ 193.991956][T12363] bond113: (slave veth227): Enslaving as an active interface with a down link 14:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x6}, @void}}}, 0x1c}}, 0x0) 14:20:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0xe84, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc, 0x99, {0x300000}}}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CSA_IES={0xe5c, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x0]}, @beacon_params=[@NL80211_ATTR_IE={0x3f, 0x2a, [@rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @ht={0x2d, 0x1a}, @mesh_id={0x72, 0x6}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0xa, 0xbb, [0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x5ad, 0x91, "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"}, @NL80211_ATTR_BEACON_TAIL={0x2e, 0xf, [@chsw_timing={0x68, 0x4}, @ssid={0x0, 0x6, @default_ap_ssid}, @measure_req={0x26, 0x3}, @rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}]}, @NL80211_ATTR_IE={0xe1, 0x2a, [@perr={0x84, 0xd5, {0x0, 0xd, [@ext={{}, @broadcast, 0x0, @broadcast}, @not_ext, @not_ext, @ext={{}, @broadcast, 0x0, @broadcast}, @ext={{}, @device_b, 0x0, @broadcast}, @ext={{}, @broadcast, 0x0, @device_b}, @ext={{}, @device_a, 0x0, @broadcast}, @not_ext={{}, @broadcast}, @not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @device_b, 0x0, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @broadcast, 0x0, @device_b}]}}, @ext_channel_switch={0x3c, 0x4}]}], @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x645, 0x91, "3d6b98c48bc7cd44ac251c74ca15fc0e5c0f73a742b20f36c412976d3cb8f20369e787a270c915ae6693f023170ffb121118f04e1bf7aa2df92a9c089c9f4c350b6fe87eb468b69849f9625c6a1ef3aa2c9689f128533fd26ff3e4eb3c946ab62902538728f21de622497be636309259b2d3574e406beed575d63858050d02837ccecfef8e0c3433fb2c0d752e53f9bb39bc5e202841f39fc59b781e8ec4ccddf40a255bf27c7a25dbf4657740c2ecd950e21db624da456aa8e5a938707c52b9d64d92cb56cae71a6111e5cecc9fb88acf07fbb7343be246f46718a0b6142945f63345841267988312285ebef947e56d5b0350477b7cb0f4ed93b6f08b0daa2ad83157ae3834eae292b13a114d609c441e6f2a29e0cbd12276b34e7c3cf2e96968949e44577ebddf39bfdc4d4cf48e24abd8b89bbe09a3b3e078af96c50e48bed1b93dbbafe3bc82ad70d32b37362a183b2d1e242f290a8af00f2a552bd2ff53ac0224adf3d846a1377e1d6f5cf35fdbafaa00eaa2f6f574b354ead61ad85ecfc66ef9f9ffec695835ee6c917744c0d8021d4c1b6af2eddaa977ef4c4f036eae8bf59f96a12e823438b1da66f17da115dc82af5663b83cf6852ca9eeb0cbfdddbdc709a5e319612162313863d4b42d640765d3f6d0bed7fa6a092fbb79e305a2ade0bc45af3060807f6379b8e50fa406e363dc1262c9dceb8a0b440db9557aafeb2b5dacec9b8221dac3e49e2680775f195df29cf8085bbcb9321cacc90edd6e675a53bc1246ceff4b2897144e44ec0c29d986f83d7853ac8f5113bade3f60ee38d7e301af848f08a451f38a6bdcf988a2993207e41bd559396f20a84c712c6784d3f1aaecfd6eb6b00c83f56a27e15c6320a9675f020f0bb3cfeb59274ef6c9c2374c71b4b7a55b07a37701e615eb70e8b7bd15f0a91a6283d2f60830c37acb47eb9b0083208b37d30bd3596a42ad9b4415e7c7eae000f2281c9d16fa5b34cb182f09d749809e5e3f0113e01f4224afb014154910d1eed7f89a8a3d71d737aa32d755610205f2d226777e5d0e729e3f5f0c00e587a3cf261bf782077db1ed981109bfce8fddefb8dff08285cfa52ecb9108e1828731062b0783fc551a783a4eacab294966df22bdcd9f00e94b8199ac75631288f7f48dc26664c94e29778ae33f6f5d985fd5fc66d5ed100c02c3adbcf1881f5f7e5f797d9c5b417e981507d2b9fa476a3bcffe670a73806e08e9b54ad6aefdd275be1fe469ff89bfe754914af0016501e51de248cb8f1c384db673a1a17ad30a7a586b85d4b63a3d102ed4bc2925726cf8ac2bc8d356fd2d3f5adbb5f96610cb2a8dab7b46fe61fe2c6a955a9d68c2daa031823771458cf90a5a37e475181aacce3ef551b32ad72db87e12eb1eaa0e15367a2924c5642c018231af3ac77ef2bf54f0df9c4916c4cd617d212a35fea3a11309d708d8f65e73851fc7ca1bc15f2287cbd375e489de3350cc83eb939baec49be953685c3fe7d10a48dc42b480a1fa083dda8dc6fc5a79cc5123478c32a8c2b858740c25df1cae5ece7e6d461c82c0623cc187711afbc9617c7298e84f350bfa0180534181f967ff10742030ab963f73978bb799271f4a7ce5571da52a6a0f1844bd6b0d0114d703d460ba2376f9a27939ca719ade4afb78aea4ab79857c828f0a600fd6c841a51a0ab676555b2d5788cd056438f3ff4a9f6bc26089ea10fcc898435b87caf3cc250ec6f87a47d022ddaf3c35065d9eb3480124f91bc28acf64739afdf52b2bbe43a4eefaa2dbc0febe51ddadf6bc6d5cc4fcfcf726637f76e0e028b3a71c6f2f0f0f1865401cc68e8113fcff24750d59cfb9eadffa2598a8a3252a1376f769fe75757c3400a9e4be968ac04b03e67d58a941f20e1a09e2a3fffa100004445a68ec6b9083538d173065877e8f04a7e799604b67907706eb119e51f4a177f49fca6e904804a1c9d1bd3c002c88d73dd714e03a5e21cb5af4fd1f965458569a106bcb1592cc81b8b26203a50623cfd64f3d4f8db79f2a810e5978759f9f5faaea4cbf256b963498e4fae10887fd6a1846daba21dc70709dc66926863510d8b962073355b6990f86bc86bbe87dac5b1189db20b658b6fadf48b53fc0f807c52395ec6abca2c673eecd0427cff86eb32f683cec176118201548b8abea19b003f4eaadb7a0b2f55d362eaa038b5b6eb1091b9c99a569b6ce02f767bf034b6d44b06e17b4069d60f815d166e79876dd3d4d24227c87619ade"}, @NL80211_ATTR_IE_ASSOC_RESP={0x4}, @NL80211_ATTR_PROBE_RESP={0xf1, 0x91, "8d0dc93694df975917c911bce50d96c681f72e2a3a3c8f5686621b6cb828168251d72872dc71c6d92b5627f097f27cdb9f4f8e6ca68f6988c7be0fe15cbc7d12a16c54fc3bf9231a55b114ddbdef5d1ffe2a7b6abb78b22c03ec85ad0ccdfbfebcac42719539fc10b95a734cc931be53e569a4dffb625cc97f648046ea2f420d1c07dd3900b23ecf37f703deed8a735cc37a96d5ca78538aae6fe88daf80717b2df481c1ee093192e60f1e0d9b0e671c4bf0715d0f88decf36f5d58346a38eb7744d6cd186b14e51a4033e89187a013be06e33f64246e7e338a4d540aa609ee3fd9e24d416fc3951cbe364b718"}]]}]}, 0xe84}}, 0x0) 14:20:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bb2, 0x2}, {{@in=@dev}, 0x0, @in=@local}}, 0xe8) 14:20:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x33, 0x0, 0x0, r0, 0x0}]) 14:20:21 executing program 3: io_setup(0x1, &(0x7f0000000440)) io_setup(0xe3, &(0x7f0000000040)=0x0) io_destroy(r0) io_setup(0x148, &(0x7f00000000c0)) [ 194.020088][T12372] netlink: 'syz-executor.2': attribute type 195 has an invalid length. 14:20:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000003a00)={0x14, 0x0, 0xd83d06737b2fdfc5, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}, 0x300}, 0x0) 14:20:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x1d}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:21 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xc, &(0x7f00000000c0), 0x4) [ 194.054230][ T25] audit: type=1400 audit(1656080421.028:344): avc: denied { name_bind } for pid=12376 comm="syz-executor.1" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 14:20:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xa, &(0x7f00000000c0)={0x3}, 0x4) 14:20:21 executing program 0: io_setup(0x7ff, &(0x7f0000000040)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000200)="bab24725b7d951fd37112245ccc01a95", 0x10}]) 14:20:21 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xc, 0x0, &(0x7f0000000040)=0x4) [ 194.166804][T12393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12393 comm=syz-executor.2 [ 194.183864][T12382] device bond114 entered promiscuous mode 14:20:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 14:20:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 14:20:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x7895, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:21 executing program 3: io_setup(0x1, &(0x7f0000000440)) io_setup(0xe3, &(0x7f0000000040)) io_setup(0x3ff, &(0x7f0000000100)) io_setup(0x3, &(0x7f0000000000)) io_setup(0x148, &(0x7f00000000c0)) 14:20:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x5, 0x80) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 14:20:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x11}, @val={0xc}}}}, 0x28}}, 0x0) [ 194.236708][T12396] bond114: (slave veth229): Enslaving as an active interface with a down link 14:20:21 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/uevent_seqnum', 0x200, 0x0) 14:20:21 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb703, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r1) 14:20:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00004faa777d9d20eba37f"], 0x28}}, 0x0) 14:20:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000001800)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 14:20:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 194.311867][T12413] device bond115 entered promiscuous mode [ 194.312060][T12417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12417 comm=syz-executor.1 14:20:21 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x7ffffffff000) 14:20:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 14:20:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xffffffff00000000}]) 14:20:21 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305828, 0x1ffff000) 14:20:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@bridge_getlink={0x20, 0x12, 0x1}, 0x20}}, 0x0) 14:20:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x28}, @val={0xc}}}}, 0x28}}, 0x0) [ 194.361845][T12413] bond115: (slave veth231): Enslaving as an active interface with a down link 14:20:21 executing program 1: r0 = socket(0x2, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) 14:20:21 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 14:20:21 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = socket(0x1e, 0x4, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, 0x0) timer_create(0x3, 0x0, &(0x7f0000000240)=0x0) clock_gettime(0x1, &(0x7f0000000040)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f00000002c0)={{}, {0x0, r2+60000000}}, 0x0) timer_create(0x3, 0x0, &(0x7f0000000240)=0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f00000002c0)={{}, {0x0, r4+60000000}}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f00000001c0)={{r5, r6+10000000}}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 14:20:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000003a00)={0x14, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x5}, {@void, @void, @void}}}, 0x14}}, 0x0) 14:20:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x4000, 0x2, 0x0, r0, 0x0}]) 14:20:21 executing program 3: bpf$OBJ_GET_PROG(0xb, &(0x7f0000000080)={0x0, 0x2}, 0x10) [ 194.470854][T12441] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12441 comm=syz-executor.4 14:20:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0xf, 0x2, 0x0, r0, 0x0}]) 14:20:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}, 0x65cb88210f1aac8f) sendmsg$inet6(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="a0ee101169d8ee9290eacf21adc2c47dff63b12ced31aaaf2b6b3bec83ea7df1000d58383bdcf8884c29e86ec3709ad2531c3fb33af4efa601ff24e3f1acef0d3d467b59a0b6eb58df91a872a53912c21c9f813cfe1fd1115968b28d3d3f1a97c358929d4ff1af232994fa975fc0f833d4b33a915858900510b9a6fc75053708447fdda403010b72656956135583462697f65d9e3c4ac3baf59d10d065ed2e969aa926fb0995ca1b0141d6c778e0f87359d9c66ae7f438cad63a853ca0ad6156ed6a757bcd7c", 0xc6}, {&(0x7f0000000400)="6bfb5ee1466a6a212064f6e3c8577e209dfe807de3add51c49bcc07ec1b51e942ec93802", 0x24}, {&(0x7f0000000440)="042a335bb516bc2ea986f52a80191303d88ebe7840d9164599b46ed295dce4ef102bef8dbd01", 0x26}, {&(0x7f0000000480)="6306b2c62df0e264a928650319dc4e7ba384796eaaf19728eb7e41b59225735e035c57a24e691eb8462a1da2315f0587d1bffe4d6aee9e6ef1472657fb4d8f", 0x3f}, {&(0x7f0000001840)="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", 0x45e}], 0x5}, 0x0) 14:20:21 executing program 1: io_setup(0x1, &(0x7f0000000440)=0x0) io_setup(0xe3, &(0x7f0000000040)=0x0) io_setup(0x148, &(0x7f00000000c0)) io_destroy(r1) io_destroy(r0) 14:20:21 executing program 3: bpf$OBJ_GET_PROG(0x4, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) [ 194.492979][T12437] device bond116 entered promiscuous mode [ 194.540362][T12437] bond116: (slave veth233): Enslaving as an active interface with a down link 14:20:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x37fe0}}, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) 14:20:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1d}, 0x0) 14:20:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1d}, 0x0) 14:20:21 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f0000001180)) [ 194.586468][T12458] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:20:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xc, 0x0, 0x0) 14:20:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}]}, 0x1c}}, 0x0) 14:20:21 executing program 4: bpf$OBJ_GET_PROG(0x6, &(0x7f0000000080)={0x0, 0x0, 0x2}, 0x10) [ 194.621151][T12456] device bond117 entered promiscuous mode 14:20:21 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000200)={0x7ffff000}, 0xa) 14:20:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:21 executing program 3: io_setup(0xca1, &(0x7f00000001c0)=0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) [ 194.624449][ T25] audit: type=1400 audit(1656080421.598:345): avc: denied { read } for pid=12464 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 194.699186][T12456] bond117: (slave veth235): Enslaving as an active interface with a down link [ 194.737091][ T25] audit: type=1400 audit(1656080421.708:346): avc: denied { write } for pid=12483 comm="syz-executor.3" path="socket:[50521]" dev="sockfs" ino=50521 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 14:20:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000001fc0)=[{{0x0, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {&(0x7f0000000280)}, {&(0x7f0000000340)="b93db5729007ee5016d4fbdb4eb4", 0xe}, {&(0x7f0000000380)="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", 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x850) 14:20:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2000000000000020, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2008, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x37fe0}}, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x28}}, 0x0) 14:20:21 executing program 0: bpf$OBJ_GET_PROG(0x2, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 14:20:21 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f0000000000)) 14:20:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getnetconf={0x14, 0x52, 0x401}, 0x14}}, 0x0) 14:20:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000540)={0x0, 0x0, 0xfffffffffffffffc}, 0x0) [ 194.783138][T12486] device bond118 entered promiscuous mode [ 194.802574][T12486] bond118: (slave veth237): Enslaving as an active interface with a down link 14:20:21 executing program 3: io_setup(0x1, &(0x7f0000000440)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000140)="0925af039b713d382a", 0x9}]) 14:20:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0x4}]}, 0x28}}, 0x0) 14:20:21 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) 14:20:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x7ffff000, &(0x7f00000001c0)={0x0}, 0x300, 0x0, 0x5000}, 0x0) 14:20:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x8, 0x0, 0x0) 14:20:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0x4}]}, 0x28}}, 0x0) 14:20:21 executing program 0: syz_clone(0x2001000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0) 14:20:21 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x541b, 0x20000000) [ 194.940385][T12499] device bond119 entered promiscuous mode 14:20:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:20:22 executing program 3: io_setup(0x7ff, &(0x7f0000000040)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000200)="bab24725b7d9", 0x6}]) 14:20:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000280)=0xfff, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), r0) [ 194.995551][T12499] bond119: (slave veth239): Enslaving as an active interface with a down link 14:20:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0x4}]}, 0x28}}, 0x0) 14:20:22 executing program 2: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@size={'size', 0x3d, [0x67]}}]}) 14:20:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x0, 0x0, 0xe5e0}, 0x48) 14:20:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 195.062308][ T25] audit: type=1400 audit(1656080422.038:347): avc: denied { getattr } for pid=12527 comm="syz-executor.1" path="pid:[4026532391]" dev="nsfs" ino=4026532391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 14:20:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0xf, 0x3, 0x0, r0, 0x0}]) 14:20:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0x4}]}, 0x28}}, 0x0) 14:20:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x66}, @val={0xc}}}}, 0x28}}, 0x0) [ 195.074065][T12525] device bond120 entered promiscuous mode [ 195.101524][T12525] bond120: (slave veth241): Enslaving as an active interface with a down link [ 195.120441][ T25] audit: type=1400 audit(1656080422.098:348): avc: denied { mount } for pid=12532 comm="syz-executor.2" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 195.161098][ T25] audit: type=1400 audit(1656080422.138:349): avc: denied { unmount } for pid=1824 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 195.195171][T12535] device bond121 entered promiscuous mode [ 195.220279][T12545] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12545 comm=syz-executor.2 [ 195.266340][T12543] bond121: (slave veth243): Enslaving as an active interface with a down link 14:20:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x64}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x14, &(0x7f00000000c0), 0x4) 14:20:22 executing program 4: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0x8}, 0x10) 14:20:22 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x20000000) 14:20:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:20:22 executing program 2: bpf$OBJ_GET_PROG(0x14, &(0x7f0000000080)={0x0, 0x2}, 0x10) 14:20:22 executing program 4: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0x7}, 0x10) 14:20:22 executing program 2: r0 = socket(0x2, 0x2, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) 14:20:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x11, 0x0, 0x0) 14:20:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000a40)=0xf, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x37fe0}}, 0x0) 14:20:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002580)='gid_map\x00') sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$loop(&(0x7f00000026c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x0) 14:20:22 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000002c0), 0x0) clock_gettime(0x2, &(0x7f0000000280)) [ 195.892478][T12552] validate_nla: 12 callbacks suppressed [ 195.892494][T12552] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:22 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) 14:20:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x2}, 0x4) 14:20:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002540)='uid_map\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 14:20:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x0, 0x0, 0x0, 0x4}, 0x48) 14:20:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:20:23 executing program 4: pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) [ 195.922060][T12552] device bond122 entered promiscuous mode [ 195.946101][T12560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12560 comm=syz-executor.0 14:20:23 executing program 0: bpf$MAP_CREATE(0x15, &(0x7f0000001200), 