b5d2604be639ac69", 0x3f}, {&(0x7f0000003980)="3ad769b8f51ae7716f1b5ee5fe41588f7b4763f244afb6ff555bae9c4f0d580164109ea147974aeef3d12ba8cf5410b18b31d0465efd78a17583f3312f71458a0cceeb818d209ed2392a72e8967a3377035051b92107dcc7bc57ae052684", 0x5e}, {&(0x7f0000003a00)="52b14ad908d2ee7bd3353dd3a3bde916e10fb06a4a9d56b70205d2ead6e4d07303406214e0e957386e93885f88a766b7902366d1285f0db1a21098b39741591afc039796a17b34f513ff05b4b98ad43716d9b0488976ff32a488713f95c8b6efd4c8598da33f9093719476dd87a49e61fd1d5858b4fdcc4ab20b2560f4588cde3852ae92c5a132ea84b6f4ee93279d3f7d2fc234ff86c9fa04d41e3d61d9fc464a07faef55c8e626ea2ad4b1e4db11fc26fa450cfecc8b7e2639976404e3b2f90a46c0e7a9c41c686b028cb1a0d321324ec6c392da93f063", 0xd8}, {&(0x7f0000003b00)="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", 0xfc}, {&(0x7f0000003c00)="7c68dba5e86ccb10224c8b4823aa77fe3354af16d47250a63e61a53b1e125119267f97a580a0e5db444fbf3de8fc3e5c693b5047b9d130454b6355c07b56b6c1c3e30547a6af8ef820b4ce8bf213de2eb77add85e21d0474d79cf1fbc54a249c502495d93c586784cc53c6000d6ae9aab7a295445559277cd7bf43383a0a9c68e25b3756fa005544357a5fea6f46eab995ea7ba0b81e94e4c3d41d9a3cfbf492a7d8dd1a27eda00e5dedbd65d4d82c7e0aaf21f6b0d49fa3", 0xb8}, {&(0x7f0000003cc0)="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", 0x1000}, {&(0x7f0000004cc0)="2e90b2f601ec19c34ddffaa67279c726df39ddc36ce6cd25225e441f329e96e39d6639ddb51ee01b8327dabbb1b4ee7766a7adad1f9abfb119a0a6763296e1239db028eede4d179ee8facf5df3d1bfaeb35627e5eda0a4de0a3ca4ef4bb6fe246e4902ece287c7b585b36ca47dd5dedb6400d283f39fded8bcc813dd46343232f0c255fd8756822aebce060ae293d71b47ea43afbb83fa6c07a75581", 0x9c}, {&(0x7f0000004d80)="527b5f81f1695c9eecc183dac2e980e41811f3438697793299b2a27a4131896bb5e2fb77d3224c05d7e1bfaefa731a2449d1d1d3f57d7a043380eaa8c0c9460fee19ba40de56b6bc13ee373f37b93de458322d4d385e46fc72729d964429de4122d5722db9f852ccc7ccbf10", 0x6c}, {&(0x7f0000004e00)="7598d21557a23cf6060486609cf377ebde63", 0x12}], 0x9, &(0x7f0000004f80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}], 0xffffffffffffffd2}}, {{&(0x7f0000005040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000051c0)=[{&(0x7f00000050c0)="96b1393ed237f997c453d4fdb723c9cb33bdf73de88554fba3f40cb4113b527c80f1a2dd16745e293cd7dbe41df5d355ab8e3bbbdf5acb74d2c7507a070a0191f8110520eef7febf6524652a50b60844d2667f57929478956f02490525ac2706a7ee92081702d4baf495336baa63372f3eb5221186ec957d21bc123f5de8e9ed1f482c43ed521fcae178f208b0d792f7fe94899dc07a1da9d0ada71e1b8b13ac7be8535d4af0502a25287fd732f3a4620f2e735c5c6ce62f8581f6a1ae59c74448ac9d74", 0xc4}], 0x1, &(0x7f0000005200)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x40}}], 0x4, 0x0) executing program 1: r0 = socket(0x1d, 0x2, 0x6) r1 = epoll_create(0x3) epoll_wait(r1, &(0x7f0000001d00)=[{}], 0x1, 0x80000000) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x201c}) executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) [ 293.865136][ T28] audit: type=1400 audit(1714783449.262:2287): avc: denied { bind } for pid=14698 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x2) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x224203, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x60}}, 0x0) socket$kcm(0x2, 0xa, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x4, 0x6, "b1253bc598074631b66eb7c3c1695132c595e1"}) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000400)=0xffff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, &(0x7f00000007c0)={[{@nombcache}, {@nobarrier}, {@norecovery}, {@journal_async_commit}, {@nodiscard}]}, 0x8, 0x60b, &(0x7f0000000a40)="$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") r4 = open(&(0x7f0000000100)='./bus\x00', 0x400145042, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r4, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x80, 0x0, "9181033835aeb99f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001040), 0x13f}}, 0x20) epoll_create(0x875) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001140)={0x0}, 0x1, 0x0, 0x0, 0x40448c3}, 0x0) executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001f00)=ANY=[@ANYBLOB="200000005e00250e00000000000000000c000080eec47c8e670527ab04000180"], 0x20}], 0x1}, 0x0) r1 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe2, 0x0) io_uring_enter(r1, 0xb15, 0x0, 0x0, 0x0, 0x0) executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x224203, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x60}}, 0x0) socket$kcm(0x2, 0xa, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x4, 0x6, "b1253bc598074631b66eb7c3c1695132c595e1"}) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000400)=0xffff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, &(0x7f00000007c0)={[{@nombcache}, {@nobarrier}, {@norecovery}, {@journal_async_commit}, {@nodiscard}]}, 0x8, 0x60b, &(0x7f0000000a40)="$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") r4 = open(&(0x7f0000000100)='./bus\x00', 