0x48) 14:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) 14:20:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) 14:20:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0x17, 0x0, 0x0, 0x0, 0x386}, 0x48) 14:20:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/209, 0x29, 0xd1, 0x1}, 0x20) 14:20:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x1c}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:23 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000001200), 0x48) [ 195.958403][T12552] bond122: (slave veth245): Enslaving as an active interface with a down link [ 196.061221][T12583] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000003a00)={0x14, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x1b}, {@void, @void, @void}}}, 0x14}}, 0x0) 14:20:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0xf, 0x0, 0x0, r0, 0x0}]) 14:20:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=@ipmr_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) [ 196.104037][T12583] device bond123 entered promiscuous mode [ 196.106906][T12594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12594 comm=syz-executor.2 14:20:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 196.186436][T12583] bond123: (slave veth247): Enslaving as an active interface with a down link [ 196.215029][T12606] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 196.231284][T12606] device bond124 entered promiscuous mode [ 196.249204][T12606] bond124: (slave veth249): Enslaving as an active interface with a down link 14:20:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:20:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140), 0xc60, 0x80) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 14:20:23 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) 14:20:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000003a00)={0x14, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x32}, {@void, @void, @void}}}, 0x14}}, 0x0) 14:20:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x4080) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 14:20:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:20:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x25}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x4000, 0x0, 0x0, r0, 0x0}]) 14:20:23 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x64}}, 0x40801) 14:20:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) 14:20:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) [ 196.883322][T12617] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 196.898104][T12617] device bond125 entered promiscuous mode [ 196.914577][T12617] bond125: (slave veth251): Enslaving as an active interface with a down link 14:20:23 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') setns(r0, 0x0) 14:20:24 executing program 4: io_setup(0x10000, &(0x7f0000000000)) io_setup(0x9, &(0x7f0000000040)) 14:20:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x7, 0x0, 0x0) 14:20:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000004c0)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xe81) 14:20:24 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') [ 196.964888][T12627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12627 comm=syz-executor.0 [ 196.984854][T12631] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000001800)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 14:20:24 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000001200), 0x48) 14:20:24 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_create(0x2, 0x0, &(0x7f0000000080)=0x0) timer_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{}, {0x0, 0x989680}}, 0x0) 14:20:24 executing program 0: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000940)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000980)) [ 197.043122][T12631] device bond126 entered promiscuous mode 14:20:24 executing program 3: io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) io_setup(0x10000, &(0x7f0000000000)) 14:20:24 executing program 2: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0x9}, 0x10) 14:20:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 14:20:24 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x64}}, 0x0) [ 197.130751][T12631] bond126: (slave veth253): Enslaving as an active interface with a down link 14:20:24 executing program 4: timer_create(0x7, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f0000000680)) 14:20:24 executing program 0: timer_create(0xa, 0x0, 0xfffffffffffffffd) 14:20:24 executing program 1: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0x14}, 0x10) 14:20:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x2}]) [ 197.220138][T12661] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 197.227023][T12661] device bond127 entered promiscuous mode 14:20:24 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000000200), 0x48) 14:20:24 executing program 0: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0x6}, 0x10) 14:20:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000000ff0100000000000000", @ANYRES32=r2, @ANYBLOB="00010000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 14:20:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x7, 0x0, 0x0, 0x0, 0x2}, 0x48) 14:20:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0xfffffffb}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x28}, 0x0) 14:20:24 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) 14:20:24 executing program 2: bpf$OBJ_GET_PROG(0x13, &(0x7f0000000080)={0x0, 0x2}, 0x10) [ 197.249195][T12661] bond127: (slave veth255): Enslaving as an active interface with a down link 14:20:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000200)}]) 14:20:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:20:24 executing program 2: bpf$MAP_CREATE(0x6, &(0x7f0000001200), 0x48) 14:20:24 executing program 0: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_create(0x2, 0x0, &(0x7f0000000340)=0x0) timer_settime(r0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) 14:20:24 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000000200), 0xa7) [ 197.355401][T12674] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 14:20:24 executing program 2: bpf$OBJ_GET_PROG(0x8, &(0x7f0000000080)={0x0, 0x18}, 0x10) 14:20:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x33, 0x1, 0x0, r0, 0x0}]) [ 197.415238][T12674] device bond128 entered promiscuous mode 14:20:24 executing program 2: io_setup(0xca1, &(0x7f00000001c0)=0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:20:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x3}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x3}, 0x4) 14:20:24 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x1ffff000) 14:20:24 executing program 3: socket(0xa, 0x2, 0x1) 14:20:24 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x2}, 0x10) 14:20:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/uevent_seqnum', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) [ 197.473406][T12674] bond128: (slave veth257): Enslaving as an active interface with a down link 14:20:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:20:24 executing program 5: syz_clone(0x1201400, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 14:20:24 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) 14:20:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xe, 0x0, &(0x7f0000000040)) 14:20:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x5}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x4}]}, 0x1c}}, 0x0) 14:20:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x18, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:20:24 executing program 2: r0 = socket$netlink(0x2, 0x3, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x7fffdf001000, 0x0, 0x11, r0, 0x0) getresuid(&(0x7f0000002700), &(0x7f0000002740), &(0x7f0000002780)) 14:20:24 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000580)='ns/cgroup\x00') 14:20:24 executing program 4: r0 = socket(0x28, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 14:20:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x4}]}, 0x1c}}, 0x0) 14:20:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x3}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x1}, 0x4) 14:20:24 executing program 2: r0 = socket$netlink(0x2, 0x3, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x7fffdf001000, 0x0, 0x11, r0, 0x0) getresuid(&(0x7f0000002700), &(0x7f0000002740), &(0x7f0000002780)) 14:20:24 executing program 1: socket(0x1e, 0x4, 0x0) pselect6(0x40, &(0x7f0000000480), 0x0, &(0x7f0000000500)={0x9}, &(0x7f0000000580), 0x0) 14:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000000c0)=ANY=[@ANYRES32=r1, @ANYRES16=r1, @ANYBLOB="c5df000000000000000067"], 0x1c}}, 0x0) 14:20:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x33, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:24 executing program 0: io_setup(0x1000, 0x0) io_destroy(0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_destroy(r0) io_setup(0xe3, &(0x7f0000000040)) io_pgetevents(0x0, 0xbbd1, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x2]}, 0x8}) 14:20:24 executing program 5: socketpair(0x10, 0x3, 0xfffffffa, &(0x7f0000000000)) 14:20:24 executing program 1: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000080)={0x0, 0xa}, 0x10) [ 197.593969][T12725] netlink: 'syz-executor.0': attribute type 195 has an invalid length. [ 197.629662][T12731] netlink: 'syz-executor.1': attribute type 195 has an invalid length. 14:20:24 executing program 2: r0 = socket$netlink(0x2, 0x3, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x7fffdf001000, 0x0, 0x11, r0, 0x0) getresuid(&(0x7f0000002700), &(0x7f0000002740), &(0x7f0000002780)) 14:20:24 executing program 3: bpf$MAP_CREATE(0x14, &(0x7f0000000200), 0x48) 14:20:24 executing program 2: r0 = socket$netlink(0x2, 0x3, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x7fffdf001000, 0x0, 0x11, r0, 0x0) getresuid(&(0x7f0000002700), &(0x7f0000002740), &(0x7f0000002780)) 14:20:24 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='personality\x00') ioctl$NS_GET_PARENT(r0, 0x5452, 0x20000000) 14:20:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x9, &(0x7f0000000000)=@req3, 0x1c) 14:20:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}, @struct={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/209, 0x59, 0xd1, 0x1}, 0x20) 14:20:24 executing program 4: io_setup(0x1, &(0x7f0000000440)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000140)="0925af039b713d382aff1cecb616a4a8", 0x10}]) 14:20:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x7, &(0x7f00000000c0), 0x4) 14:20:24 executing program 1: io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 14:20:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xc, 0x0, 0x4) 14:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0x110}]}, 0x1c}}, 0x0) 14:20:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x1e}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:24 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305828, 0x0) 14:20:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x11, 0x0, &(0x7f0000000040)) 14:20:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00004faa777d9d20eba37fca"], 0x28}}, 0x0) 14:20:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x6, &(0x7f0000001080)=0x0) io_submit(r1, 0x1, &(0x7f0000000840)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x6}]) 14:20:24 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) 14:20:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x32}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0x117}]}, 0x1c}}, 0x0) 14:20:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000300), r0) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0xfffffeec}}, 0x0) 14:20:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}}, 0x2, @in6=@dev, 0x0, 0x4}}, 0xe8) 14:20:24 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000004c0)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) 14:20:24 executing program 3: bpf$OBJ_GET_PROG(0x10, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:24 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40480cd) 14:20:24 executing program 0: io_setup(0x1, &(0x7f0000000440)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000740)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, r1, 0x0}]) 14:20:24 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) 14:20:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x10, 0x0, 0x0, 0x4}, 0x48) 14:20:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xa, &(0x7f00000000c0), 0x4) 14:20:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}, 0x65cb88210f1aac8f) sendmsg$inet6(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 14:20:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x68}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x58}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/nf_conntrack_ftp', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000180)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 14:20:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}], @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x4}]]}, 0x24}}, 0x0) 14:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000080)={0x1c, r1, 0xd83d06737b2fdfc5, 0x0, 0x0, {{0x15}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0x117}]}, 0x1c}}, 0x0) 14:20:24 executing program 1: io_setup(0x1, &(0x7f0000000440)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}]) 14:20:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x32}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:24 executing program 2: io_setup(0x0, &(0x7f0000000000)) r0 = socket$netlink(0x2, 0x3, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x7fffdf001000, 0x0, 0x11, r0, 0x0) 14:20:25 executing program 2: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xf8a76eeb3d6039f3, 0xffffffffffffffff, 0x8000000) [ 197.968605][T12809] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:20:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0, 0x0, &(0x7f0000001340)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}, 0x0) 14:20:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0xca1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 14:20:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x5e}, @val={0xc}}}}, 0x28}}, 0x0) 14:20:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3c}}}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)='\v', 0x1}], 0x1}, 0x4000044) 14:20:25 executing program 2: perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) 14:20:25 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xffffffffffffff46) 14:20:25 executing program 3: bpf$MAP_LOOKUP_ELEM(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 14:20:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11}, 0x48) 14:20:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}, 0x0) 14:20:25 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x3, 0x1, 0x0, &(0x7f0000000140)=[0x0], 0x1}, 0x20) 14:20:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)) write$cgroup_pid(r0, 0x0, 0x0) write$cgroup_devices(r0, 0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 14:20:25 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8993, &(0x7f0000000080)) 14:20:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020662a, 0x0) 14:20:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)="ee", 0x1}], 0x300}, 0x4000040) 14:20:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6628, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xffffffac) 14:20:25 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 14:20:25 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xfffffffffffffcde) 14:20:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x80, 0x5, 0x38e38e2, 0x0, 0x1}, 0x48) 14:20:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x13, 0x0, 0x0, 0x0}, 0x20) 14:20:25 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000600)={@cgroup, 0xffffffffffffffff, 0x10}, 0x10) 14:20:25 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8992, &(0x7f0000000080)) 14:20:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, 0x0, 0x0) 14:20:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x80, 0x5, 0x3ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080), 0x0}, 0x20) 14:20:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)="ee", 0x1}], 0x3e80}, 0x4000040) 14:20:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xe9, &(0x7f00000001c0)=""/233, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100), 0x10}, 0x80) 14:20:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = syz_clone(0x8000000, &(0x7f0000000400)="9b77828e5ece5767491296d656427586c66f5626c48b4275350907734680e578ca89a3ecdfaa2db9d72bdaeaff6c29bc4a8af85c189c9020fdcd685a1ee0b83da85244df33", 0x45, 0x0, &(0x7f0000000840), &(0x7f00000009c0)="be26c91a57361f51c97b2e961ef3526b524764445132716b4836e4a1540256f829f7f8cfe459a67a02ce5dd61b1632c82afd95755ebde148b351ec48f480d4e959913aef06d24e6e613e202497b061803ac97672eb0853b4395dfbaa959f9e319cabb472191427a6e4ccb0a92c4cc9a5388cd25e259797b04c5f3ff2f19170a6452b39766218a918f594d70662e0b46ace") perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x1, 0x0, 0x40, 0x4102, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xae76, 0x800}, 0x84a0, 0x998, 0x4, 0xb70a4df09a438668, 0x0, 0xda6, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2e, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x4, 0x4, 0x7, 0xc00, 0x1}, 0x48) 14:20:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086601, 0x0) 14:20:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x800c6613, 0x0) 14:20:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x41) 14:20:26 executing program 0: socketpair(0x28, 0x0, 0x7, &(0x7f0000000000)) 14:20:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43408) 14:20:26 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:26 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xffffffac) 14:20:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, 0x0) 14:20:26 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) 14:20:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = syz_clone(0x8000000, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000840), &(0x7f00000009c0)="be26c91a57361f51c97b2e961ef3526b524764445132716b4836e4a1540256f829f7f8cfe459a67a02ce5dd61b1632c82afd95755ebde148b351ec48f480d4e959913aef06d24e6e613e202497b061803ac97672eb0853b4395dfbaa959f9e319cabb472191427a6e4ccb0a92c4cc9a5388cd25e259797b04c5f") perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000880)="01980384180ab69be1d8fa") 14:20:26 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x14}, 0x10) 14:20:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x1, 0x8, 0xfffffff8}, 0x48) 14:20:26 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000006d40)={&(0x7f0000006c00)=@generic={0x0, "54412f2740f28f9fc49fac4e64abc1c3135cc5c835bffc62d3a5455cb46f8f047eba9817b101c58048361408d344c90b4202a445582364dc2124be135a26dd044a19312da3696cf224f5f467f58fd4f2e104fcd4966964471fb550c691a60f91faee2ec4755c451023c691d5b4829379bacf007d67822521def722c331de"}, 