0x400145042, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r4, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x80, 0x0, "9181033835aeb99f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001040), 0x13f}}, 0x20) epoll_create(0x875) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001140)={0x0}, 0x1, 0x0, 0x0, 0x40448c3}, 0x0) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001f00)=ANY=[@ANYBLOB="200000005e00250e00000000000000000c000080eec47c8e670527ab04000180"], 0x20}], 0x1}, 0x0) r1 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe2, 0x0) io_uring_enter(r1, 0xb15, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat(r0, &(0x7f00000000c0)) executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x0, 0x0, 0x6}, 0x1c) executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x87) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="fc", 0x3, 0x0, 0x0, 0x0) [ 294.033484][ T28] audit: type=1326 audit(1714783449.432:2288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5426bbfca9 code=0x0 [ 294.035137][T14722] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x224203, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x60}}, 0x0) socket$kcm(0x2, 0xa, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x4, 0x6, "b1253bc598074631b66eb7c3c1695132c595e1"}) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000400)=0xffff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, &(0x7f00000007c0)={[{@nombcache}, {@nobarrier}, {@norecovery}, {@journal_async_commit}, {@nodiscard}]}, 0x8, 0x60b, &(0x7f0000000a40)="$eJzs3c9vVNUeAPDvmf6kfe+1kBcVF9LEGEiUlhYwxJgIe0Lwx85VpYUghRJao0USS4IbE+PGhYkrF+J/oSRuXbh14caVISHGsBBDZMyd3lum05nSTmc6pf18kkvvuadzz7lDvz1nTs+5N4BdayT7pxSxPyKupoihqrzuyDNHlr7v/p83zmVbinL57T9S3PgkLVafK+VfB/MX/zMU6edSxL6u1eXOLVy/NDkzM30tT4/NX746Nrdw/fDFy5MXpi9MX5l4deLE8WPHT4wf2dT1VRd9+tb7Hw59dubdb79+mMa/+/VMipPxKP+G7LpqX9u3qZKz92wkykseVB/P3tcTmzz3dvHXUPFz8liqPcC2dT7/eeyJiGdjKLqq/jeH4tM3O1o5oK3KKYo2Cth1UlPx39/6igBbrOgHFJ/t630OXq3U5l4JsBXunVoaAFiK/Z6IKOK/e2lsMPorYwMD99OKcZ4UEZsbmVuSlfHTj2duZVvUjMPVGTYEWmjxZjHKXdv+p0psDkd/JTVwv7Qi/ktVW3b8rSbLH6lJr6//AbTC4s2IeC5v/3tjQ/E/UhX/7zVZvvgHAAAAAACA1rlzKiJeqTf/r7Q8/6e3zvyfwYg42YLyn/z3v9LdfCe1oDigyr1TEa/Xnf+7PMd3uCtP/bcyH6Annb84M30kIv4XEYeipy9Lj9ect3qG8OHP933VqPzq+X/ZlpVfzAXMz3S3u2Yh7tTk/ORmrxuIuHcz4vnK/N8D+ZGV83+y9j/Vaf+z+L66zjL2vXT7bKO8J8c/0C7lbyIO1m3/H3e309r35xir9AfGil7Bai98/MX3jcoX/9A5Wfs/sHb896Xq+/XMbez8vRFxdKG73Ci/2f5/b3qnqzh/5qPJ+flr4xG96fTq4xMbqzPsVEU8FPGSxf+hF9ce/1vu/1fF4Z6IWFxnmc88GvytUZ72Hzoni/+ptdv/4ZXt/8Z3Jm4P/9Cg+HR2Xe3/sUqbfig/YvwPqq2+H8d6A7Qj1QUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAp1wpIv4TqTS6vF8qjY5GDEbE/2OgNDM7N//y+dkPrkxleZXn/5eKJ/0OLaVT8fz/4YjoiYgsPZGni/yjEbE3Ir7s2lNJj56bnZnq9MUDAAAAAAAAAAAAAAAAAADANjFYWfNf7qtd/5/5vavTtQParjv/Kt5h9+lu+pXlvpZWBNhyzcc/8LRbf/z3tLUewNZrHP8PHpYrtrQ6wBbS/4fdq8n49+cC2AG0/7BbrXNMr7/d9QA6QfsPAAAAAAA7yt4Dd35JEbH42p7KlunN80z2h52t1OkKAB1jDi/sXt2zna4B0Ck+4wNpee/vuov9G8/+T+2pEAAAAAAAAAAAAACwysH91v/DbrX2+n9z+2EnW2P9f73gd7sA2EEaP/pD2w87nc/4QHrCLwLr/wEAAAAAAAAAAABgG+i/fmlyZmb62tzC07fzRhOv6ut05Rcnt8Nb19qdR+05c09EbI8L3Oqd4hYcHaxGh38vAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAy/4NAAD//5KMJxg=") r4 = open(&(0x7f0000000100)='./bus\x00', 0x400145042, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r4, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x80, 0x0, "9181033835aeb99f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001040), 0x13f}}, 0x20) epoll_create(0x875) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001140)={0x0}, 0x1, 0x0, 0x0, 0x40448c3}, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001f00)=ANY=[@ANYBLOB="200000005e00250e00000000000000000c000080eec47c8e670527ab04000180"], 0x20}], 0x1}, 0x0) r1 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe2, 0x0) io_uring_enter(r1, 0xb15, 0x0, 0x0, 0x0, 0x0) [ 294.087898][T14728] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem\xda\x99R@m\xfc\xfe\x9b#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f000002eff0)={0x135, &(0x7f0000000000)=[{}]}, 0x10) [ 294.171858][T14737] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem\xda\x99R@m\xfc\xfe\x9b#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f000002eff0)={0x135, &(0x7f0000000000)=[{}]}, 0x10) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)={0x14, r1, 0x1}, 0x14}}, 0x0) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6000000002060101000000000000000000000000050005000a0000000900020073797a32000000000500040000000000050001000700000011000300686173683a69702c6d61726b0000000014000780080008000000000008001240"], 0x60}}, 0x0) executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)={[{@errors_remount}]}, 0x7, 0x54e, &(0x7f0000000540)="$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") ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x1, 0x700, 0xa7b, 0x3, {{0xe, 0x4, 0x1, 0x8, 0x38, 