0x80, 0x0, 0x0, &(0x7f0000006d00), 0x10}, 0x0) 14:20:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) 14:20:26 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 14:20:26 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000080)) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 14:20:26 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8902, &(0x7f0000000080)) 14:20:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x432, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) 14:20:27 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8981, 0x0) 14:20:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xffffffac) write$cgroup_subtree(r0, &(0x7f00000002c0)={[{0x0, 'net_prio'}]}, 0xa) 14:20:27 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8971, &(0x7f0000000080)) 14:20:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r0, 0x4) 14:20:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0xc0189436, 0x0) 14:20:27 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, &(0x7f00000001c0)={r0, 0x6, 0x0, 0x0, 0x0}, 0x20) 14:20:27 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x553a222e3000, 0x0, 0x0, 0x0) 14:20:27 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@map, 0xffffffffffffffff, 0x20}, 0x10) 14:20:27 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x22, 0x0, 0x0, 0x0}, 0x20) 14:20:27 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 14:20:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000840), &(0x7f00000009c0)="be26c91a57361f51c97b2e961ef3526b524764445132716b4836e4a1540256f829f7f8cfe459a67a02ce5dd61b1632c82afd95755ebde148b351ec48f480d4e959913aef06d24e6e613e202497b061803ac97672eb0853b4395dfbaa959f9e319cabb472191427a6e4ccb0a92c4cc9a5388cd25e259797b04c5f3ff2f19170a6452b39766218a918f594d70662e0b46ace") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:27 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:27 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8929, &(0x7f0000000080)) 14:20:27 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x55, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x64, 0x8}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:27 executing program 5: bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x2, 0x1, 0x10000, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 14:20:27 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r0, 0x1f, 0x0, 0x0, 0x0}, 0x20) 14:20:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x80, 0x5, 0x3ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x20) 14:20:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000840), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:28 executing program 0: write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) write$cgroup_freezer_state(r0, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) socketpair(0x21, 0x5, 0x3, &(0x7f0000000040)) 14:20:28 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12a00, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 14:20:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4b49, 0x0) 14:20:28 executing program 1: socketpair(0x2, 0x6, 0x0, &(0x7f0000000540)) 14:20:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, 0x0) 14:20:28 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@ethernet={0x0, @remote}, 0xfffffffffffffdb3, &(0x7f0000000180)=[{&(0x7f0000000080)=""/194}], 0x9, &(0x7f0000000240)=""/105, 0x75}, 0x0) 14:20:28 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='.\x00'}, 0x10) 14:20:28 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8"], 0x208}, 0x0) 14:20:28 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8970, &(0x7f0000000080)) 14:20:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f00000001c0)=""/176, 0x1000000, 0xb0, 0x1}, 0x20) 14:20:28 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x3, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x4}, 0x48) 14:20:28 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) 14:20:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 14:20:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582b, 0x0) 14:20:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6628, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xffffffac) 14:20:28 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80087601, &(0x7f0000000040)) 14:20:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40106614, 0x0) 14:20:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, 0x0) 14:20:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b650000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) 14:20:28 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) recvmsg(r1, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/212, 0xd4}, 0x60) 14:20:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, 0x0, 0x1a) 14:20:28 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x394ae70e}, 0x8) 14:20:29 executing program 0: socketpair(0x0, 0xb, 0x0, &(0x7f0000000040)) 14:20:29 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={0xffffffffffffffff, 0x20, 0x0, 0x0, 0x0}, 0x20) 14:20:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 14:20:29 executing program 5: syz_clone(0x8000000, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000840), &(0x7f00000009c0)="be26c91a57361f51c97b2e961ef3526b524764445132716b4836e4a1540256f829f7f8cfe459a67a02ce5dd61b1632c82afd95755ebde148b351ec48f480d4e959913aef06d24e6e613e202497b061803ac97672eb0853b4395dfbaa959f9e319cabb472191427a6e4ccb0a92c") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2149, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x409bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4010a600, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000880)="01980384180ab69be1d8fa") 14:20:29 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x4}, 0x10) 14:20:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4b47, 0x0) 14:20:29 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000440)) 14:20:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x40, 0x4102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xae76, 0x800}, 0x84a0, 0x998, 0x4, 0xb70a4df09a438668, 0x0, 0x0, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x12, 0x0, 0x0, 0x0}, 0x20) 14:20:29 executing program 4: syz_clone(0xa6009300, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 14:20:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20000005}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 14:20:29 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 14:20:29 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 14:20:30 executing program 0: socketpair(0x2, 0x3, 0x0, &(0x7f0000000540)) 14:20:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000580)=""/228, 0x2b, 0xe4, 0x1}, 0x20) 14:20:30 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 14:20:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4182, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:20:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x40, 0x4102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xae76, 0x800}, 0x84a0, 0x998, 0x4, 0xb70a4df09a438668, 0x0, 0x0, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:30 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:30 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x42) 14:20:30 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) 14:20:30 executing program 2: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:30 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)=0x40000) 14:20:30 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8906, 0x0) 14:20:30 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 14:20:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0096616, 0x0) 14:20:30 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:20:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x40, 0x4102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xae76, 0x800}, 0x84a0, 0x998, 0x4, 0xb70a4df09a438668, 0x0, 0x0, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582b, &(0x7f0000000040)) 14:20:31 executing program 5: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x700, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef240800000801930800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:20:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8902, &(0x7f0000000080)) 14:20:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x40, 0x4102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xae76, 0x800}, 0x84a0, 0x998, 0x4, 0xb70a4df09a438668, 0x0, 0x0, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x20000000, 0x2}, 0x20) 14:20:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0xc020660b, 0x0) 14:20:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x80, 0x5, 0x3ff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x0, 0xffffffb7, r0}, 0x38) 14:20:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 14:20:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = syz_clone(0x8000000, &(0x7f0000000400)="9b77828e5ece5767491296d656427586c66f5626c48b4275350907734680e578ca89a3ecdfaa2db9d72bdaeaff6c29bc4a8af85c189c9020fdcd685a1ee0b83da85244df33a9d9", 0x47, 0x0, &(0x7f0000000840), &(0x7f00000009c0)="be26c91a57361f51c97b2e961ef3526b524764445132716b4836e4a1540256f829f7f8cfe459a67a02ce5dd61b1632c82afd95755ebde148b351ec48f480d4e959913aef06d24e6e613e202497b061803ac97672eb0853b4395dfbaa959f9e319cabb472191427a6e4ccb0a92c4cc9a5388cd25e259797b04c5f3ff2f19170a6452b39766218a918f594d70662e0b46ace") perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b650000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, 0x0, 0x1a) 14:20:31 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x101802, 0x0) 14:20:31 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x0, 0x0, 0x405653f0290000, 0x0, 0x0, 0x0) 14:20:31 executing program 2: perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x2, 0x0) 14:20:31 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x22, 0x0, 0x0) [ 204.925880][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 204.925894][ T25] audit: type=1400 audit(1656080431.898:351): avc: denied { write } for pid=13124 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 14:20:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2149, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2149, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x2, 0x1, 0x10000, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 14:20:32 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x1e, 0x0, 0x0, 0x0}, 0x20) 14:20:32 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000000000000b01b44338e400008e548fe282fceec7bf495d5c618332756cbb1bb9ce6d12b9d976d1f33aca41e50a3342bcd67c311f7885a05c3fcf2ae21ffc97ec481e7ca2c3ca4c7b3bf94448f62e111e5a799279000000977ba6ae76ece37bdaac6da997fbc15f0c04000000b99a280667b51fb8750fc3be5ef41f953fedb32aceeada13250626af7e2013d5b12cc916541ccbeb0d4060a4dd89664eaba2f6b4ede0c9e3dc299446d9284ebe0e46eee7bc145ff0a2779c0255000000000000006b8c60f254f23344a80a0aac7b141787bad6b0ba891e6cc85f2f3158f0d200000000000070000000000000000701000040000000afbb30c2946e41ef3167d1f6ed47aa1f52bad114a89dbed741f74a23cd8d915e2dcc36a3e3f63a439887a9d3956d5cadb642ac79fcb0aae3654482188263abd27e9d57cc28032453dc75f3ffffffffab38b7e7719805a454e79802d07ec60c00b0000000000000000100000001"], 0x208}, 0x0) recvmsg(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 14:20:32 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000080)) 14:20:32 executing program 3: sendmsg$inet(0xffffffffffffffff, 0x0, 0x5a5eb1e9d14fee0b) 14:20:32 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x891e, &(0x7f0000000080)) 14:20:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@jmp]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x91, &(0x7f00000003c0)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b650000850000006d0000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x409bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x1, 0x0, 0x40, 0x4102, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xae76}, 0x84a0, 0x0, 0x4, 0x0, 0x0, 0xda6, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x3, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2e, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:32 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = syz_clone(0x8000000, &(0x7f0000000400)="9b77828e5ece5767491296d656427586c66f5626c48b4275350907734680e578ca89a3ecdfaa2db9d72bdaeaff6c29bc4a8af85c189c9020fdcd685a1ee0b83da85244df33a9d9114a042bc5838a4c6df9badcc7", 0x54, 0x0, &(0x7f0000000840), &(0x7f00000009c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b65000085"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2149, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x409bc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x81, 0x4, 0x0, 0x2a, 0x0, 0xbf, 0x78cd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x0, @perf_config_ext={0xf5, 0x1}, 0x10100, 0x7fff, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4ce}, 0x0, 0xe, r3, 0xb) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x4, 0x0, 0x1, 0x0, 0x40, 0x4102, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xae76}, 0x84a0, 0x998, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x48000000, 0x0, 0xff}, 0x0, 0x3, r3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2e, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:32 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x4008c600, 0x0, 0x0, 0x0, 0x0, 0x0) 14:20:32 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x432, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) 14:20:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2149, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) socket$inet6(0xa, 0xa, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f00000004c0)={{r0}, "f3fa4fe60c0fb0e3914511a171316fa3d96b848f1894b7ec77ab9f21efb26ea5b389165ceb64ab368811e3ffbaa9ef13fd6390e127a8ea5561af11303ee33472248e7f336d3996a80f6f1c9b47cd6095bc80629d70a6c8791367de13beba9f9f2a900a85ac7b20115513f48405af994e9678f4642c970351e5e5f73d97e118b73879885d71ae28ab6dbc69fd74ad768abb570c9ae73dfdca93b68eb11789f9b14b95d805227db7834625f668a8c2471a08f57efc1b7208dfdc678616b5f90d8892fd7e0da30bd01dc9516efa540f14d044790e4fd76e8e2462cc4679a96b02d43881203b58801c5d8efeececb2026f6bb57e0e4672c4a53c41f2fc8abeb1193ac2a94de3594ca1bdd37e61c4636bc3cb2af2f608357ff3f0ab860ddbd8a66af7cd9dc0a03307fd144b326c99b7066d8eb531411c30f2278a9b6c8ed5bf38ca805f4d25ba0e06e11780d2511e3737a755314674c1f2fdee5402f0a224c135c0316dc0f3b14b8195f332843ff09128e58dd11a36e3f94eed8a5795aab83704f768796debd6ebe1bf6e3158fa9fa036e642804e3c22f34ac366a2759a120adb798f92e3ee015321da684e27bf931ccccb2879d68bbbceb27f8895629acf3d839f7663af2859de62cfab3c1392e10a4bfb9df76138dd4531b973e743bf9e70fa33e1afcef199a4646e1f0a460aae7463d2efcaadcdda734290bdeb48bf74376c2a70ab2b4ee75a35a1015ff5736edd09117104e81831a85d8dc07580d79fe07a5f0df9acef52e09f84380de9bf2e88c132e4b88441f13bda4c18d5e944e9f4f2f6419401f9a27c13f323acfa15c237e7d0c4296f733eef53c547ca4b81ea978d879b50812c81d1a2e17f9a1391135530d89a9df2500b45026d0c9ed2a52fa300ce9917e8772248a484759c3a9465622717f5cb094f137ed537211e43883883d5a90bd1ff82a95b8af3d3d5be11e2df6a70360ff5815ea71c9aedd02c3a7e4ebc6cf5b9845c3837efc3d59c89e6a07ed6d136ee571454f0e2b4b491335029c2220333177fbeaa8b6ddc27305141344be785ef39bb69d9d6a22e01d699f722386d151d84a2b2ef582bc6d6e3e2b168377e8632652a276a5962157d68e60b2968ea91a46e82f6bb3d787a5611e47a2baff44aa38707fbc7c06ec3e705546269998b956a66d9c09a725838da17c1d5f6eb635dabc0a3486c67224f3515a984d3735122926e7652cd8a901199c52b10e4555a58b18e46896201c4938d06a7ee69bac027a6375d9284124217b83e0a6b5d35108e84ca5905a7156f2e20e12a10549d2ca87642f0c45e1960edb8f36f61c0702b2bda5145c174a749dff5c377e3d217a09cddf702a6cce03d0fcd72101ccca6334a3e10f0685586247a1a6a46421da4763e4ba4da2d0035b051e50d8cd3f160a964848253a2b2f44fd47e9ccb634c0fc57617d227bdbcfab10a7c29962c14ee03968ff3105d80a1d8b45b387db1eeebd6f4e9e28e8306cd290e5190fbc8157463878905a7603cedf7ec619ad182eb26e2d6fa7178a1a02b2f8ece2e0f02d6cd6b7a601733b433dc02152423d7360c6215d409d60f8aa2a10824af2a891761dd85c2267b87a8fb2a175186199ccbf05fb468515e7e986a0186fda076c6d6772beca5e02a794ecd5e5e5beca283f3604f2c522386c4fb82bb0892db1af7ed473b6ef0d1e5b52fb3b2dfa7b7037459f94ef7c67b5c7ec7931789c97a08558b3902f03a3ad0470eebcf4e49ae9f173fc0cc75cd61278712b0f90b9a1655ffaca445bc6b0954f3edacd56dd16f2996c457c709b5368304fdfd3de822a93daead43b780fb850d548665d9959edba964147bd15bf94f135049957065ad50e51f1d30c4bd0de341f6e274e981dea084e1258b3778979f09c351ecaac91e1cb3db06ced2abd10fb6db5177425a31656826313b44e289ff02c9220d5fa3d9f906d43f6d8be9483a34fe79e405b6868d9636b2804c6f2931a97243e573a46e636a93c87ae5a958ef59594559d8c56d02f4d82f6f02c1560bb9ea13c125973972ad777adec4add712c6ce3062a40a3ea8849ecb60985e015f473882ba44c3786ce31359af53a6a954c2e5e0c858aa16cf22f7bf45fa2a96729763cb202ee60788b80b7475d05bf998ba2c2e271f282c7c4165534ad0ed32adfa1951070cc325c4de8b573582f2e4077b4579a4471cdde6212080c5e4545ef288b32067a2e86210ebc630bbae1b99093f7ba5d0b9ea801897273dc2a60308b1bd6ff618253a67eb2c57d385349cfc19f2ab75463b7e48bbe81627169349c3a43674974b284dd75afb953b203fda727d0f604ac4e513fe1276b7c22b4380d32ac8b804460d140716885e4b27e3d4f82ed909ae30dd5f060835ed7fee5dbba4ca68faf9708967949b11f7affcda7d216e3e6e1ef0c43bbb5c4ae384dcf498b7ae215170d16bc8ba69319c00a9e65b847de6f033add296499109af04b864bcf808d25b4fe14e554b8c96f86fea329f0ac0ebe6312a7e89d3a90bac6bc4a1227e7f5cb6afe930b20446732eac8fb9c1be186329cc03e6b47a29393884a52c496e408543d8912e1097e63bac5a83b51f8e2e39969ef0b5ec9601282b86fd307c7dc091522b9edc5301d51743cb827e120d5da4ab1bcc85f6a99081f1ae9a8fead2801df0a8b22e5e288669955ade968ecfd0f8bdd971e0c72880be0f100c7b382a85cd59f5bb299263e43194e887e850631421ab2deec8ebb58bf8ade9839f7b7301f22af659fafb7cbae43bbb529a2eca5aa5b9723bcabacdfcc24332f4df637c2338617b7d949e34c13189510fc63dd2ebac9b357688f155509fe31c4d190f8d2df029d5a75240f9b425d129ea62bdab516118b428a7bc574065c56872ab89abc3abffa757c1b8fc8121858b2f727935454d8d1853f46f5a88e53f8f45edba200651e6e311c65e215e3c92e8d84bd69e3026660b303b44e0b9defbf254ad4c91259105b7cdd7bc744f0c9ca05658291437edbf7a4bc708cf423b6a8d9b6fb1c00776f5b2288fabbb881bd826308c74f14ec59794efcf0c4449a6ea5b3e33f581578418247c5942d71346efcabf28154269017229aea6a9aafa0c6e568e8bf101218317c352282fd7e1e2cb331e209b9466ad677132d742b664d00c514f9b5ed201ce3d059b89a115c891fd6371ce51e08c848225609092b0ab79f4b4948f99689ba4b1e1438a8f08deaeeb0b0021123e66379e5ab20759492ea2a4c086a60687134c5b883e903b58693715c242efcdf7ea32c9f06c927c154665a5627fc829275796be5f841caed88c25e6e975a1723806f68594b5a710ef2a0d414b4c9443de718b75475a8587d076b24de525f3b70c7c0bc22f3656aa6580fb78614279d7a971ed9ca9aafecb4e4371e8fa465c2ec9243143f998dc0ad4f5c1a07d537afbb476919e28c2ff67f380f6016d115dc123bbee2209d968f044ff3eccecfb3ba5d5d3bc2d110502a77fc23ed8f1d4a1984fa6cc9fe44949d1c059d39166c208f21bb256551aa090ffc81ffa2bebe8de6a2fcabfa8aee562b122d4d8a109dfaaf8d6ade5793e4ff3f477e23f627c9de5f3ad8946d19faa2f3f1b008b986eaa7b951330912ef854ae83132d6a5df75bb571612dcdbe9753f85d371aac6a09a1a66bf0304bad46840ac73e46d0b6b428bd9b15d4f2cb34e77572ff786f423302842e9f2830cc2ce6f6a1c515fc372cad0940954089409eee16ddc7363b1abf91ae9f7bb87cb319f0ee532b860586a8d3bcae1cf6ff06f09d1958543483002de7017d341b0b1554bff6fe681188a978c92a182bdadc9dce6407e020d17be8551b5defe6b5c0a6f0e095dc3f519cdf23452550ddc3933678d80dd1eaba2ccc74608561a0c59c7fc773f4055adb32fac2f336f941e149eb45eaacd5496f09556a1edd5fc2b3e3e324082839c568c3a36132f4ed62d81f0e28e4f89eef845196f0078fe71431a00a24c7d90621fdccbeb68e4510fbc0980260cf9664e8e33abcad92b98873306bd25920f50e25c91710dcd8f387f875b3710ed717bb73b83b854b44c22536ba85d40fbe777e50ae637b425414c395d7c78b7f333f3fcf67b9bcbed3b49154e29b117e2e296f46ff4cfd5dae5ea689ad816c20ac6d049a912b680670fde405b3b55e8a0d4cf2e4791a6c75cf5939842aa09fcbfcd0e6287652d3f50d0d0989b75024f754ebd856d31e610e49d26a6cf278efdc468afb5c3ac9fe229c1ccec1ca5f3ce076a45c155ba22712d08f4f85d2099517a47dc9fa1b7caf4d3ceeeb70d27f72ad45519f553f707766c8df011ab1d6ecbd8cf96d390335b09e9cd8cac11f0531142a8c77602d5c426b92a0de8de0d184546e99995ff48f3281be8161c25116b3a3f1cf5f84e20f26a48bfde95232d81ab8bcd117e2fe6b21ef87d1c935ddeff1c001cb8e9eb31ab72230376fae7d8c257e3efe927fdc46d225bee928f32605bfdf2db7526d39c4b117734415bf21a13265778b6189f369559f031a4fd6d45bc7f02a74ac4a6a47e091c30c12b8f87fe946007f4b6b54bb4d6efafef962b5f7cd85c19d95fb25ad7f81ff4da24912f7ee130e31b30e91edddf2bce84e22e8a692e0cb9ab68262c172d1df4b39c5c0d150dafacff890985cd00f144ec36b91e75e550ea3e6da83c4f479785419c64c704dd6b5257271d028c592c3b7c6b7da57c6cc536938bed6e359f5c4edb58d54557e0921fc77328df9d0a3f1f441a4295f99f84974f37591ee5126b7b8c2420c3c5b9d4fc618ce8e38794482eac09d3616fc22e0f59680a6a1cc54e47434a155ec17d5b8a0bb12ef490bbfb2174ba14f88b0ed58451f904b9bfc616bcee5e98b29658f7692a036a8f67144d1fbb7462af4fb525a85b12aa103452e928b13c58a46699f07e6e76586ef922553e842cc3ecc8ea8bd7ed0f9cecffea282bd93d029407601c4016dfcb5e16b523591a284e524751d3d7d78b25a8f4a8c516371fca354c63f4ecf3447aecbc7e2cfc351ec7a1f5b5d26edb472aa05d19f694ed2ee0c30b25a25f5cb5c2d56ba028681ded0167167a2c28d7b458f31360e652d23b82fca330d574ec67388d406f51192af7fed9136f4ad7e12d2d4b40ca132417a14adbe773d76126e0ff2413c8d14a32895c17eeaa0eeef1b583f069f41248405717423d3891b4e2f9ab65640692caf3653a7860042623000e96e32b59e5f90a52c72d4dd1f86f1a5141f7e1cbbe3cc9136ff3ecc565ed5178245ce9afd41bb4eea1e44acb7247168af95c3f3cd005cc0f0b47b066b6a96849a7f3d12c25dc397c058634acda64ffdad3fa1f4bd8cabb0bad6e81fa4b9166ea7c166f9df964b50c4261789eca89e076b1bb02f4ea7a13a46576b44f1b3fa1a9f8e8f5c8aeee17c496b64655bdc7158082ef773cc9e62b087e5d9b574f8baf0f109acd7ba4f29cbf0c8058476d4759c0d336d24f3f7b4500b5ec2abffa80dd02934faa6e5414b5870513d6b30c4a60eaa2fa5c421eff6ac0bfb0c1486e05cecf1d4e7bbb4e22e6974060f549fc66160ec80059962f8ea3be0c83bf026f3540c057e0f4b0456e13d8aa8258f223fd9628ee33fd5a692a135ce8c0bcc26937a67370370a4d474a60e9d725bdc1c1c77a4a5bbbf121de7015885001b678dacbaf20e516217d84134fe15ddcc51be0c26a973e48bfcc5daa865e6490950a312c6df49483c02608c71943ce33b789536594d169d33abcbdb4e917ab8216ae3715ac9a86f61dfc1d9ba66c48cc10a4cd79a60a08f"}) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x38, 0x0, 0x2, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_ID={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000810}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 14:20:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b0000) socket$inet6(0xa, 0xa, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f00000004c0)={{}, "f3fa4fe60c0fb0e3914511a171316fa3d96b848f1894b7ec77ab9f21efb26ea5b389165ceb64ab368811e3ffbaa9ef13fd6390e127a8ea5561af11303ee33472248e7f336d3996a80f6f1c9b47cd6095bc80629d70a6c8791367de13beba9f9f2a900a85ac7b20115513f48405af994e9678f4642c970351e5e5f73d97e118b73879885d71ae28ab6dbc69fd74ad768abb570c9ae73dfdca93b68eb11789f9b14b95d805227db7834625f668a8c2471a08f57efc1b7208dfdc678616b5f90d8892fd7e0da30bd01dc9516efa540f14d044790e4fd76e8e2462cc4679a96b02d43881203b58801c5d8efeececb2026f6bb57e0e4672c4a53c41f2fc8abeb1193ac2a94de3594ca1bdd37e61c4636bc3cb2af2f608357ff3f0ab860ddbd8a66af7cd9dc0a03307fd144b326c99b7066d8eb531411c30f2278a9b6c8ed5bf38ca805f4d25ba0e06e11780d2511e3737a755314674c1f2fdee5402f0a224c135c0316dc0f3b14b8195f332843ff09128e58dd11a36e3f94eed8a5795aab83704f768796debd6ebe1bf6e3158fa9fa036e642804e3c22f34ac366a2759a120adb798f92e3ee015321da684e27bf931ccccb2879d68bbbceb27f8895629acf3d839f7663af2859de62cfab3c1392e10a4bfb9df76138dd4531b973e743bf9e70fa33e1afcef199a4646e1f0a460aae7463d2efcaadcdda734290bdeb48bf74376c2a70ab2b4ee75a35a1015ff5736edd09117104e81831a85d8dc07580d79fe07a5f0df9acef52e09f84380de9bf2e88c132e4b88441f13bda4c18d5e944e9f4f2f6419401f9a27c13f323acfa15c237e7d0c4296f733eef53c547ca4b81ea978d879b50812c81d1a2e17f9a1391135530d89a9df2500b45026d0c9ed2a52fa300ce9917e8772248a484759c3a9465622717f5cb094f137ed537211e43883883d5a90bd1ff82a95b8af3d3d5be11e2df6a70360ff5815ea71c9aedd02c3a7e4ebc6cf5b9845c3837efc3d59c89e6a07ed6d136ee571454f0e2b4b491335029c2220333177fbeaa8b6ddc27305141344be785ef39bb69d9d6a22e01d699f722386d151d84a2b2ef582bc6d6e3e2b168377e8632652a276a5962157d68e60b2968ea91a46e82f6bb3d787a5611e47a2baff44aa38707fbc7c06ec3e705546269998b956a66d9c09a725838da17c1d5f6eb635dabc0a3486c67224f3515a984d3735122926e7652cd8a901199c52b10e4555a58b18e46896201c4938d06a7ee69bac027a6375d9284124217b83e0a6b5d35108e84ca5905a7156f2e20e12a10549d2ca87642f0c45e1960edb8f36f61c0702b2bda5145c174a749dff5c377e3d217a09cddf702a6cce03d0fcd72101ccca6334a3e10f0685586247a1a6a46421da4763e4ba4da2d0035b051e50d8cd3f160a964848253a2b2f44fd47e9ccb634c0fc57617d227bdbcfab10a7c29962c14ee03968ff3105d80a1d8b45b387db1eeebd6f4e9e28e8306cd290e5190fbc8157463878905a7603cedf7ec619ad182eb26e2d6fa7178a1a02b2f8ece2e0f02d6cd6b7a601733b433dc02152423d7360c6215d409d60f8aa2a10824af2a891761dd85c2267b87a8fb2a175186199ccbf05fb468515e7e986a0186fda076c6d6772beca5e02a794ecd5e5e5beca283f3604f2c522386c4fb82bb0892db1af7ed473b6ef0d1e5b52fb3b2dfa7b7037459f94ef7c67b5c7ec7931789c97a08558b3902f03a3ad0470eebcf4e49ae9f173fc0cc75cd61278712b0f90b9a1655ffaca445bc6b0954f3edacd56dd16f2996c457c709b5368304fdfd3de822a93daead43b780fb850d548665d9959edba964147bd15bf94f135049957065ad50e51f1d30c4bd0de341f6e274e981dea084e1258b3778979f09c351ecaac91e1cb3db06ced2abd10fb6db5177425a31656826313b44e289ff02c9220d5fa3d9f906d43f6d8be9483a34fe79e405b6868d9636b2804c6f2931a97243e573a46e636a93c87ae5a958ef59594559d8c56d02f4d82f6f02c1560bb9ea13c125973972ad777adec4add712c6ce3062a40a3ea8849ecb60985e015f473882ba44c3786ce31359af53a6a954c2e5e0c858aa16cf22f7bf45fa2a96729763cb202ee60788b80b7475d05bf998ba2c2e271f282c7c4165534ad0ed32adfa1951070cc325c4de8b573582f2e4077b4579a4471cdde6212080c5e4545ef288b32067a2e86210ebc630bbae1b99093f7ba5d0b9ea801897273dc2a60308b1bd6ff618253a67eb2c57d385349cfc19f2ab75463b7e48bbe81627169349c3a43674974b284dd75afb953b203fda727d0f604ac4e513fe1276b7c22b4380d32ac8b804460d140716885e4b27e3d4f82ed909ae30dd5f060835ed7fee5dbba4ca68faf9708967949b11f7affcda7d216e3e6e1ef0c43bbb5c4ae384dcf498b7ae215170d16bc8ba69319c00a9e65b847de6f033add296499109af04b864bcf808d25b4fe14e554b8c96f86fea329f0ac0ebe6312a7e89d3a90bac6bc4a1227e7f5cb6afe930b20446732eac8fb9c1be186329cc03e6b47a29393884a52c496e408543d8912e1097e63bac5a83b51f8e2e39969ef0b5ec9601282b86fd307c7dc091522b9edc5301d51743cb827e120d5da4ab1bcc85f6a99081f1ae9a8fead2801df0a8b22e5e288669955ade968ecfd0f8bdd971e0c72880be0f100c7b382a85cd59f5bb299263e43194e887e850631421ab2deec8ebb58bf8ade9839f7b7301f22af659fafb7cbae43bbb529a2eca5aa5b9723bcabacdfcc24332f4df637c2338617b7d949e34c13189510fc63dd2ebac9b357688f155509fe31c4d190f8d2df029d5a75240f9b425d129ea62bdab516118b428a7bc574065c56872ab89abc3abffa757c1b8fc8121858b2f727935454d8d1853f46f5a88e53f8f45edba200651e6e311c65e215e3c92e8d84bd69e3026660b303b44e0b9defbf254ad4c91259105b7cdd7bc744f0c9ca05658291437edbf7a4bc708cf423b6a8d9b6fb1c00776f5b2288fabbb881bd826308c74f14ec59794efcf0c4449a6ea5b3e33f581578418247c5942d71346efcabf28154269017229aea6a9aafa0c6e568e8bf101218317c352282fd7e1e2cb331e209b9466ad677132d742b664d00c514f9b5ed201ce3d059b89a115c891fd6371ce51e08c848225609092b0ab79f4b4948f99689ba4b1e1438a8f08deaeeb0b0021123e66379e5ab20759492ea2a4c086a60687134c5b883e903b58693715c242efcdf7ea32c9f06c927c154665a5627fc829275796be5f841caed88c25e6e975a1723806f68594b5a710ef2a0d414b4c9443de718b75475a8587d076b24de525f3b70c7c0bc22f3656aa6580fb78614279d7a971ed9ca9aafecb4e4371e8fa465c2ec9243143f998dc0ad4f5c1a07d537afbb476919e28c2ff67f380f6016d115dc123bbee2209d968f044ff3eccecfb3ba5d5d3bc2d110502a77fc23ed8f1d4a1984fa6cc9fe44949d1c059d39166c208f21bb256551aa090ffc81ffa2bebe8de6a2fcabfa8aee562b122d4d8a109dfaaf8d6ade5793e4ff3f477e23f627c9de5f3ad8946d19faa2f3f1b008b986eaa7b951330912ef854ae83132d6a5df75bb571612dcdbe9753f85d371aac6a09a1a66bf0304bad46840ac73e46d0b6b428bd9b15d4f2cb34e77572ff786f423302842e9f2830cc2ce6f6a1c515fc372cad0940954089409eee16ddc7363b1abf91ae9f7bb87cb319f0ee532b860586a8d3bcae1cf6ff06f09d1958543483002de7017d341b0b1554bff6fe681188a978c92a182bdadc9dce6407e020d17be8551b5defe6b5c0a6f0e095dc3f519cdf23452550ddc3933678d80dd1eaba2ccc74608561a0c59c7fc773f4055adb32fac2f336f941e149eb45eaacd5496f09556a1edd5fc2b3e3e324082839c568c3a36132f4ed62d81f0e28e4f89eef845196f0078fe71431a00a24c7d90621fdccbeb68e4510fbc0980260cf9664e8e33abcad92b98873306bd25920f50e25c91710dcd8f387f875b3710ed717bb73b83b854b44c22536ba85d40fbe777e50ae637b425414c395d7c78b7f333f3fcf67b9bcbed3b49154e29b117e2e296f46ff4cfd5dae5ea689ad816c20ac6d049a912b680670fde405b3b55e8a0d4cf2e4791a6c75cf5939842aa09fcbfcd0e6287652d3f50d0d0989b75024f754ebd856d31e610e49d26a6cf278efdc468afb5c3ac9fe229c1ccec1ca5f3ce076a45c155ba22712d08f4f85d2099517a47dc9fa1b7caf4d3ceeeb70d27f72ad45519f553f707766c8df011ab1d6ecbd8cf96d390335b09e9cd8cac11f0531142a8c77602d5c426b92a0de8de0d184546e99995ff48f3281be8161c25116b3a3f1cf5f84e20f26a48bfde95232d81ab8bcd117e2fe6b21ef87d1c935ddeff1c001cb8e9eb31ab72230376fae7d8c257e3efe927fdc46d225bee928f32605bfdf2db7526d39c4b117734415bf21a13265778b6189f369559f031a4fd6d45bc7f02a74ac4a6a47e091c30c12b8f87fe946007f4b6b54bb4d6efafef962b5f7cd85c19d95fb25ad7f81ff4da24912f7ee130e31b30e91edddf2bce84e22e8a692e0cb9ab68262c172d1df4b39c5c0d150dafacff890985cd00f144ec36b91e75e550ea3e6da83c4f479785419c64c704dd6b5257271d028c592c3b7c6b7da57c6cc536938bed6e359f5c4edb58d54557e0921fc77328df9d0a3f1f441a4295f99f84974f37591ee5126b7b8c2420c3c5b9d4fc618ce8e38794482eac09d3616fc22e0f59680a6a1cc54e47434a155ec17d5b8a0bb12ef490bbfb2174ba14f88b0ed58451f904b9bfc616bcee5e98b29658f7692a036a8f67144d1fbb7462af4fb525a85b12aa103452e928b13c58a46699f07e6e76586ef922553e842cc3ecc8ea8bd7ed0f9cecffea282bd93d029407601c4016dfcb5e16b523591a284e524751d3d7d78b25a8f4a8c516371fca354c63f4ecf3447aecbc7e2cfc351ec7a1f5b5d26edb472aa05d19f694ed2ee0c30b25a25f5cb5c2d56ba028681ded0167167a2c28d7b458f31360e652d23b82fca330d574ec67388d406f51192af7fed9136f4ad7e12d2d4b40ca132417a14adbe773d76126e0ff2413c8d14a32895c17eeaa0eeef1b583f069f41248405717423d3891b4e2f9ab65640692caf3653a7860042623000e96e32b59e5f90a52c72d4dd1f86f1a5141f7e1cbbe3cc9136ff3ecc565ed5178245ce9afd41bb4eea1e44acb7247168af95c3f3cd005cc0f0b47b066b6a96849a7f3d12c25dc397c058634acda64ffdad3fa1f4bd8cabb0bad6e81fa4b9166ea7c166f9df964b50c4261789eca89e076b1bb02f4ea7a13a46576b44f1b3fa1a9f8e8f5c8aeee17c496b64655bdc7158082ef773cc9e62b087e5d9b574f8baf0f109acd7ba4f29cbf0c8058476d4759c0d336d24f3f7b4500b5ec2abffa80dd02934faa6e5414b5870513d6b30c4a60eaa2fa5c421eff6ac0bfb0c1486e05cecf1d4e7bbb4e22e6974060f549fc66160ec80059962f8ea3be0c83bf026f3540c057e0f4b0456e13d8aa8258f223fd9628ee33fd5a692a135ce8c0bcc26937a67370370a4d474a60e9d725bdc1c1c77a4a5bbbf121de7015885001b678dacbaf20e516217d84134fe15ddcc51be0c26a973e48bfcc5daa865e6490950a312c6df49483c02608c71943ce33b789536594d169d33abcbdb4e917ab8216ae3715ac9a86f61dfc1d9ba66c48cc10a4cd79a60a08f"}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 14:20:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2149, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x58020000000000) 14:20:32 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xa0}, 0x700) 14:20:32 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x4b47, 0x0) 14:20:32 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8907, 0x0) 14:20:32 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8949, &(0x7f0000000080)) 14:20:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000001340)="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", 0x411}], 0x1) 14:20:33 executing program 2: socketpair(0x23, 0x0, 0x0, &(0x7f0000007640)) 14:20:33 executing program 5: r0 = socket(0x22, 0x2, 0x3) sendmsg$kcm(r0, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002000)=[{0x10}], 0x10}, 0x48000) [ 206.215859][ T25] audit: type=1400 audit(1656080433.188:352): avc: denied { write } for pid=13205 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 14:20:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000004ad0a37f00000008000300", @ANYRES32=0x0, @ANYBLOB="0a0006"], 0x28}}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4d020000", @ANYRES16=r1, @ANYBLOB="010400fcffffffffffff1100000008000300", @ANYRES32=r3], 0x30}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) 14:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="7317f681b818c57147b408"], 0x14}}, 0x0) 14:20:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0xa) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=ANY=[@ANYBLOB="4400000024001d0f00"/20, @ANYRES32=r3, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001f00)=@delchain={0x64, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xffff}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x34, 0x2, [@TCA_CGROUP_ACT={0x30, 0x1, [@m_xt={0x2c, 0x20, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x64}}, 0x0) 14:20:33 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000007640)) syz_genetlink_get_family_id$smc(&(0x7f0000007600), 0xffffffffffffffff) 14:20:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x24, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}]}, 0x24}}, 0x0) 14:20:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:20:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) 14:20:33 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b0000) socket$inet6(0xa, 0xa, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f00000004c0)={{}, "f3fa4fe60c0fb0e3914511a171316fa3d96b848f1894b7ec77ab9f21efb26ea5b389165ceb64ab368811e3ffbaa9ef13fd6390e127a8ea5561af11303ee33472248e7f336d3996a80f6f1c9b47cd6095bc80629d70a6c8791367de13beba9f9f2a900a85ac7b20115513f48405af994e9678f4642c970351e5e5f73d97e118b73879885d71ae28ab6dbc69fd74ad768abb570c9ae73dfdca93b68eb11789f9b14b95d805227db7834625f668a8c2471a08f57efc1b7208dfdc678616b5f90d8892fd7e0da30bd01dc9516efa540f14d044790e4fd76e8e2462cc4679a96b02d43881203b58801c5d8efeececb2026f6bb57e0e4672c4a53c41f2fc8abeb1193ac2a94de3594ca1bdd37e61c4636bc3cb2af2f608357ff3f0ab860ddbd8a66af7cd9dc0a03307fd144b326c99b7066d8eb531411c30f2278a9b6c8ed5bf38ca805f4d25ba0e06e11780d2511e3737a755314674c1f2fdee5402f0a224c135c0316dc0f3b14b8195f332843ff09128e58dd11a36e3f94eed8a5795aab83704f768796debd6ebe1bf6e3158fa9fa036e642804e3c22f34ac366a2759a120adb798f92e3ee015321da684e27bf931ccccb2879d68bbbceb27f8895629acf3d839f7663af2859de62cfab3c1392e10a4bfb9df76138dd4531b973e743bf9e70fa33e1afcef199a4646e1f0a460aae7463d2efcaadcdda734290bdeb48bf74376c2a70ab2b4ee75a35a1015ff5736edd09117104e81831a85d8dc07580d79fe07a5f0df9acef52e09f84380de9bf2e88c132e4b88441f13bda4c18d5e944e9f4f2f6419401f9a27c13f323acfa15c237e7d0c4296f733eef53c547ca4b81ea978d879b50812c81d1a2e17f9a1391135530d89a9df2500b45026d0c9ed2a52fa300ce9917e8772248a484759c3a9465622717f5cb094f137ed537211e43883883d5a90bd1ff82a95b8af3d3d5be11e2df6a70360ff5815ea71c9aedd02c3a7e4ebc6cf5b9845c3837efc3d59c89e6a07ed6d136ee571454f0e2b4b491335029c2220333177fbeaa8b6ddc27305141344be785ef39bb69d9d6a22e01d699f722386d151d84a2b2ef582bc6d6e3e2b168377e8632652a276a5962157d68e60b2968ea91a46e82f6bb3d787a5611e47a2baff44aa38707fbc7c06ec3e705546269998b956a66d9c09a725838da17c1d5f6eb635dabc0a3486c67224f3515a984d3735122926e7652cd8a901199c52b10e4555a58b18e46896201c4938d06a7ee69bac027a6375d9284124217b83e0a6b5d35108e84ca5905a7156f2e20e12a10549d2ca87642f0c45e1960edb8f36f61c0702b2bda5145c174a749dff5c377e3d217a09cddf702a6cce03d0fcd72101ccca6334a3e10f0685586247a1a6a46421da4763e4ba4da2d0035b051e50d8cd3f160a964848253a2b2f44fd47e9ccb634c0fc57617d227bdbcfab10a7c29962c14ee03968ff3105d80a1d8b45b387db1eeebd6f4e9e28e8306cd290e5190fbc8157463878905a7603cedf7ec619ad182eb26e2d6fa7178a1a02b2f8ece2e0f02d6cd6b7a601733b433dc02152423d7360c6215d409d60f8aa2a10824af2a891761dd85c2267b87a8fb2a175186199ccbf05fb468515e7e986a0186fda076c6d6772beca5e02a794ecd5e5e5beca283f3604f2c522386c4fb82bb0892db1af7ed473b6ef0d1e5b52fb3b2dfa7b7037459f94ef7c67b5c7ec7931789c97a08558b3902f03a3ad0470eebcf4e49ae9f173fc0cc75cd61278712b0f90b9a1655ffaca445bc6b0954f3edacd56dd16f2996c457c709b5368304fdfd3de822a93daead43b780fb850d548665d9959edba964147bd15bf94f135049957065ad50e51f1d30c4bd0de341f6e274e981dea084e1258b3778979f09c351ecaac91e1cb3db06ced2abd10fb6db5177425a31656826313b44e289ff02c9220d5fa3d9f906d43f6d8be9483a34fe79e405b6868d9636b2804c6f2931a97243e573a46e636a93c87ae5a958ef59594559d8c56d02f4d82f6f02c1560bb9ea13c125973972ad777adec4add712c6ce3062a40a3ea8849ecb60985e015f473882ba44c3786ce31359af53a6a954c2e5e0c858aa16cf22f7bf45fa2a96729763cb202ee60788b80b7475d05bf998ba2c2e271f282c7c4165534ad0ed32adfa1951070cc325c4de8b573582f2e4077b4579a4471cdde6212080c5e4545ef288b32067a2e86210ebc630bbae1b99093f7ba5d0b9ea801897273dc2a60308b1bd6ff618253a67eb2c57d385349cfc19f2ab75463b7e48bbe81627169349c3a43674974b284dd75afb953b203fda727d0f604ac4e513fe1276b7c22b4380d32ac8b804460d140716885e4b27e3d4f82ed909ae30dd5f060835ed7fee5dbba4ca68faf9708967949b11f7affcda7d216e3e6e1ef0c43bbb5c4ae384dcf498b7ae215170d16bc8ba69319c00a9e65b847de6f033add296499109af04b864bcf808d25b4fe14e554b8c96f86fea329f0ac0ebe6312a7e89d3a90bac6bc4a1227e7f5cb6afe930b20446732eac8fb9c1be186329cc03e6b47a29393884a52c496e408543d8912e1097e63bac5a83b51f8e2e39969ef0b5ec9601282b86fd307c7dc091522b9edc5301d51743cb827e120d5da4ab1bcc85f6a99081f1ae9a8fead2801df0a8b22e5e288669955ade968ecfd0f8bdd971e0c72880be0f100c7b382a85cd59f5bb299263e43194e887e850631421ab2deec8ebb58bf8ade9839f7b7301f22af659fafb7cbae43bbb529a2eca5aa5b9723bcabacdfcc24332f4df637c2338617b7d949e34c13189510fc63dd2ebac9b357688f155509fe31c4d190f8d2df029d5a75240f9b425d129ea62bdab516118b428a7bc574065c56872ab89abc3abffa757c1b8fc8121858b2f727935454d8d1853f46f5a88e53f8f45edba200651e6e311c65e215e3c92e8d84bd69e3026660b303b44e0b9defbf254ad4c91259105b7cdd7bc744f0c9ca05658291437edbf7a4bc708cf423b6a8d9b6fb1c00776f5b2288fabbb881bd826308c74f14ec59794efcf0c4449a6ea5b3e33f581578418247c5942d71346efcabf28154269017229aea6a9aafa0c6e568e8bf101218317c352282fd7e1e2cb331e209b9466ad677132d742b664d00c514f9b5ed201ce3d059b89a115c891fd6371ce51e08c848225609092b0ab79f4b4948f99689ba4b1e1438a8f08deaeeb0b0021123e66379e5ab20759492ea2a4c086a60687134c5b883e903b58693715c242efcdf7ea32c9f06c927c154665a5627fc829275796be5f841caed88c25e6e975a1723806f68594b5a710ef2a0d414b4c9443de718b75475a8587d076b24de525f3b70c7c0bc22f3656aa6580fb78614279d7a971ed9ca9aafecb4e4371e8fa465c2ec9243143f998dc0ad4f5c1a07d537afbb476919e28c2ff67f380f6016d115dc123bbee2209d968f044ff3eccecfb3ba5d5d3bc2