0x68, 0x0, 0x0, 0x49, 0x0, @dev={0xac, 0x14, 0x14, 0xa}, @loopback, {[@noop, @end, @lsrr={0x83, 0xf, 0x6, [@empty, @multicast1, @empty]}, @generic={0x7, 0x12, "99bc733c03938b51b561c8370909d5c2"}]}}}}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@dellink={0xfffffffffffffddd, 0x11, 0x800, 0x0, 0x0, {}, [@IFLA_LINK={0x0, 0x5, r0}, @IFLA_GSO_MAX_SEGS={0x8}, @IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}]}, 0x48}}, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="5da769033d6cb8b5d9fea5000000000000000000850000040f0097b2000018000000646c6c2500000800000000007b1af8ff00003c7a0000bfa10000f8ffffffb702000008000000b7030000000000008500000006000000950000000800"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) unshare(0x2040600) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x1, {{0x42}}}, 0x10) bind$tipc(r2, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42, 0x2}}}, 0x10) socket$tipc(0x1e, 0x7, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) r6 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000040), 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) inotify_init1(0x80000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x7fffffff) executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x224203, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x60}}, 0x0) socket$kcm(0x2, 0xa, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x4, 0x6, "b1253bc598074631b66eb7c3c1695132c595e1"}) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000400)=0xffff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, &(0x7f00000007c0)={[{@nombcache}, {@nobarrier}, {@norecovery}, {@journal_async_commit}, {@nodiscard}]}, 0x8, 0x60b, &(0x7f0000000a40)="$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") r4 = open(&(0x7f0000000100)='./bus\x00', 0x400145042, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r4, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x80, 0x0, "9181033835aeb99f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001040), 0x13f}}, 0x20) epoll_create(0x875) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001140)={0x0}, 0x1, 0x0, 0x0, 0x40448c3}, 0x0) executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) [ 294.893420][T14750] loop4: detected capacity change from 0 to 1024 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xa, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005240)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)="7557ce6c7cb87e7fb2c2d4547739d92d04aa3ea3125dfd51295a3de14eed0cdfc53a037844617c1c69f1524a7af4b243e6846e6f14c5aad75248b1c90001472d32ad7273b96a5d32d8c61fb1e380a61cef62b68ba354717ca6f0fc4776068a59ff5d0030af820682560eafe685a35a983e106659e4ad245806a191a903534da05be9a5da8f161c004469d5e0c51f48dae4280bef3f87875fc349f307278c4c31845aec0bc8619562de19b854e29ce527351457ccf80e8266b57a5094ebc0a51de1186e42d6bd265fefead9470bd8afd634", 0xd1}], 0x1, &(0x7f0000000380)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000003880)=[{&(0x7f00000004c0)="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", 0x7fffdef2}, {&(0x7f00000014c0)="02c6ceb23088f2a20aedf8dda5575e063fb1facfcce4354cce660eb8f519a166653668fece163f13ec289d9eddfb0dd276db647b4bb25020aa03def3bc6524bef479d18c03ef2f709d91f01c4d1c4c28b3d9fc98abc49d5bf187733ea921d02dba5df46de6f4909e289b79dcd8e313746d82025062b0c51b67462c6e58e2f75a9148aa5d5470a62b52c052e90a627b916e50e3cddc", 0x95}, {&(0x7f0000000280)="836e635493df107db23a7065b6a79ea502ad2fddb570e76d665c79908e9719b4c123f7f5f05515", 0x27}, {&(0x7f0000001580)="b0ae514481f5595f512c3acf8542ac0a2d1e5bbcaf5e69e4c0e7fc01991f9ee9188798ff3a755ed9bfd6be1e41e9eddad92a7a0cce5d8a2f45cb5f5ccaf0bfd332342cb1a487d30eb91251edd3f8179c49c2", 0x52}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="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", 0xfe}, {&(0x7f0000002700)="47e5fe7a5caffd6ebb1a3f1b8a8cfeda13122103e9a3d1e9557d32380f87f9b7911edae88a06cd16cd1f797e78f1cca11bfa0a3179a38ffb9e651750089ecf263edcfe83c7365dc8f9c34f6aa20a46692bc11bb6526ab810ba24b0c322120674606fb29378756a49a75ba3f5762d983c2e6ab5bc18973fed6d9c637499cbcc7289d8011f568ba13f5c9799a1aa20f0e781f4313aad794316b577ea9dddaf93c6215f8802bdfa3687928ab37bac90cea1edb2e59cfa51fe98a74863649903", 0xbe}, {&(0x7f00000027c0)="29a2ce1ba1634b8e9621070735979e0b37eda4587b6d16f1c1509d97a91e87a741a39ec3bdb5e1c8ea42476b807c21b51ca8c7e492c1d98cfe8be9808069a5f5dea3df0486631104a66e8f376d561addbc6482901b60279f72e465dae0ee596bb37c6d1c8afeafd1328312058fadf38cf8d045af7846ba384af4081d3e51e57171b9133598c633", 0x87}, {&(0x7f0000002880)="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", 0x1000}], 0x9, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000004e40)=[{&(0x7f0000003940)="75674171146a8b6a63e46593170db7165c698ace316c379a4050166ba94c7adb2905144a99c15c89f96e90ba14f282583a80102b97f4e6b5d2604be639ac69", 