d110502a77fc23ed8f1d4a1984fa6cc9fe44949d1c059d39166c208f21bb256551aa090ffc81ffa2bebe8de6a2fcabfa8aee562b122d4d8a109dfaaf8d6ade5793e4ff3f477e23f627c9de5f3ad8946d19faa2f3f1b008b986eaa7b951330912ef854ae83132d6a5df75bb571612dcdbe9753f85d371aac6a09a1a66bf0304bad46840ac73e46d0b6b428bd9b15d4f2cb34e77572ff786f423302842e9f2830cc2ce6f6a1c515fc372cad0940954089409eee16ddc7363b1abf91ae9f7bb87cb319f0ee532b860586a8d3bcae1cf6ff06f09d1958543483002de7017d341b0b1554bff6fe681188a978c92a182bdadc9dce6407e020d17be8551b5defe6b5c0a6f0e095dc3f519cdf23452550ddc3933678d80dd1eaba2ccc74608561a0c59c7fc773f4055adb32fac2f336f941e149eb45eaacd5496f09556a1edd5fc2b3e3e324082839c568c3a36132f4ed62d81f0e28e4f89eef845196f0078fe71431a00a24c7d90621fdccbeb68e4510fbc0980260cf9664e8e33abcad92b98873306bd25920f50e25c91710dcd8f387f875b3710ed717bb73b83b854b44c22536ba85d40fbe777e50ae637b425414c395d7c78b7f333f3fcf67b9bcbed3b49154e29b117e2e296f46ff4cfd5dae5ea689ad816c20ac6d049a912b680670fde405b3b55e8a0d4cf2e4791a6c75cf5939842aa09fcbfcd0e6287652d3f50d0d0989b75024f754ebd856d31e610e49d26a6cf278efdc468afb5c3ac9fe229c1ccec1ca5f3ce076a45c155ba22712d08f4f85d2099517a47dc9fa1b7caf4d3ceeeb70d27f72ad45519f553f707766c8df011ab1d6ecbd8cf96d390335b09e9cd8cac11f0531142a8c77602d5c426b92a0de8de0d184546e99995ff48f3281be8161c25116b3a3f1cf5f84e20f26a48bfde95232d81ab8bcd117e2fe6b21ef87d1c935ddeff1c001cb8e9eb31ab72230376fae7d8c257e3efe927fdc46d225bee928f32605bfdf2db7526d39c4b117734415bf21a13265778b6189f369559f031a4fd6d45bc7f02a74ac4a6a47e091c30c12b8f87fe946007f4b6b54bb4d6efafef962b5f7cd85c19d95fb25ad7f81ff4da24912f7ee130e31b30e91edddf2bce84e22e8a692e0cb9ab68262c172d1df4b39c5c0d150dafacff890985cd00f144ec36b91e75e550ea3e6da83c4f479785419c64c704dd6b5257271d028c592c3b7c6b7da57c6cc536938bed6e359f5c4edb58d54557e0921fc77328df9d0a3f1f441a4295f99f84974f37591ee5126b7b8c2420c3c5b9d4fc618ce8e38794482eac09d3616fc22e0f59680a6a1cc54e47434a155ec17d5b8a0bb12ef490bbfb2174ba14f88b0ed58451f904b9bfc616bcee5e98b29658f7692a036a8f67144d1fbb7462af4fb525a85b12aa103452e928b13c58a46699f07e6e76586ef922553e842cc3ecc8ea8bd7ed0f9cecffea282bd93d029407601c4016dfcb5e16b523591a284e524751d3d7d78b25a8f4a8c516371fca354c63f4ecf3447aecbc7e2cfc351ec7a1f5b5d26edb472aa05d19f694ed2ee0c30b25a25f5cb5c2d56ba028681ded0167167a2c28d7b458f31360e652d23b82fca330d574ec67388d406f51192af7fed9136f4ad7e12d2d4b40ca132417a14adbe773d76126e0ff2413c8d14a32895c17eeaa0eeef1b583f069f41248405717423d3891b4e2f9ab65640692caf3653a7860042623000e96e32b59e5f90a52c72d4dd1f86f1a5141f7e1cbbe3cc9136ff3ecc565ed5178245ce9afd41bb4eea1e44acb7247168af95c3f3cd005cc0f0b47b066b6a96849a7f3d12c25dc397c058634acda64ffdad3fa1f4bd8cabb0bad6e81fa4b9166ea7c166f9df964b50c4261789eca89e076b1bb02f4ea7a13a46576b44f1b3fa1a9f8e8f5c8aeee17c496b64655bdc7158082ef773cc9e62b087e5d9b574f8baf0f109acd7ba4f29cbf0c8058476d4759c0d336d24f3f7b4500b5ec2abffa80dd02934faa6e5414b5870513d6b30c4a60eaa2fa5c421eff6ac0bfb0c1486e05cecf1d4e7bbb4e22e6974060f549fc66160ec80059962f8ea3be0c83bf026f3540c057e0f4b0456e13d8aa8258f223fd9628ee33fd5a692a135ce8c0bcc26937a67370370a4d474a60e9d725bdc1c1c77a4a5bbbf121de7015885001b678dacbaf20e516217d84134fe15ddcc51be0c26a973e48bfcc5daa865e6490950a312c6df49483c02608c71943ce33b789536594d169d33abcbdb4e917ab8216ae3715ac9a86f61dfc1d9ba66c48cc10a4cd79a60a08f"}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 14:20:33 executing program 0: sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, 0x0, 0x0) 14:20:33 executing program 5: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) [ 206.451293][T13217] netlink: 549 bytes leftover after parsing attributes in process `syz-executor.4'. 14:20:33 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x64f4b5f1d18c9b7a, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b05d25a80648c6394f90224fc600e0002400a000009053582c137153e371448018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:20:33 executing program 3: r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f0000001bc0)='Q', 0x1}], 0x1}}], 0x1, 0x0) 14:20:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x805}, 0x0) 14:20:33 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@local, @random="a621a679036a", @val, {@ipv4}}, 0x0) 14:20:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x805}, 0x0) 14:20:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000007340)={&(0x7f0000006700)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000007300)={&(0x7f0000006740)={0x4bc, 0x1, 0x5, 0x301, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e56d76549bc9719bb5aa9b6595dc17bcfb52ed62192b1dfbba392842b1ee0ae9", "d55af2ac5288e5edc68abf9665c6ccafe0ef903624062bcd6d1532d5ae6ac6cc"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "90f642a2c201232a830d1ea428d44b0ddca94427046560f8b35e48a23725a2b5", "e28f590ff9bff3de472ce7f03ca98af707c693d74b49ef2f8b86e8d159e45587"}}}]}, 0x4bc}}, 0x0) 14:20:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) [ 206.697069][T13246] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:20:34 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) r4 = socket$inet6(0xa, 0xa, 0x6) ioctl$BTRFS_IOC_SUBVOL_CREATE(r4, 0x5000940e, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r3}, 0x8) sendmsg$IPCTNL_MSG_EXP_NEW(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0xcc, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_EXPECT_MASK={0x4c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @private=0xa010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'irc-20000\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x81}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_TUPLE={0x20, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x91}}]}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000810}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 14:20:34 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x64f4b5f1d18c9b7a, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b05d25a80648c6394f90324fc600e0002400a000009053582c137153e371448018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:20:34 executing program 2: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 14:20:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x805}, 0x0) 14:20:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x805}, 0x0) 14:20:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x805}, 0x0) 14:20:34 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:34 executing program 2: r0 = socket(0x22, 0x2, 0x3) sendmsg$kcm(r0, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) [ 207.485009][T13254] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 207.487176][ T25] audit: type=1400 audit(1656080434.458:353): avc: denied { create } for pid=13257 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 14:20:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001140)={0x20, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_MASK={0x4}]}, 0x20}}, 0x0) 14:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}]}, 0x1c}}, 0x0) 14:20:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x805}, 0x0) 14:20:34 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 207.492561][ T25] audit: type=1400 audit(1656080434.468:354): avc: denied { write } for pid=13257 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 207.494594][ T25] audit: type=1400 audit(1656080434.468:355): avc: denied { read } for pid=13257 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 207.523489][T13255] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 207.537467][T13262] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 207.603309][T13273] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:20:35 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) 14:20:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) 14:20:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x40}}}, 0xb8}}, 0x0) 14:20:35 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) bind(r0, 0x0, 0x0) 14:20:35 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:35 executing program 4: getsockname$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f00000002c0)=0xfeeb) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) 14:20:35 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:35 executing program 0: unshare(0x0) mmap(&(0x7f000071a000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@remote, 0x78, r2}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000500)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote, 0x0, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f5, &(0x7f0000002900)={'syztnl1\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, 0x0, 0x0, 0x0, 0x80000000}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000004ccf9cce40b66ac8e5f7700f829000000ebfb10ac9392e743845b85cf982e65cda9cb6db7d5e192abb0dd52"], 0x18}}], 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) openat$cgroup_ro(r4, &(0x7f00000003c0)='memory.current\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x0, 0x3, 0x7, @private1, @mcast1, 0x8, 0x10, 0x0, 0x7}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000002a00200026bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0600faff0100060083000020"], 0x24}, 0x1, 0x0, 0x0, 0x40000c4}, 0x2) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(r5, 0x29, 0x12, &(0x7f0000000340)={@private0}, 0x14) ioctl$BTRFS_IOC_QGROUP_LIMIT(r5, 0x8030942b, &(0x7f0000000080)={0x80000000, {0x0, 0x400, 0x0, 0x1, 0x2}}) 14:20:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000580), 0x7, r0}, 0x38) 14:20:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) 14:20:35 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 208.336759][ T25] audit: type=1400 audit(1656080435.308:356): avc: denied { bind } for pid=13284 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 208.355095][T13290] ieee802154 phy0 wpan0: encryption failed: -22 14:20:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) [ 208.361701][T13287] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 208.472566][T13292] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 208.502404][T13297] ieee802154 phy0 wpan0: encryption failed: -22 14:20:35 executing program 5: syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000e00)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x18, 0x2, 0x1, 0x0, 0x0, 0x0, {0xc}, [@CTA_SEQ_ADJ_ORIG={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20002000}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001000)={0x3c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040}, 0x0) 14:20:35 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x3) 14:20:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000007340)={&(0x7f0000006700)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000007300)={&(0x7f0000006740)={0x14}, 0x14}}, 0x0) 14:20:35 executing program 4: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) 14:20:35 executing program 2: ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000007640)) 14:20:35 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:35 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000300)={@random="d284a7cc2f11", @empty, @val, {@ipv4}}, 0x0) [ 208.690819][T13304] ieee802154 phy0 wpan0: encryption failed: -22 [ 208.801796][T13321] ieee802154 phy0 wpan0: encryption failed: -22 14:20:35 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) accept$phonet_pipe(r0, 0x0, 0x0) 14:20:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$TCXONC(r1, 0x540a, 0x2) 14:20:35 executing program 5: sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, 0x0, 0x0) socket(0x2, 0x2, 0x7) 14:20:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)="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", 0x841}], 0x1}, 0x0) 14:20:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000001500)={0x28, 0xe, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 14:20:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, &(0x7f0000000040)=""/184, 0x32, 0xb8, 0x1}, 0x20) 14:20:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x3) 14:20:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x4f22}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) dup3(r2, r0, 0x0) 14:20:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) dup3(0xffffffffffffffff, r0, 0x0) 14:20:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x5}]}}, &(0x7f0000000080)=""/137, 0x26, 0x89, 0x1}, 0x20) 14:20:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000e00)={0x4c, 0x10, 0x1}, 0x4c}}, 0x0) 14:20:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) dup3(r2, r0, 0x0) 14:20:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace$poke(0x5, r0, &(0x7f0000004980), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r3, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) recvmmsg(r1, &(0x7f00000046c0)=[{{&(0x7f0000000040)=@ax25={{0x3, @netrom}, [@default, @remote, @remote, @netrom, @rose, @null, @bcast, @netrom]}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000140)=""/82, 0x52}], 0x3, &(0x7f0000000440)=""/251, 0xfb}, 0x40}, {{&(0x7f0000000540)=@pppoe, 0x80, &(0x7f0000000880)}, 0x6}, {{&(0x7f0000000900)=@nfc_llcp, 0x80, &(0x7f00000007c0)}, 0x2ae}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/148, 0x94}], 0x1, &(0x7f0000000f00)=""/71, 0x47}, 0x8000}, {{&(0x7f0000000f80)=@pppol2tpv3, 0x80, &(0x7f0000001180)=[{&(0x7f0000001000)=""/198, 0xc6}, {&(0x7f0000001100)=""/86, 0x56}], 0x2}, 0xd7e}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000011c0)=""/185, 0xb9}, {&(0x7f0000001280)=""/153, 0x99}, {&(0x7f0000004a00)=""/97, 0x61}, {&(0x7f0000001780)=""/233, 0xe9}, {&(0x7f00000014c0)=""/240, 0xf0}, {&(0x7f00000015c0)=""/189, 0xbd}, {&(0x7f0000001680)=""/204, 0xcc}, {&(0x7f0000004a80)=""/252, 0xfc}], 0x8}, 0xb5db}, {{&(0x7f0000001900)=@hci, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001980)=""/57, 0x39}, {&(0x7f00000019c0)=""/75, 0x4b}, {&(0x7f0000001a40)=""/216, 0xd8}, {&(0x7f00000005c0)=""/49, 0x31}], 0x4}, 0x7fff}, {{&(0x7f0000001d00)=@rc={0x1f, @none}, 0x80, &(0x7f0000003000)=[{&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000001e80)=""/4088, 0xff8}, {&(0x7f0000000740)=""/121, 0x79}, {0x0}], 0x4, &(0x7f0000003040)=""/44, 0x2c}, 0x659}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000000980)=""/214, 0xd6}, {&(0x7f0000003200)=""/17, 0x11}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000003280)=""/187, 0xbb}, {&(0x7f0000003340)=""/73, 0x49}, {&(0x7f00000033c0)=""/32, 0x20}], 0x6}, 0xffffff70}, {{&(0x7f0000003480)=@sco, 0x80, &(0x7f0000003680)=[{&(0x7f0000003500)=""/127, 0x7f}, {&(0x7f0000003580)=""/227, 0xe3}], 0x2, &(0x7f00000036c0)=""/4096, 0x1000}, 0x9}], 0xa, 0x40000144, &(0x7f0000004940)={0x0, 0x989680}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) 14:20:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:36 executing program 5: open(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000001640)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r0, 0x0) preadv(r0, &(0x7f0000001580)=[{0x0}], 0x1, 0x0, 0x0) sync() [ 209.664574][T13364] ieee802154 phy0 wpan0: encryption failed: -22 [ 209.836014][T13368] loop3: detected capacity change from 0 to 15 14:20:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x3) 14:20:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:37 executing program 4: syz_io_uring_setup(0xcd1, &(0x7f0000000240), &(0x7f0000a57000/0x4000)=nil, &(0x7f0000c25000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x2e6e, &(0x7f0000000100), &(0x7f0000800000/0x800000)=nil, &(0x7f0000c22000/0x3000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x1aa7, &(0x7f00000002c0), &(0x7f0000e22000/0x4000)=nil, &(0x7f00009b1000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 14:20:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x10) 14:20:37 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000100)=0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) ftruncate(r1, 0x2000000) 14:20:37 executing program 2: ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x20000014}) ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x10, 0x0, 0x0, 0x1473bf3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x3ff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00006f0000/0x13000)=nil, 0x13000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) 14:20:37 executing program 2: ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace$poke(0x5, r0, &(0x7f0000004980), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r3, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) recvmmsg(r1, &(0x7f00000046c0)=[{{&(0x7f0000000040)=@ax25={{0x3, @netrom}, [@default, @remote, @remote, @netrom, @rose, @null, @bcast, @netrom]}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000140)=""/82, 0x52}], 0x3, &(0x7f0000000440)=""/251, 0xfb}, 0x40}, {{&(0x7f0000000540)=@pppoe, 0x80, &(0x7f0000000880)}, 0x6}, {{&(0x7f0000000900)=@nfc_llcp, 0x80, &(0x7f00000007c0)}, 0x2ae}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/148, 0x94}], 0x1, &(0x7f0000000f00)=""/71, 0x47}, 0x8000}, {{&(0x7f0000000f80)=@pppol2tpv3, 0x80, &(0x7f0000001180)=[{&(0x7f0000001000)=""/198, 0xc6}, {&(0x7f0000001100)=""/86, 0x56}], 0x2}, 0xd7e}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000011c0)=""/185, 0xb9}, {&(0x7f0000001280)=""/153, 0x99}, {&(0x7f0000004a00)=""/97, 0x61}, {&(0x7f0000001780)=""/233, 0xe9}, {&(0x7f00000014c0)=""/240, 0xf0}, {&(0x7f00000015c0)=""/189, 0xbd}, {&(0x7f0000001680)=""/204, 0xcc}, {&(0x7f0000004a80)=""/252, 0xfc}], 0x8}, 0xb5db}, {{&(0x7f0000001900)=@hci, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001980)=""/57, 0x39}, {&(0x7f00000019c0)=""/75, 0x4b}, {&(0x7f0000001a40)=""/216, 0xd8}, {&(0x7f00000005c0)=""/49, 0x31}], 0x4}, 0x7fff}, {{&(0x7f0000001d00)=@rc={0x1f, @none}, 0x80, &(0x7f0000003000)=[{&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000001e80)=""/4088, 0xff8}, {&(0x7f0000000740)=""/121, 0x79}, {0x0}], 0x4, &(0x7f0000003040)=""/44, 0x2c}, 0x659}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000000980)=""/214, 0xd6}, {&(0x7f0000003200)=""/17, 0x11}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000003280)=""/187, 0xbb}, {&(0x7f0000003340)=""/73, 0x49}, {&(0x7f00000033c0)=""/32, 0x20}], 0x6}, 0xffffff70}, {{&(0x7f0000003480)=@sco, 0x80, &(0x7f0000003680)=[{&(0x7f0000003500)=""/127, 0x7f}, {&(0x7f0000003580)=""/227, 0xe3}], 0x2, &(0x7f00000036c0)=""/4096, 0x1000}, 0x9}], 0xa, 0x40000144, &(0x7f0000004940)={0x0, 0x989680}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) 14:20:37 executing program 2: ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) [ 210.537569][T13397] ieee802154 phy0 wpan0: encryption failed: -22 14:20:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x3) 14:20:38 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace$poke(0x5, r0, &(0x7f0000004980), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r3, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) recvmmsg(r1, &(0x7f00000046c0)=[{{&(0x7f0000000040)=@ax25={{0x3, @netrom}, [@default, @remote, @remote, @netrom, @rose, @null, @bcast, @netrom]}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000140)=""/82, 0x52}], 0x3, &(0x7f0000000440)=""/251, 0xfb}, 0x40}, {{&(0x7f0000000540)=@pppoe, 0x80, &(0x7f0000000880)}, 0x6}, {{&(0x7f0000000900)=@nfc_llcp, 0x80, &(0x7f00000007c0)}, 0x2ae}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/148, 0x94}], 0x1, &(0x7f0000000f00)=""/71, 0x47}, 0x8000}, {{&(0x7f0000000f80)=@pppol2tpv3, 0x80, &(0x7f0000001180)=[{&(0x7f0000001000)=""/198, 0xc6}, {&(0x7f0000001100)=""/86, 0x56}], 0x2}, 0xd7e}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000011c0)=""/185, 0xb9}, {&(0x7f0000001280)=""/153, 0x99}, {&(0x7f0000004a00)=""/97, 0x61}, {&(0x7f0000001780)=""/233, 0xe9}, {&(0x7f00000014c0)=""/240, 0xf0}, {&(0x7f00000015c0)=""/189, 0xbd}, {&(0x7f0000001680)=""/204, 0xcc}, {&(0x7f0000004a80)=""/252, 0xfc}], 0x8}, 0xb5db}, {{&(0x7f0000001900)=@hci, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001980)=""/57, 0x39}, {&(0x7f00000019c0)=""/75, 0x4b}, {&(0x7f0000001a40)=""/216, 0xd8}, {&(0x7f00000005c0)=""/49, 0x31}], 0x4}, 0x7fff}, {{&(0x7f0000001d00)=@rc={0x1f, @none}, 0x80, &(0x7f0000003000)=[{&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000001e80)=""/4088, 0xff8}, {&(0x7f0000000740)=""/121, 0x79}, {0x0}], 0x4, &(0x7f0000003040)=""/44, 0x2c}, 0x659}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000000980)=""/214, 0xd6}, {&(0x7f0000003200)=""/17, 0x11}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000003280)=""/187, 0xbb}, {&(0x7f0000003340)=""/73, 0x49}, {&(0x7f00000033c0)=""/32, 0x20}], 0x6}, 0xffffff70}, {{&(0x7f0000003480)=@sco, 0x80, &(0x7f0000003680)=[{&(0x7f0000003500)=""/127, 0x7f}, {&(0x7f0000003580)=""/227, 0xe3}], 0x2, &(0x7f00000036c0)=""/4096, 0x1000}, 0x9}], 0xa, 0x40000144, &(0x7f0000004940)={0x0, 0x989680}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) 14:20:38 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:38 executing program 4: io_setup(0x2, &(0x7f0000000080)=0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x101000) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x7fff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 14:20:38 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:38 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=0xffffffffffffffff) 14:20:38 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2204c001, &(0x7f0000000340)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x100000000007bf, 0x4) sendto$inet6(r0, &(0x7f0000000440)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080), 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000000c0)=0x401, 0x4) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/13, 0xd}}], 0x1, 0x0, 0x0) 14:20:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) [ 211.462879][T13422] loop3: detected capacity change from 0 to 15 14:20:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x5420, 0x0) [ 211.499390][T13415] ieee802154 phy0 wpan0: encryption failed: -22 14:20:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) 14:20:38 executing program 4: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') open$dir(&(0x7f0000000180)='./file0\x00', 0x100, 0x0) 14:20:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) 14:20:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace$poke(0x5, r0, &(0x7f0000004980), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r3, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) recvmmsg(r1, &(0x7f00000046c0)=[{{&(0x7f0000000040)=@ax25={{0x3, @netrom}, [@default, @remote, @remote, @netrom, @rose, @null, @bcast, @netrom]}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000140)=""/82, 0x52}], 0x3, &(0x7f0000000440)=""/251, 0xfb}, 0x40}, {{&(0x7f0000000540)=@pppoe, 0x80, &(0x7f0000000880)}, 0x6}, {{&(0x7f0000000900)=@nfc_llcp, 0x80, &(0x7f00000007c0)}, 0x2ae}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/148, 0x94}], 0x1, &(0x7f0000000f00)=""/71, 0x47}, 0x8000}, {{&(0x7f0000000f80)=@pppol2tpv3, 0x80, &(0x7f0000001180)=[{&(0x7f0000001000)=""/198, 0xc6}, {&(0x7f0000001100)=""/86, 0x56}], 0x2}, 0xd7e}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000011c0)=""/185, 0xb9}, {&(0x7f0000001280)=""/153, 0x99}, {&(0x7f0000004a00)=""/97, 0x61}, {&(0x7f0000001780)=""/233, 0xe9}, {&(0x7f00000014c0)=""/240, 0xf0}, {&(0x7f00000015c0)=""/189, 0xbd}, {&(0x7f0000001680)=""/204, 0xcc}, {&(0x7f0000004a80)=""/252, 0xfc}], 0x8}, 0xb5db}, {{&(0x7f0000001900)=@hci, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001980)=""/57, 0x39}, {&(0x7f00000019c0)=""/75, 0x4b}, {&(0x7f0000001a40)=""/216, 0xd8}, {&(0x7f00000005c0)=""/49, 0x31}], 0x4}, 0x7fff}, {{&(0x7f0000001d00)=@rc={0x1f, @none}, 0x80, &(0x7f0000003000)=[{&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000001e80)=""/4088, 0xff8}, {&(0x7f0000000740)=""/121, 0x79}, {0x0}], 0x4, &(0x7f0000003040)=""/44, 0x2c}, 0x659}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000000980)=""/214, 0xd6}, {&(0x7f0000003200)=""/17, 0x11}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000003280)=""/187, 0xbb}, {&(0x7f0000003340)=""/73, 0x49}, {&(0x7f00000033c0)=""/32, 0x20}], 0x6}, 0xffffff70}, {{&(0x7f0000003480)=@sco, 0x80, &(0x7f0000003680)=[{&(0x7f0000003500)=""/127, 0x7f}, {&(0x7f0000003580)=""/227, 0xe3}], 0x2, &(0x7f00000036c0)=""/4096, 0x1000}, 0x9}], 0xa, 0x40000144, &(0x7f0000004940)={0x0, 0x989680}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000100)=ANY=[]) 14:20:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000100)=@raw=[@initr0, @map_idx, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}], &(0x7f00000001c0)='GPL\x00', 0x3, 0x89, &(0x7f0000000200)=""/137, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:39 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2204c001, &(0x7f0000000340)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x100000000007bf, 0x4) sendto$inet6(r0, &(0x7f0000000440)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080), 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000000c0)=0x401, 0x4) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/13, 0xd}}], 0x1, 0x0, 0x0) 14:20:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:39 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x3800, 0x0) 14:20:39 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000004d00)={0x0, "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"}) 14:20:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) 14:20:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000500), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000540)=""/15) [ 212.175386][ T25] audit: type=1400 audit(1656080439.148:357): avc: denied { mounton } for pid=13442 comm="syz-executor.2" path="/root/syzkaller-testdir3446952317/syzkaller.zfVJkQ/760/file0" dev="sda1" ino=1180 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 14:20:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=@bridge_delneigh={0x28, 0x1c, 0x3f54041d15004545, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:20:39 executing program 2: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)={[], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '(-[!#'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) [ 212.280553][T13456] ieee802154 phy0 wpan0: encryption failed: -22 [ 212.422180][T13462] loop3: detected capacity change from 0 to 15 [ 212.442687][T13463] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 14:20:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x5e) 14:20:40 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:40 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', 'cgroup2\x00'}) 14:20:40 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2204c001, &(0x7f0000000340)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x100000000007bf, 0x4) sendto$inet6(r0, &(0x7f0000000440)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080), 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000000c0)=0x401, 0x4) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/13, 0xd}}], 0x1, 0x0, 0x0) 14:20:40 executing program 2: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)={[], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '(-[!#'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 14:20:40 executing program 4: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg0\x00'}) pipe2(&(0x7f0000000900), 0x0) 14:20:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dd287dfc7468514b9a806ef482959a76041c9cf5acd41d8bdcd213a025679af33c9f068b3f3c9467ef82828dced133891d"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000440)=""/126, 0x7e, 0x0) close(r0) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@proc, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="4400000010", @ANYRES32=r3], 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @local}}) 14:20:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) 14:20:40 executing program 2: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)={[], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '(-[!#'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) [ 213.097620][T13473] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 213.121283][ T25] audit: type=1400 audit(1656080440.098:358): avc: denied { mount } for pid=13476 comm="syz-executor.3" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 14:20:40 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1}) 14:20:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) [ 213.149599][ T25] audit: type=1400 audit(1656080440.118:359): avc: denied { unmount } for pid=1840 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 213.152254][T13480] ieee802154 phy0 wpan0: encryption failed: -22 [ 213.201514][T13485] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 213.281479][ T25] audit: type=1400 audit(1656080440.258:360): avc: denied { mounton } for pid=13489 comm="syz-executor.3" path="/root/syzkaller-testdir519622195/syzkaller.pknzVY/859/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 213.366396][T13486] device ó<Ÿ‹?<”gï‚‚ÎÑ entered promiscuous mode 14:20:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:40 executing program 2: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)={[], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '(-[!#'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 14:20:40 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:40 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2204c001, &(0x7f0000000340)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x100000000007bf, 0x4) sendto$inet6(r0, &(0x7f0000000440)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080), 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000000c0)=0x401, 0x4) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/13, 0xd}}], 0x1, 0x0, 0x0) 14:20:40 executing program 3: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000080)='\\', 0x1}, {&(0x7f0000000140)="b5", 0x1}], 0x0, 0x0) 14:20:40 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000021002551071c0165ff00fc020200000003100f000ee1000c08000b000000000f", 0x24) [ 213.859651][T13492] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 14:20:40 executing program 2: r0 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='0', 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000380)='id_legacy\x00', 0x0, 0x0, 0x0, r0) 14:20:40 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0}) 14:20:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x20}) 14:20:40 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:40 executing program 2: r0 = epoll_create1(0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000180)=[{}], 0x1, 0xff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xe0000008}) 14:20:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x4b62, &(0x7f0000000100)) 14:20:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:41 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:41 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045515, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) 14:20:41 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x540e, 0x0) 14:20:41 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x4004551e, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) 14:20:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000140)={@multicast1, @private=0xa010100}, 0xc) 14:20:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000440)=0x3) 14:20:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x4b37, 0x0) 14:20:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:41 executing program 5: syz_open_dev$usbmon(&(0x7f0000000700), 0x2, 0x0) 14:20:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x4b30, 0x0) 14:20:41 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) 14:20:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) 14:20:41 executing program 4: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsuuid}]}) 14:20:41 executing program 3: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000080)="5c60bf", 0x3}, {0x0}], 0x0, 0x0) 14:20:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "27f8a97d616a2329"}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x0, "829fc0b5ae63fd88ee2700"}) 14:20:41 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0xfffffffffffffffe}, 0x0, 0x0, &(0x7f0000000300)={0x0, r0+10000000}, &(0x7f0000000380)={&(0x7f0000000340)={[0x3]}, 0x8}) 14:20:41 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) gettid() socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000880)=[{0x0}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="03070000000000", @ANYRES32=0x0, @ANYBLOB="0c00990000000000000000000800c30000000000"], 0x30}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0500000000000000000837b49d68e10000000800", @ANYBLOB="0800050002000000034f6a4bcfffb691ea919294e06d8c43d1f89b207325ab56dcf9c1e7d1b4eb54061528d1074a281dc94d4da00d557c32ad1ae1b9f79b32bb8b43"], 0x24}}, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000008c0)=""/4096, &(0x7f0000000200)=0x1000) sendmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0xa}}], 0x40000000000017f, 0x0) syz_open_procfs(0x0, 0x0) [ 214.861781][T13546] nfs4: Unknown parameter 'fsuuid' [ 214.879589][T13552] ieee802154 phy0 wpan0: encryption failed: -22 14:20:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x4b4a, &(0x7f0000000100)) 14:20:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:42 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x1}) unshare(0x20040000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r2, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x10000, {{0xe, 0x4, 0x0, 0x4, 0x38, 0x65, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty, {[@timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@dev}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x1c0}, {@empty}, {@multicast1}]}]}}}}}) 14:20:42 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000180)) 14:20:42 executing program 3: setpriority(0x2, 0x0, 0x9) 14:20:42 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, 0x0) 14:20:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x8b4e}) 14:20:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\f'], 0x9a) 14:20:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x8b4e}) 14:20:42 executing program 2: bpf$MAP_CREATE(0xa, &(0x7f0000000240), 0x48) [ 215.744023][T13578] ieee802154 phy0 wpan0: encryption failed: -22 14:20:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:43 executing program 4: pipe(&(0x7f0000002400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000400)=[{&(0x7f0000000380)="15fc", 0x2}], 0x1, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) 14:20:43 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x8b4e}) 14:20:43 executing program 2: add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='0', 0x1, 0xfffffffffffffffd) r0 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='0', 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000380)='id_legacy\x00', 0x0, 0x0, 0x0, r0) 14:20:43 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x1}) unshare(0x20040000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r2, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x10000, {{0xe, 0x4, 0x0, 0x4, 0x38, 0x65, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty, {[@timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@dev}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x1c0}, {@empty}, {@multicast1}]}]}}}}}) 14:20:43 executing program 2: syz_mount_image$nfs4(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)) 14:20:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dd287dfc7468514b9a806ef482959a76041c9cf5acd41d8bdcd213a025679af33c9f068b3f3c9467ef82828dced133891d"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000440)=""/126, 0x7e, 0x0) close(r0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) connect$netlink(r4, &(0x7f0000000080)=@proc, 0xc) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400100000000000c100000000", @ANYRES8], 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @local}}) 14:20:43 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x8b4e}) 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:43 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x4b36, 0x0) ioctl$KDDISABIO(r0, 0x4b37) 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) [ 216.606229][T13608] ieee802154 phy0 wpan0: encryption failed: -22 [ 216.741280][T13613] device ó<Ÿ‹?<”gï‚‚ÎÑ entered promiscuous mode 14:20:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002a00)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x228, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2c0, 0x2c0, 0x2c0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x100}}, @common=@set={{0x40}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x0, 0x0, [0x0, 0x0, 0x0, 0x23]}}}, {{@ip={@broadcast, @empty, 0x0, 0x0, 'veth1_macvtap\x00', 'bridge_slave_0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x8}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 14:20:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080), 0x20) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:44 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000580), 0x780081, 0x0) 14:20:44 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x1}) unshare(0x20040000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r2, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x10000, {{0xe, 0x4, 0x0, 0x4, 0x38, 0x65, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty, {[@timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@dev}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x1c0}, {@empty}, {@multicast1}]}]}}}}}) 14:20:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640), 0xffffffffffffffff) 14:20:44 executing program 3: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)={[], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '(-[!