0x3f}, {&(0x7f0000003980)="3ad769b8f51ae7716f1b5ee5fe41588f7b4763f244afb6ff555bae9c4f0d580164109ea147974aeef3d12ba8cf5410b18b31d0465efd78a17583f3312f71458a0cceeb818d209ed2392a72e8967a3377035051b92107dcc7bc57ae052684", 0x5e}, {&(0x7f0000003a00)="52b14ad908d2ee7bd3353dd3a3bde916e10fb06a4a9d56b70205d2ead6e4d07303406214e0e957386e93885f88a766b7902366d1285f0db1a21098b39741591afc039796a17b34f513ff05b4b98ad43716d9b0488976ff32a488713f95c8b6efd4c8598da33f9093719476dd87a49e61fd1d5858b4fdcc4ab20b2560f4588cde3852ae92c5a132ea84b6f4ee93279d3f7d2fc234ff86c9fa04d41e3d61d9fc464a07faef55c8e626ea2ad4b1e4db11fc26fa450cfecc8b7e2639976404e3b2f90a46c0e7a9c41c686b028cb1a0d321324ec6c392da93f063", 0xd8}, {&(0x7f0000003b00)="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", 0xfc}, {&(0x7f0000003c00)="7c68dba5e86ccb10224c8b4823aa77fe3354af16d47250a63e61a53b1e125119267f97a580a0e5db444fbf3de8fc3e5c693b5047b9d130454b6355c07b56b6c1c3e30547a6af8ef820b4ce8bf213de2eb77add85e21d0474d79cf1fbc54a249c502495d93c586784cc53c6000d6ae9aab7a295445559277cd7bf43383a0a9c68e25b3756fa005544357a5fea6f46eab995ea7ba0b81e94e4c3d41d9a3cfbf492a7d8dd1a27eda00e5dedbd65d4d82c7e0aaf21f6b0d49fa3", 0xb8}, {&(0x7f0000003cc0)="61d4c4ec93b96db28100dd11c8cf8ab138e21a701ab95e728460edecf31a9ec390ad7bc0a238e93a68ef160e734930706cb3f6d767c1feb8c5ad1aa069e939ad3b2de32aba93e6074d4ca7d4d90a43fc5ae45e3d06a60f9078e5659c8d4522d35543287e953c942dac5c1e7a4a9594298b62093d25cb0a5aa8a1a79a2ae7431b4abb0f36d6c16e1f0340c317f02cf4277128e658437364b72779f476518afb47beeefec3daa34c3e253d9475af47b26f1e1232075042976a5e545fa79b5c97cda7e083d5e3a26ee01f11a860da1b97e53d41607e7316299dd64651d972c7d279a19df52d1087694167d4e698335d1d24e3cba81ca7e3f50767962b2cd3368bc0fddb95f955e1d7002acc738a570a76a1df503781c39037906026fa388455cb7e24ed5ddbb7d87000af08944677735e23bc7e6d38c19b829d24c89b5f1b4856cbdb05a9a2fee151f7fc41ea4d9b373e5ccf1729e9012bbbcce85b7de0bd0f0e3003cbfa63e2ed5539668c2838b1dad69da98d7420d208ee946ff276da067c71b3aece53edb439f256772bb2381fda56254d685042278482dc8d856b3b964b54ee02f83a9ed5ac4e09a0934405999e16446a6866fdf72e526212988e3ab310ecee8e31634c2dcfd93debff3a3aecea1bd5b6a31ee03f1ef3b699f042eeab3e70576194f72141561b704486d549fa26955e6cb57b24e48b64ef2484d85a70cf4f18e92eef446dcb78ce43c0feaff827fd8ccd68c540b0f7771c5583f3ef62174eafdceaeda0631fc78e8b617c3f6dffb5b6ee6ad71770a25411b9cd9d78094b90f960b77300df99789dc51268aabc0905bc9fb43127acad0347a8d0e18d52be64a0309304bca36fdd3dccc56c46b047c046121d3b151c405fd99953781c534f9d664a244d1658bb4256838601ea2436ecdd67a4a5baafb2f1b80491cc1c215988925331930bd60e8bd02834594545da47afd361364045e43cc7ef062fd24abc716b8892e7fb398b5cfebf3112d8d047397850976e8918382a82df929964212f056590c5d9f4a1ae3ef6f65d08331b9f65e18047ec3b95a50e42ea39fc26d4f66d544d6b7955c731ca8a2db8f987a2223f6d2b1c3540860535d723a367990b90f4a46d513ea8e21fd7962efee4ce0af9fd8cf03c6860b68dbd9dd5dc3aee0640785753e398e89edae3bce59f66d1d6276f74c408d31ae3d5a1e034f03e3ce148c9039835ad860884ae2e141b5b3998c95f44f06814c84ddaff3e64c7fdf09c7cc6e53370f9f3ee8c410fe22d99f08fb17359e5b85c0eb1db58671f1fe51d327b01c8e31046a39c01aaeefaeedf675360b657a97c1a943792da732ca6151654530b4b7acec4182d9b1da353173ee0ac20591af8fcb3b9032820ccf1350c185441fbe847a38522c20a8ea1ad92cbb93f785552cee1070079248acb7b62989f7e708e68dabae6c2e8e3afaed62f3e95c4ea3ad8bcb36870841a94dd22bbf2ac988f11cd9f8f68630f604221d65ddd54842765aa478c317dc7d6d5718670ec8f0c7a515e20e85eaab7d2fd0124aa2635159c9ee50dce077c7403c90740bdfad6a1253f59a2b44d40e55ca4e5a0329f3763dfd5966c5d755e7e80a003b2070abe50e6793b2edd0978e714688a9fe1066bef5232b44f0b876a96429dfadc80a6a33b20abd41058b93ca82a781e7988caa2263837a17c1438f351a04952bfdb7c3226b700e7ebae39be0315d0a73898ecc55e159a1d68b6e3e1598d74b7f7cc3491304a86a43f45130c74467ea352f320304e411f628cec5e35d5b4c293337aaeed13c70aa88362eddd0f04f5b300d5a7dd79c61f61c911fa2ba625aa9fb4050188523656c36aa4aea2fce019530e3493c2f4d10861650d18819b39e222b370c2fe83898df66f2181d32b05ccccce8ea3082f725cd2a60d24f350c515e83b20d1fa2b82f0eb508623cfae3e8df6c03a459df8e0936b75d8f5d4451b34c78808ccabc8588342e8aa05587d5616ce0296d614b84e726978973ebf05a5b23d67dad00cab68aa8597e7f425457afe839a42517dcaaa9470dde4729d124a0aac0eb8c4aceaef3ccfd72a9b4178ffce5d6e1a1514fb86fcf14fff7686980353346e3689894124facd8d62aad16e9a9c57e590bcc343a3a36b5d9c54c5e7cdae9ec3381052ab50090273d390fb3680a2bc8112e2014dc91fb4259ef62470ea78215915ecfb318411992f8e2a28c6c4c8fdb7f3e6aea9ab514ec01e5db2ca1cad0a891a4ce804efb94f05ea30da8b2adb90b47f2a0176d8dc5cd77721faf7b6d1482e672e2278bdda368c8ccf0cd7ff73eb1779b696e5665bad9eb9f7a7e9421cafb1b2e7dd2c0aad32fade3b0435883c0b25655c50d32d02cbcf1928cc2e53c79d3fef25e28f09ac9252d641f59203a7d6e88d0fe5a9494eb7539f6468280e823f409519f3a20a0437252b2558fab62fabdeaeef288bbf86a82d4c891ac11903806578d866fb74c12ace58785e9a018ef21574a179db73d849d915cc40140c9579d78c34f7e4ee78b4c416d8fdef5feb27268eda378be3f18617abc7e19b7fd36198fe4508b94eb10a625e5cfa3a4091b0ba46da4a11cba27a50136f83b53b7cbfcaeb8417f82f509194d42ad2f949