#'}}, {@uid_gt={'uid>', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 14:20:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x100}) 14:20:44 executing program 4: r0 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='0', 0x1, 0xfffffffffffffffd) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) add_key(&(0x7f0000000040)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:20:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000002300)=[{&(0x7f0000000040)="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", 0xa82}], 0x1) 14:20:44 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @random="44526d536911", @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @dev, @multicast}}}}, 0x0) [ 217.404887][T13622] x_tables: duplicate underflow at hook 2 [ 217.439793][T13628] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 217.481315][T13638] ieee802154 phy0 wpan0: encryption failed: -22 14:20:45 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:45 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000000c0), &(0x7f0000000500)=0x4) 14:20:45 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) 14:20:45 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) 14:20:45 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x1}) unshare(0x20040000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r2, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x10000, {{0xe, 0x4, 0x0, 0x4, 0x38, 0x65, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty, {[@timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@dev}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x1c0}, {@empty}, {@multicast1}]}]}}}}}) 14:20:45 executing program 4: clock_nanosleep(0x8, 0x1, &(0x7f00000000c0)={0x77359400}, 0x0) 14:20:45 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000640)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000480)=""/101, 0x65, 0x0, 0x0, 0x4a9}}, 0x120) 14:20:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:45 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) mkdirat(r0, &(0x7f0000000140)='./bus\x00', 0x0) 14:20:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) [ 218.329015][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329038][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329059][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329077][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329094][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329129][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329147][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329165][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329184][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329203][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329266][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329351][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329369][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329387][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329461][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329488][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329505][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329523][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329540][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329557][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329581][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329598][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329616][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329685][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329702][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329719][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329737][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329821][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329839][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329857][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329907][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329922][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329938][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.329955][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330019][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330038][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330057][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330136][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330198][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330216][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330234][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330257][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330276][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330295][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330353][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 14:20:46 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_drvinfo={0xf, "4e85f27bf77a1e9fe583f206e6d0320ba58f59a9d981e4233b645f25425c7e82", "3e06f005d0f1614cde94b07674f2c47878298fe6f58a044e9e94923f634e663e", "8b8852d95529eeb06401153130bc2ff2121d109a2c915d03c87681fb2bb5e220", "3aec20a8fd099f4f3f316af7310dc2565f2d874ca430a8d59dabe9e71a6cb978", "7efde5ec93a0ba7ed5e19d91f54335e8a3d503bb3e3cb550db542af161df647c", "3f63e0456f324524da8e379e"}}) 14:20:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:46 executing program 5: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 14:20:46 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) 14:20:46 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) [ 218.330371][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 14:20:46 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001b40), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 14:20:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x0) 14:20:46 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}) [ 218.330390][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 14:20:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKPG(r0, 0x80081272, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}) 14:20:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000240)=ANY=[]) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'ipvlan0\x00', 0x1}) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 14:20:46 executing program 4: symlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 218.330413][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330430][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330447][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330470][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330494][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330515][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330532][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330550][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330600][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330649][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330668][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330685][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330704][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330722][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330740][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330757][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330775][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330837][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330914][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330932][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330950][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330967][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.330992][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331011][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331029][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331047][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331065][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331084][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331102][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331159][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331177][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331195][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331213][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331232][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331250][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331268][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331354][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331371][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331389][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331408][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331426][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331483][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331502][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 14:20:47 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:47 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000001240)={@local, @random="0f8d3e006067", @val, {@ipv6}}, 0x0) [ 218.331583][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331602][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331620][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331730][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331748][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331765][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331783][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331801][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331819][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331838][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.331898][ T1914] hid-generic 0000:0000:04A9.0001: unknown main item tag 0x0 [ 218.340710][ T1914] hid-generic 0000:0000:04A9.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 218.357021][T13661] ieee802154 phy0 wpan0: encryption failed: -22 [ 218.400123][T13665] loop3: detected capacity change from 0 to 64 [ 219.228521][T13686] ieee802154 phy0 wpan0: encryption failed: -22 14:20:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0xd}]}}, &(0x7f00000001c0)=""/224, 0x26, 0xe0, 0x1}, 0x20) 14:20:47 executing program 3: getgroups(0x0, 0x0) getuid() syz_mount_image$tmpfs(&(0x7f00000005c0), 0x0, 0x5, 0x0, &(0x7f0000000680), 0x901002, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRESHEX=0x0, @ANYRESHEX=0x0, @ANYBLOB="2c6e725f696e6f6465733dce2c67", @ANYRESHEX]) getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xee00]) syz_clone3(&(0x7f0000000340)={0x47081000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x9}, &(0x7f00000001c0)=""/245, 0xf5, &(0x7f00000002c0)=""/40, 0x0}, 0x58) 14:20:47 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) 14:20:47 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) 14:20:47 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000580), 0x0, 0x0, 0x1, &(0x7f0000001980)=[{&(0x7f00000017c0)="b9", 0x1, 0xb286}], 0x0, &(0x7f0000001a40)) [ 220.115453][T13700] ieee802154 phy0 wpan0: encryption failed: -22 14:20:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040)=0x8001, 0x4) 14:20:47 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000001640)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r1, 0x0) preadv(r1, &(0x7f0000001580)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, r0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x0) [ 220.289654][T13712] loop4: detected capacity change from 0 to 178 14:20:47 executing program 4: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6) 14:20:47 executing program 4: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x1011, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 14:20:47 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:47 executing program 4: pipe2(&(0x7f0000000240), 0x0) open$dir(0x0, 0x0, 0x0) [ 220.895651][ T14] ================================================================== [ 220.895683][ T14] BUG: KCSAN: data-race in console_lock / printer_should_wake [ 220.895709][ T14] [ 220.895714][ T14] write to 0xffffffff85bee448 of 1 bytes by task 13707 on cpu 1: [ 220.895729][ T14] console_lock+0x65/0xd0 [ 220.895749][ T14] do_con_write+0x71/0x3590 [ 220.895766][ T14] con_write+0x25/0x420 [ 220.895781][ T14] n_tty_write+0x7ea/0xb40 [ 220.895799][ T14] file_tty_write+0x3f9/0x650 [ 220.895817][ T14] tty_write+0x24/0x30 [ 220.895832][ T14] vfs_write+0x71c/0x890 [ 220.895849][ T14] ksys_write+0xe8/0x1a0 [ 220.895865][ T14] __x64_sys_write+0x3e/0x50 [ 220.895881][ T14] do_syscall_64+0x2b/0x70 [ 220.895900][ T14] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 220.895920][ T14] [ 220.895924][ T14] read to 0xffffffff85bee448 of 1 bytes by task 14 on cpu 0: [ 220.895939][ T14] printer_should_wake+0x3d/0x1c0 [ 220.895956][ T14] printk_kthread_func+0x486/0x940 [ 220.895973][ T14] kthread+0x1a9/0x1e0 [ 220.895989][ T14] ret_from_fork+0x1f/0x30 [ 220.896006][ T14] [ 220.896009][ T14] value changed: 0x00 -> 0x01 [ 220.896018][ T14] [ 220.896021][ T14] Reported by Kernel Concurrency Sanitizer on: [ 220.896027][ T14] CPU: 0 PID: 14 Comm: pr/ttyS0 Not tainted 5.19.0-rc3-syzkaller-00146-g92f20ff72066-dirty #0 14:20:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter, 0x48) 14:20:48 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001980), 0x0, &(0x7f0000001a40)={[{@huge_never}]}) 14:20:48 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) 14:20:48 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88084}, 0x44801) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000300)={@rand_addr, @rand_addr, 0x4, 0x7}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x5db31e47) ioctl$TIOCSTI(r1, 0x541b, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x8}}) [ 220.896049][ T14] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.896059][ T14] ================================================================== [ 220.970433][T13730] ieee802154 phy0 wpan0: encryption failed: -22 14:20:48 executing program 3: pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x4020940d, 0x0) 14:20:48 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) 14:20:48 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{}, {@size={'size', 0x3d, [0x39]}}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}]}) 14:20:48 executing program 4: socket(0x28, 0x0, 0x4) 14:20:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8912, &(0x7f0000000440)) [ 221.380676][T13749] tmpfs: Bad value for 'mpol' 14:20:48 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000005c0)={'wlan1\x00'}) [ 221.813436][T13761] ieee802154 phy0 wpan0: encryption failed: -22 14:20:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:48 executing program 3: io_uring_setup(0x340, &(0x7f0000000000)) io_uring_setup(0x6ca4, &(0x7f0000000080)) 14:20:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:20:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8923, &(0x7f0000000440)) 14:20:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) 14:20:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8910, &(0x7f0000000440)) 14:20:49 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 14:20:49 executing program 2: io_uring_setup(0x0, &(0x7f0000000000)) 14:20:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) 14:20:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x4020940d, &(0x7f0000000440)) [ 222.210762][T13775] loop3: detected capacity change from 0 to 512 [ 222.264329][T13775] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 222.265162][ T25] audit: type=1400 audit(1656080449.238:361): avc: denied { add_name } for pid=13773 comm="syz-executor.3" name="memory.current" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 222.265314][ T25] audit: type=1400 audit(1656080449.238:362): avc: denied { create } for pid=13773 comm="syz-executor.3" name="memory.current" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 222.265743][ T25] audit: type=1400 audit(1656080449.238:363): avc: denied { read append open } for pid=13773 comm="syz-executor.3" path="/root/syzkaller-testdir519622195/syzkaller.pknzVY/893/file0/memory.current" dev="loop3" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 222.345659][ T1840] EXT4-fs (loop3): unmounting filesystem. 14:20:49 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:49 executing program 2: syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x200) 14:20:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8929, &(0x7f0000000440)) 14:20:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8982, &(0x7f0000000440)) 14:20:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01000000000000000000020000000800010000000020"], 0x1c}}, 0x0) 14:20:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:49 executing program 5: openat$bsg(0xffffffffffffff9c, 0x0, 0x501881, 0x0) 14:20:49 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 14:20:49 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) 14:20:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:20:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x2, &(0x7f0000000000)=@raw=[@map_idx], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), 0x10}, 0x80) 14:20:49 executing program 5: r0 = gettid() sched_rr_get_interval(r0, &(0x7f00000000c0)) [ 222.656197][T13804] ieee802154 phy0 wpan0: encryption failed: -22 [ 222.707394][T13812] ieee802154 phy0 wpan0: encryption failed: -22 14:20:50 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x28}}, 0x0) 14:20:50 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000240)) 14:20:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @initdev}, &(0x7f0000000380)=0xffffffffffffff33) 14:20:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)={0x20, 0x0, 0x301, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 14:20:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x401c5820, 0x0) 14:20:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)={0x20, r1, 0x301, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 14:20:50 executing program 5: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000040)) 14:20:50 executing program 4: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000340)='./binderfs2/custom0\x00', 0x0, 0x0) 14:20:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) 14:20:50 executing program 3: mq_open(&(0x7f0000000200)='nl80211\x00', 0x0, 0x0, 0x0) [ 223.541785][T13828] ieee802154 phy0 wpan0: encryption failed: -22 [ 223.596966][T13839] ieee802154 phy0 wpan0: encryption failed: -22 14:20:51 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8927, &(0x7f0000000440)) 14:20:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc0045878, 0x0) 14:20:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89b0, &(0x7f0000000440)) 14:20:51 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) 14:20:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:51 executing program 4: mq_notify(0xffffffffffffffff, &(0x7f0000000300)) 14:20:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40087602, 0x0) 14:20:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x802) write$evdev(r0, &(0x7f0000000000), 0xfffffffe) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) 14:20:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc0189436, &(0x7f00000004c0)={'wlan0\x00'}) 14:20:51 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xf, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) 14:20:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="b6e332e5b350dade000000000000000000000000ede2ce4df49d3d87b54a3166", 0x20, 0x4e2}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f00000002c0)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 224.420073][T13853] ieee802154 phy0 wpan0: encryption failed: -22 [ 224.435428][T13859] EXT4-fs warning (device sda1): __ext4_ioctl:1160: Setting inode version is not supported with metadata_csum enabled. [ 224.458683][T13864] loop2: detected capacity change from 0 to 140 [ 224.462851][T13864] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 224.469908][T13864] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 224.470008][T13864] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=e002e018, mo2=0002] [ 224.470068][T13864] System zones: 1-3, 19-19, 35-36 [ 224.470454][T13867] ieee802154 phy0 wpan0: encryption failed: -22 [ 224.473133][T13864] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 57050 [ 224.473258][T13864] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 224.478280][ T25] audit: type=1400 audit(1656080451.448:364): avc: denied { create } for pid=13863 comm="syz-executor.2" name="encrypted_dir" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 224.479112][T13864] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1089: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 224.481178][T13864] EXT4-fs error (device loop2): ext4_find_dest_de:2065: inode #2: block 4: comm syz-executor.2: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 224.514588][ T1824] EXT4-fs (loop2): unmounting filesystem. 