c000fda94b9b292452463c641f068f4ebd0e0a626c3dc9818160bec45531ffec69d11ed544a7e9971fa44886b77632819f28f1190208cc3b2ac5514d5cf48802962ae44575dbaf346b1240125fd73e17aaf07ce764e0da602472ec50ec53d2fb1f962ce3f75454ebdb529f76c991baa7ece2f7b9883b6899359f3e766f13a7b605427a863212d336757a0f1aff6b742e7eb8b4aa59b7800f026f5332a50770d7e805163b8d90b46dde39c20c187e034d3ff5cde6814de285f87031cd3b11ba138f2fbc2909fea2785f559837b3ea47f90bfae0ea3ac527c7b3c9b1b3ec40e169dc417cad13408eb53f000ad8e5f5fd8d74ffe743d01c6e0b9930dcfae4de1e5293615086aec8ba9b9bad2de999119fa7e884380efcf6eb3326c51acc5f5686310b3f21ec64b907e835a6ffb4e9c51b770ec3e60ad1762cfa314f3272ae7e3bfb7f561bd7c7abb41e8aeae3ae002711350d2045312e79cb688471fd71edeb0219a75e6fa6e9dbb8b7bcfbea0e4ae40aa3444dfd5a0670122f2268de6e83a0912e92035cad4f6da2c346d458361e5855c366b7f461635f1c816870584b1e34f3b13aa41e10fb2ce583dbd1887bffd35a377428f43c1d1d9a60ff310f0302ab82aa232783dccb2a97303d4c10963663203d52d0c5d51cac08a7b08480bd8faea176a5eaa8cf12c685ad70e0163bcdae5ae4ea41b955130eb550e00d59833680f68b808a7389bcac8f47557245a83af9eab3cb6aee847d93b7334f5fc306e688718bcf0e12134587daddba3e71e2aefbd55a93a43d66f51d07b8f397055baf2306ac28c80ac154e241cf748162a2f564bab7bb4a41a0efbfdb04af1ebf0e81f971d1350bc990cc579d1eafc0d61d777c3ac028b2c1dbe4b35c39177bc0403f49d1747562234202ef0832d36aef96e4b6223057841c5eb61ca8cc899822b52aa75becee4afd693d12938894a982b8235d4c9ea1b68b82f0d58d09f6c82275cfd2ce79cda10bec90720876b39fa8d995bc526e8d1ae10b1833c4cccf7bc37fa9de1a267fcc56f7e7f0e27e21c09e802803dc202e5995018793d5871cc313bb423d8642ea007d47e6c77c948aa21a720139cd36804d70f5d69f3188b7864080baf50c7ae38794f783200b1688e89677f12d827d85aff94dd86c4f8da66bf25e239065b29b0f5151a783d346b9fd6fea51acb17aac0f0bdaddc3eedaff517b478013b64d190cd0f068aa5b76b1dc07581f21a159566e19c687b88bc4e3ca8d3673feae46ff499e2595ec9c91e01630a9065bc1df375c6cf4b82fea398105dd9e151fb1a287725ce30a6b3a32b76d4722dd3bdc680c337c2be3097b18f9921a70a42576f4fd115d755da98c4a05e1d66d5ad97512c7cafb125ca3a12bdf920e2c7927ebe571e9c83078baf70ba128b1e1d7ffa180de732eb95603714aee7a0cbdb51cb517c44d6a902e6d16b059a53f128e9c75fb6bde3d9b6480287cc69aa61c1e83e4f15d032a3c206ecf6fd4c71c76e4db325e4aa85db1a38cc7bc9a08a6262592a427672d7f0c135e1ac06dbda7c00c7d744ff35565655f5dd4b4541380a66a483732052099c8866d0a434c45f9b6406ac782b807914e831fddaad675e2eee090ac706869825f4e6196450354ac3b31495841ea3db094439da58f28e572dfcd0c07e9a7421dc1d7f9fe5ebbe4a7d202cfd76cecc8124ba3e56fe951767bc81c4e0d1273d6c4498380272bd8d0af92ecdee59ea6beed4128bae3a4c5c52116b72b4dea75ea0cfd0164d57596ce29f2e29c5842698e487f4c218781a3c3dedc8932eb90cbdbdd6bccea8b06f371332f1a01ba57cd4fcf5b66bb760c797c1b0ee55d16429c77cbcd0d6df7db1b6e733bd971f1720b3e0f4370e43b9feb9747c654fe01b12ba0a044a1860be87d3989ce2a02b2d380fd2f069fe9e637848178e9fd92c05e50719c4b2ddcf15e566e8682df387eb88076157067b8f5c2ca8dc6b4ab4de4ab0a4cff146f8f3565936cedd31b620e322061b65bcb9eef3db1f5b2cfcc96fbf4513c8e571817e35f8d98d0c48b7f87b3f8b31cfb84c5d4feb0362c28e6b91cf078bcb97bf5fe5c21c559ce9be9bea863818d9c4c010e450af5650623909b25e5e845e4832dc44bc3bbf56f2872780b8546e1dfc52ceb9e577a736c3e12933edfb5c57253ea86543feeeae6bb17669bf8c44707c074470285980ee1d75591f5b7682ac52d04f3057ced4fe975e75a70dd0d97892771af99d66e299aed63c556635cd46f87fe67efdcc79c791ec5f67fdf255a5af74813d1f96389f63eeadf197720eb8e5d73b69a40ddc3940785738d2b3d8d0c01cc5658b8f9fd8ba406c429dcbcabb235de3727ca89e703aa8fdeab2f5367fda2a1364cd06e39921266bf8a755f9f6dcab9e65e5dfa58b5bf4d40e5ef49b6a1eeb4eccb38720e3e3b0cc3b28dd4927ca3688e092143a9ed6d93ae3bd4f8090b3d9ad2a93296a747af2c952e10cc03ecebad9753485fa2a1376ce9dd0f2298d92820d25474a92ed43c347a61b3c764a2b6be2b4a593c22466f0ee9002ba8c81115395a6fa5b56ab3020a25790ece88908a419c72da5548a0ceb63b2f9c76566ceee7e898cb410f66a0a13545e5c71a958a8c46242fa4971c7c89bb07c0f1a554bba985e893a0a5790351b0864abb03c627e1d319c56a96b9113fa536e6c6ef46f419eac313bcf8d179649bb62aa2085b1a6ec33273266d396415f836351accee221a19d61361d0ad58a99190d7d0f4ab9f29ac1fc909f708bc1519920b738fa50cb39f1de2de7241b3510d9f3560e501cfcaa64b22a7f9901e748a7c3203e902e45b5d50d3ae095e99ba77594521f71e7accd0373c9f847b63123ac84f71835eb8899dd5043d12716dce67dd2e4bb1eff13f0432e10d7af260bcbc2e5a66e35f267c9229fa90684b2d282bda79e762430613967c35ff84059cc1b288fa9b6bd4929886a668405b6b3169db2017e15ad999b233ab53c0b037d819acba8cc6a6dfc1762a9e9fa211d62e10c89bbd8664f83f42fdc4d77e86619069eca84a91c2c33a6fe459b1d34c6d0ea2355d9f118c1c4be81f66b162a66eb9d3d478c3c12c30ccc9079aa09cc05a9c2a6c5b93098a53ec890af69eb0dbef724e2871b5322aebf4b2faa5825200", 0x1000}, {&(0x7f0000004cc0)="2e90b2f601ec19c34ddffaa67279c726df39ddc36ce6cd25225e441f329e96e39d6639ddb51ee01b8327dabbb1b4ee7766a7adad1f9abfb119a0a6763296e1239db028eede4d179ee8facf5df3d1bfaeb35627e5eda0a4de0a3ca4ef4bb6fe246e4902ece287c7b585b36ca47dd5dedb6400d283f39fded8bcc813dd46343232f0c255fd8756822aebce060ae293d71b47ea43afbb83fa6c07a75581", 0x9c}, {&(0x7f0000004d80)="527b5f81f1695c9eecc183dac2e980e41811f3438697793299b2a27a4131896bb5e2fb77d3224c05d7e1bfaefa731a2449d1d1d3f57d7a043380eaa8c0c9460fee19ba40de56b6bc13ee373f37b93de458322d4d385e46fc72729d964429de4122d5722db9f852ccc7ccbf10", 0x6c}, {&(0x7f0000004e00)="7598d21557a23cf6060486609cf377ebde63", 0x12}], 0x9, &(0x7f0000004f80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}], 0xffffffffffffffd2}}, {{&(0x7f0000005040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000051c0)=[{&(0x7f00000050c0)="96b1393ed237f997c453d4fdb723c9cb33bdf73de88554fba3f40cb4113b527c80f1a2dd16745e293cd7dbe41df5d355ab8e3bbbdf5acb74d2c7507a070a0191f8110520eef7febf6524652a50b60844d2667f57929478956f02490525ac2706a7ee92081702d4baf495336baa63372f3eb5221186ec957d21bc123f5de8e9ed1f482c43ed521fcae178f208b0d792f7fe94899dc07a1da9d0ada71e1b8b13ac7be8535d4af0502a25287fd732f3a4620f2e735c5c6ce62f8581f6a1ae59c74448ac9d74", 0xc4}], 0x1, &(0x7f0000005200)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x40}}], 0x4, 0x0) executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x2) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000001700)='team_slave_1\x00', 0x10) connect$caif(r0, &(0x7f0000001780)=@rfm={0x25, 0x3, "97043cb15933228220123530318b377a"}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240), 0x8000, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x2, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x2}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) syz_open_procfs(0x0, &(0x7f00000000c0)='children\x00') socket$l2tp(0x2, 0x2, 0x73) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, 0x0, &(0x7f0000000040)) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x224203, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x60}}, 0x0) socket$kcm(0x2, 0xa, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x4, 0x6, "b1253bc598074631b66eb7c3c1695132c595e1"}) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000400)=0xffff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, &(0x7f00000007c0)={[{@nombcache}, {@nobarrier}, {@norecovery}, {@journal_async_commit}, {@nodiscard}]}, 0x8, 0x60b, &(0x7f0000000a40)="$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") r4 = open(&(0x7f0000000100)='./bus\x00', 0x400145042, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r4, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x80, 0x0, "9181033835aeb99f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001040), 0x13f}}, 0x20) epoll_create(0x875) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001140)={0x0}, 0x1, 0x0, 0x0, 0x40448c3}, 0x0) [ 294.936281][T14750] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (62631!=20869) [ 294.956419][T14750] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 294.966687][T14750] EXT4-fs (loop4): can't mount with journal_async_commit, fs mounted w/o journal executing program 1: unshare(0x4000400) r0 = socket(0x2b, 0x1, 0x0) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "edc6c09062e92cfd285341e1d02b74cba72f579defd097b200ab1122a8c08c455b922c6e3b528666b2ce5d9f0a3ca5f0c5931f141e16fcd1063a6cb2811f55"}, 0x60) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000004c0)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000880)=@newlink={0x80, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4104}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x5}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x49d0}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10001, 0x1}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x80}}, 0x0) [ 295.014237][T14750] loop4: detected capacity change from 0 to 1024 [ 295.030506][T14750] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 295.045875][T14750] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000f40)={'macvlan1\x00', &(0x7f0000000e40)=@ethtool_drvinfo={0x3, "406018cd0067321ca6b59456bc263886cb3d5ff17b425c76de5b47053456d3c6", "89c1e448733ed13504898755db06d31086c349bd83ba48e73c86343e3f828f98", "bcfd3088207cdee3676c19607e9abbaefad298654c91e33b80062106de09465f", "cb86bd81933286af5219dadd8ae8e52360990be73bdd3781ab8b92822768c1ae", "7566e27ed9da690053891e3baa8286b48133d790f6863d0aa629f9347ae0e32a", "a0168690155a24537d580e63"}}) [ 295.070579][ T28] audit: type=1400 audit(1714783450.472:2289): avc: denied { bind } for pid=14766 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 executing program 0: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 3: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 1: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) [ 295.115677][T13962] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x0, 0x0, 0x6}, 0x1c) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x6b6176a54f4febf3}, 