14:20:52 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) 14:20:52 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x7f}, 0x48) 14:20:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="b6e332e5b350dade000000000000000000000000ede2ce4df49d3d87b54a3166", 0x20, 0x4e2}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f00000002c0)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 14:20:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="540400006500"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x454}}, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) 14:20:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) [ 225.270152][T13879] loop2: detected capacity change from 0 to 140 [ 225.278077][T13880] ieee802154 phy0 wpan0: encryption failed: -22 [ 225.307128][T13879] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 225.307289][T13879] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=e002e018, mo2=0002] [ 225.307316][T13879] System zones: 1-3, 19-19, 35-36 [ 225.308102][T13879] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 57050 [ 225.308235][T13879] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 225.329565][T13887] ieee802154 phy0 wpan0: encryption failed: -22 [ 225.331405][T13879] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1089: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 225.331597][T13879] EXT4-fs error (device loop2): ext4_find_dest_de:2065: inode #2: block 4: comm syz-executor.2: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 225.351200][ T1824] EXT4-fs (loop2): unmounting filesystem. 14:20:52 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000002c0)=[@enter_looper], 0x0, 0x0, 0x0}) 14:20:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) 14:20:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@multicast2}, 0xc) 14:20:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="b6e332e5b350dade000000000000000000000000ede2ce4df49d3d87b54a3166", 0x20, 0x4e2}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f00000002c0)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 225.815554][T13891] loop2: detected capacity change from 0 to 140 [ 225.829776][T13891] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 225.829945][T13891] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=e002e018, mo2=0002] [ 225.829971][T13891] System zones: 1-3, 19-19, 35-36 [ 225.830403][T13891] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 57050 [ 225.830631][T13891] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 225.860647][T13891] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1089: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 225.860760][T13891] EXT4-fs error (device loop2): ext4_find_dest_de:2065: inode #2: block 4: comm syz-executor.2: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 225.877135][ T1824] EXT4-fs (loop2): unmounting filesystem. 14:20:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) 14:20:53 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x10, 0x2}, 0x10) 14:20:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={0xe84, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "ad5e74948a0bfc3985"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x5, 0xf9, "bb"}, @NL80211_ATTR_FILS_ERP_REALM={0xe9, 0xfa, "8464bb2b890bd09d37519ea2544686bca00660e8989b8fb1cb5c55b0fcbf73b35ea7015c53b97355b7f78e59413afafb2955e3a37ee69dfb6fafe53fbf647b1216d46e42421c41a77db766df96cdb6fe948eb5bb5f5671eca9934428e90f7d148a52485f7ce7fb1d4d0a425d7d95fc81d582a7416892bac5bd7703416f94d83825ca8a804f583d81ced487a13d936e0f793a30ee0b4421b4b0fa2e86297fc5191e0f9ec556552d409c7a31a6493d1d8f67368acedef4d9c4f648d2cc13e6fde5345f0b83e4678ecd99a6c9b90e2c6d750272520ce9d5c24f28e48baa68de46760f2e516637"}, @NL80211_ATTR_FILS_ERP_RRK={0x2c, 0xfc, "6b7d08be0933ce82d62f2763157cc7ef479ce6f724d74b4cb47574ea968ed36e7714aede54cf8eab"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xa, 0xf9, "6bfed8222e83"}, @NL80211_ATTR_FILS_ERP_REALM={0x16, 0xfa, "78e19a3683e9a9db67e0aec4f29951b4072a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0xbef}, @NL80211_ATTR_FILS_ERP_RRK={0x31, 0xfc, "49dcffd3f8d9578c0e6bff0711f8d69fba763fd9876e709f747e9c6d92c0459b89d1738b769439278697b488a6"}, @NL80211_ATTR_FILS_ERP_REALM={0x8a, 0xfa, "75161b67350952eee9445a67e9557875649fee4a6125c86fb7ced079691fe64823d7649ff87f634b8c997d3435a6ee525eccf9e467aed48c25fbb1eb691a1471b0562d354980a5d4a15125d7952c9ea9e2d520d6e77d63675ae07ae6ff25e1fcba7b4cf0a69bd3f85fbcf0346d7be496f71a2dbb9a792225dca44553e26c396491af8c7c2ff5"}], @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_RRK={0x11, 0xfc, "0b113da4740f3e816bfcb1208a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_RRK={0xdd, 0xfc, "4c6993f79ff7c548913585877d8c06c6e70f1ed7531ab7e3f3d3c88697e7585d958316193c9c3e629678f300fdfb7a8dcf58380f0d4d38ee15f597494527ea1d96967a400b0a409d2427f38fa9819e6cff0ab4eff0e958f440a7a9b9f3877b745d8da44209163586375900ed9c46b8661a5b58d5d437352cc25d1eb66b67e91e4143e396cfaa7305f349e6af11f285d8d477b213609a5ec9291805c077e1079fab5636d5a0e829b502873cb8500b34b67cdeb1e0f4ad0fb61ebb97fbaab01629cb80f1ce4f66781f76fa2caa56f3f9e6164a0ee911992a96d1"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x11, 0xf9, "864016c61b27572e4cd904156d"}], @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0xb1d, 0xfc, "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"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x7, 0xf9, "a56a40"}]]}, 0xe84}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 14:20:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="b6e332e5b350dade000000000000000000000000ede2ce4df49d3d87b54a3166", 0x20, 0x4e2}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f00000002c0)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 14:20:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a0, &(0x7f00000004c0)={'wlan0\x00'}) 14:20:53 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0xc, 0x0, &(0x7f00000002c0)=[@dead_binder_done], 0x0, 0x0, 0x0}) [ 226.113253][T13901] loop2: detected capacity change from 0 to 140 [ 226.133545][T13901] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 226.133664][T13901] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=e002e018, mo2=0002] [ 226.133710][T13901] System zones: 1-3, 19-19, 35-36 14:20:53 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 14:20:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000180)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 14:20:53 executing program 4: ioperm(0x1, 0x7ff, 0x0) 14:20:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4020940d, &(0x7f00000004c0)={'wlan0\x00'}) [ 226.134097][T13901] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 57050 [ 226.134233][T13901] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 226.138970][T13901] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1089: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 226.139136][T13901] EXT4-fs error (device loop2): ext4_find_dest_de:2065: inode #2: block 4: comm syz-executor.2: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 226.171897][T13911] ieee802154 phy0 wpan0: encryption failed: -22 [ 226.201174][ T1824] EXT4-fs (loop2): unmounting filesystem. [ 226.222415][T13919] ieee802154 phy0 wpan0: encryption failed: -22 14:20:53 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) socket$igmp(0x2, 0x3, 0x2) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x3f}, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0) 14:20:53 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/igmp\x00') preadv(r0, &(0x7f0000001700)=[{&(0x7f0000000280)=""/248, 0xf8}], 0x1, 0x400, 0x0) 14:20:53 executing program 2: pipe2$9p(&(0x7f0000000000), 0x84000) 14:20:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x10) 14:20:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') open(&(0x7f00000001c0)='./file0\x00', 0x11f042, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000300)=ANY=[], 0xe01, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000440)=ANY=[], 0x88) 14:20:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0xd3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001440), r0) 14:20:54 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000000), 0x0) 14:20:54 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 14:20:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000640)=""/101) [ 227.029691][T13939] ieee802154 phy0 wpan0: encryption failed: -22 14:20:54 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4c, 0x0, &(0x7f00000002c0)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000340)='t'}) 14:20:54 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x68, 0x0, &(0x7f00000002c0)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000200)={@flat=@weak_handle={0x77682a85, 0x1001, 0x2}, @flat=@weak_binder={0x77622a85, 0x100f, 0x3}, @fd}, &(0x7f0000000280)={0x0, 0x18, 0x30}}, 0x400}, @exit_looper, @dead_binder_done, @enter_looper, @acquire={0x40046305, 0x2}], 0x20, 0x0, &(0x7f0000000340)="7466f23904e3d39e919d640d452120b2d6dd4b0934cc58efcc1ffc6a26c12627"}) [ 227.080517][T13949] ieee802154 phy0 wpan0: encryption failed: -22 [ 227.084166][T13947] loop2: detected capacity change from 0 to 512 [ 227.119808][T13947] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 227.121736][ T25] audit: type=1400 audit(1656080454.098:365): avc: denied { setattr } for pid=13946 comm="syz-executor.2" name="file0" dev="loop2" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 227.122186][ T25] audit: type=1400 audit(1656080454.098:366): avc: denied { write } for pid=13946 comm="syz-executor.2" name="file0" dev="loop2" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 227.146853][ T1824] EXT4-fs (loop2): unmounting filesystem. 14:20:54 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110", 0x2}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:54 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000f80)) 14:20:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4044055) 14:20:54 executing program 3: add_key$user(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='e', 0x1, 0xfffffffffffffffd) 14:20:54 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000001100)='syzkaller\x00', &(0x7f0000001140)={'syz', 0x3}, 0x0) 14:20:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:54 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 14:20:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x28}}, 0x0) 14:20:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f00000000000004", 0x1b, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) 14:20:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x3c}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:20:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) [ 227.880057][T13971] ieee802154 phy0 wpan0: encryption failed: -22 [ 227.881383][ T25] audit: type=1400 audit(1656080454.858:367): avc: denied { create } for pid=13962 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 14:20:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000dc0)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="51003300808800000802110000000802110000015050505050500000000000000000000000000000640000000006020202020202010003010025"], 0x70}}, 0x0) [ 227.917403][ T25] audit: type=1400 audit(1656080454.868:368): avc: denied { write } for pid=13962 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 227.930842][T13977] ieee802154 phy0 wpan0: encryption failed: -22 [ 227.939833][T13980] loop5: detected capacity change from 0 to 512 [ 227.969930][T13980] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 227.969954][T13980] EXT4-fs (loop5): mount failed 14:20:55 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110", 0x2}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="210000000000000000003b00000008000300", @ANYRES32=r4], 0x44}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r1, 0x0, 0x80000000) 14:20:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000500)={0x6c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x4d, 0x33, @beacon={@with_ht, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1, 0xa9}, @val={0x4, 0x6, {0x3}}, @void, @val={0x5, 0x3}, @void, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @void, @void}}]}, 0x6c}}, 0x0) 14:20:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "8c0478", 0x8, 0x2b, 0x0, @private2, @local, {[@hopopts]}}}}}, 0x0) 14:20:55 executing program 4: perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x90, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x317199028ada3d59, 0xa, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7fff}, @jmp={0x5, 0x0, 0x0, 0xb, 0x8}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, @call, @initr0={0x18, 0x0, 0x0, 0x0, 0x2c0}]}, &(0x7f0000000240)='GPL\x00', 0x40, 0xef, &(0x7f0000000440)=""/239, 0x0, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x5, 0x6, 0x81}, 0x10, 0x0, r0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff]}, 0x80) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) 14:20:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r1, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) 14:20:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@cb_func={0x18, 0x0, 0x0}]}, &(0x7f00000002c0)='GPL\x00', 0x2, 0xa2, &(0x7f0000000140)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 228.731216][T14003] ieee802154 phy0 wpan0: encryption failed: -22 [ 228.761409][ T25] audit: type=1400 audit(1656080455.738:369): avc: denied { cpu } for pid=14005 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 14:20:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) 14:20:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 228.788999][T14007] ieee802154 phy0 wpan0: encryption failed: -22 [ 228.870493][T14011] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 14:20:56 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110", 0x2}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)="cdf4c65bad75354b993ebe3058bdb1adf52f9f8aff6b146f70", 0x19}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:56 executing program 4: perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x90, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x317199028ada3d59, 0x9, &(0x7f00000003c0)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7fff}, @jmp={0x5, 0x0, 0xd, 0x0, 0x8, 0x4, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x45}, @btf_id={0x18, 0x2}]}, &(0x7f0000000240)='GPL\x00', 0x40, 0xef, &(0x7f0000000440)=""/239, 0x41000, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff]}, 0x80) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) 14:20:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x37, 0x0, "d369a9c34aca811a22bdc5790fc3caf69a4c21b9140009ec80827ca732590d458252cbc265e8733272d3f2c88ae57b56c98dd2f6ec5c88a329866436650c7413531a693e2c59a428983b6c2175d21ce2"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080), 0x20) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xf0, 0x0, 0x190000b4) 14:20:56 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 14:20:56 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f0000000340)=0x400000004) close(r0) 14:20:56 executing program 5: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x632382fe5de16a02, 0x80, 0x8, 0x2, 0x9, 0x8b, 0x0, 0x5, 0x8000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x2, 0x3}, 0x40a, 0x45f, 0x13, 0x3, 0x80000001, 0x0, 0x7, 0x0, 0x8, 0x0, 0xfffffffffffffc01}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5535, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x80\xfe\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5421, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000200)=""/2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x5, &(0x7f00000007c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x7, 0x6c, &(0x7f00000003c0)=""/108, 0x41100, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000c00)=ANY=[@ANYRES16, @ANYRESDEC, @ANYBLOB="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", @ANYRES16=r2, @ANYRES8=r4], 0x210fe) [ 229.588157][T14033] device lo entered promiscuous mode [ 229.616140][T14036] ieee802154 phy0 wpan0: encryption failed: -22 14:20:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x14}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 229.667762][T14040] ieee802154 phy0 wpan0: encryption failed: -22 14:20:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002d00)={0x14, 0x4, 0x6, 0x301}, 0x14}}, 0x0) 14:20:56 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc058534b, &(0x7f0000000040)={0x0, 0x0, 'client0\x00', 0x0, "19a32c1d2f6fb37b", "ad521cc84c11d753815a4ec4ceb3b96f409907cd66ace70fdbb625ec9af147be"}) 14:20:57 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="8110dc", 0x3}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:20:57 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc058534b, &(0x7f0000000040)={0x0, 0x0, 'client0\x00', 0x0, "19a32c1d2f6fb37b", "ad521cc84c11d753815a4ec4ceb3b96f409907cd66ace70fdbb625ec9af147be"}) 14:20:57 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000a40), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}], 0x18}, 0x0) [ 230.521372][T14061] ieee802154 phy0 wpan0: encryption failed: -22