0x14}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000400), r0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000058000000030a01020000000000000000010800000900030073797a32000000002c00048008000240172af2e40800014000000002080002401c791e7108000240423930ce08000140000000050900010073797a300000000040000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000000400048038010000020a05"], 0x218}}, 0x0) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x6b6176a54f4febf3}, 0x14}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000400), r0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000058000000030a01020000000000000000010800000900030073797a32000000002c00048008000240172af2e40800014000000002080002401c791e7108000240423930ce08000140000000050900010073797a300000000040000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000000400048038010000020a05"], 0x218}}, 0x0) executing program 4: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) io_setup(0x4, &(0x7f00000014c0)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) mount$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x87) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="fc", 0x3, 0x0, 0x0, 0x0) executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d40)={@map=r0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@ifindex, 0xffffffffffffffff, 0x12, 0x0, 0x0, @prog_id, r1}, 0x20) executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x2) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) [ 295.236427][T14779] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.0'. [ 295.240625][T14785] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080)={[{@errors_remount}]}, 0x7, 0x54e, &(0x7f0000000540)="$eJzs3c9vHFcdAPDvjH+sm6Z1Aj1ABSRAIaAou/Gmjape2lxAqKqEqDggDqmxN5bJbjZk16U2kXD/BpBA4gR/AgckDkg9ceDGEYkDQioHpAARKEYCadHMju2tvY6X7nq38X4+0njnzZuZ73vezL63b5x5AUytixGxHRHzEfFWRCwW25Niide6S7bfo4f3V3Ye3l9JotN58+9Jnp9ti55jMk8X51yIiG98NeI7yeG4rc2t28v1eu1eka60G3crrc2tK+uN5bXaWu1OtXp96frVl6+9VB1ZXS80fvngK+uvf/M3v/70+7/f/vIPsmKdLfJ66zFK3arP7cXJzEbE6ycRbAJmsh/ppEvBh5W9dR+LiM/l1/9izOT/OgGA06zTWYzOYm8aADjt0nwMLEnLEZHujuOUu2N4z8WZtN5stS/fam7cWe2OlZ2LufTWer129Xzpj9/Ld55LsvRSnpfn5+nqgfS1iDgfET8uPZWnyyvN+upkujwAMPWe7m3/I+JfpTQtlx97yO4Ngj539QCAJ8bCQHuVTrwcAMD4DNb+AwCnifYfAKbPAO1/cbN/+8TLAgCMh+//ADB9tP8AMH20/wAwVb7+xhvZ0tkpnn+9+vbmxu3m21dWa63b5cbGSnmlee9uea3ZXMuf2dM47nz1ZvPu0oux8U6lXWu1K63NrZuN5sad9s38ud43a3NjqRUA8DjnL7z3hyQitl95Kl+imAsk8lkrgNPM1C0wvWaGOVgHAZ5oZvuC6TVQE553En534mUBJqPvw7wX+q5+0E//jyD+zgg+Ui59cvDx//mxlw44Scb/YXp9uPH/V0deDmD8jP/D9Op0koNz/s/vZQEAp9IQf8LX+eGoOiHARB03mfdI7v8DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAKXM2Ir4bSVrO5wJPs59puRzxTESci7nk1nq9djUino0LETFXytJLky40ADCk9K9JMf/XpcUXzh7MnU/+XcpfI+L7P3vzJ+8st9v3lrLt/9jbXtqdPqy6f9wQ8woCACOWt9/V4rXni/yjh/dXdpdxlufBjfhvMRXxys7D+/nSzZmNbGPEQt6XOPPPJGaLYxYi4vmImBlB/O13I+IT/eqf5GMj54qZT3vjRxH7mbHGTz8QP83zuq9Z5+vjIygLTJv3bkTEa/2uvzQu5q/9r/+F/BNqeA9udE+2+9m30xN/tog00yd+ds1fLL5/HRvjxd9+7dDGzmI3792I52f7xU/24idHxH9hwDr+6VOf+dGrR+R1fh5xKfrH741VaTfuVlqbW1fWG8trtbXanWr1+tL1qy9fe6layceoK7sj1Yf97ZXLzx5Vtqz+Zx4b/2D993/jXxiw/r/4z1vf/ux+snQw/pc+3//9f65v/K6sTfzigPGXz/zqyOm7s/irR9T/uPf/8oDx3//L1uqAuwIAY9Da3Lq9XK/X7g21kn0LHcV5Dq1kRRxs593u2nBB/xwjLPz8wIXvvzJ3Ur/VE1+Z3esrjvbM38rOOObqpCOvxVArj8YVa3KfScB47F/0ky4JAAAAAAAAAAAAAABwlHH816VJ1xEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDT638BAAD//2+Nyz0=") ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x1, 0x700, 0xa7b, 0x3, {{0xe, 0x4, 0x1, 0x8, 0x38, 0x68, 0x0, 0x0, 0x49, 0x0, @dev={0xac, 0x14, 0x14, 0xa}, @loopback, {[@noop, @end, @lsrr={0x83, 0xf, 0x6, [@empty, @multicast1, @empty]}, @generic={0x7, 0x12, "99bc733c03938b51b561c8370909d5c2"}]}}}}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@dellink={0xfffffffffffffddd, 0x11, 0x800, 0x0, 0x0, {}, [@IFLA_LINK={0x0, 0x5, r0}, @IFLA_GSO_MAX_SEGS={0x8}, @IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}]}, 0x48}}, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="5da769033d6cb8b5d9fea5000000000000000000850000040f0097b2000018000000646c6c2500000800000000007b1af8ff00003c7a0000bfa10000f8ffffffb702000008000000b7030000000000008500000006000000950000000800"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) unshare(0x2040600) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x1, {{0x42}}}, 0x10) bind$tipc(r2, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42, 0x2}}}, 0x10) socket$tipc(0x1e, 0x7, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) r6 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000040), 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) inotify_init1(0x80000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x7fffffff) executing program 2: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002400)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='tlb_flush\x00', r1}, 0x10) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) executing program 3: timer_create(0xfffffffd, 0x0, &(0x7f00000011c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) timer_delete(0x0) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000021007b560000000000400000ac8f6e5080024a0095"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r0, 0x11, 0x0, 0x2, @prog_id}, 0x20) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f00000003c0)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc7}}]}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], &(0x7f0000001180), 0xfffffffffffffffe, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000003b00090000000200cd00000001000000180002"], 0x2c}}, 0x0) [ 295.371796][ T28] audit: type=1326 audit(1714783450.772:2290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14798 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f23dab4bca9 code=0x0 executing program 2: r0 = epoll_create(0x5) r1 = socket(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x40003015}) epoll_pwait(r0, &(0x7f0000000440)=[{}], 0x1, 0x0, 0x0, 0x0) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x32) setresuid(0x0, r2, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40043d0d, 0x0) executing program 4: unshare(0x4000400) r0 = socket(0x2b, 0x1, 0x0) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "edc6c09062e92cfd285341e1d02b74cba72f579defd097b200ab1122a8c08c455b922c6e3b528666b2ce5d9f0a3ca5f0c5931f141e16fcd1063a6cb2811f55"}, 0x60) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000004c0)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000880)=@newlink={0x80, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4104}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x5}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x49d0}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10001, 0x1}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x80}}, 0x0) executing program 2: symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, 0x0) ioperm(0x0, 0x7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x10, 0x2, [@TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0xfffffffffffffffa}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r3 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000) executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000f40)={'macvlan1\x00', &(0x7f0000000e40)=@ethtool_drvinfo={0x3, "406018cd0067321ca6b59456bc263886cb3d5ff17b425c76de5b47053456d3c6", "89c1e448733ed13504898755db06d31086c349bd83ba48e73c86343e3f828f98", "bcfd3088207cdee3676c19607e9abbaefad298654c91e33b80062106de09465f", "cb86bd81933286af5219dadd8ae8e52360990be73bdd3781ab8b92822768c1ae", "7566e27ed9da690053891e3baa8286b48133d790f6863d0aa629f9347ae0e32a", "a0168690155a24537d580e63"}}) executing program 2: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) [ 295.426954][T14803] validate_nla: 3 callbacks suppressed [ 295.426975][T14803] netlink: 'syz-executor.4': attribute type 2 has an invalid length. executing program 0: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 1: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x6b6176a54f4febf3}, 0x14}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000400), r0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000058000000030a01020000000000000000010800000900030073797a32000000002c00048008000240172af2e40800014000000002080002401c791e7108000240423930ce08000140000000050900010073797a300000000040000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000000400048038010000020a05"], 0x218}}, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10}]}]}, @IFLA_GROUP={0x8}]}, 0x40}}, 0x0) executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020800000100000000000001000000000100140003"], 0x18}}, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x24}]) executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) executing program 0: r0 = io_uring_setup(0x30d3, &(0x7f0000000240)) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000080), 0xc) read(r1, &(0x7f0000000180)=""/40, 0x28) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x541b, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x6, 0x1, 0x0, 0x19dee5a7fb9884b3) [ 295.536740][T14823] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. [ 295.543285][T14824] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. executing program 1: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) io_setup(0x4, &(0x7f00000014c0)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) mount$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) executing program 2: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) io_setup(0x4, &(0x7f00000014c0)=0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) mount$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x88, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001840)=[{&(0x7f0000001340)=""/82, 0x52}], 0x1) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f00000003c0)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc7}}]}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], &(0x7f0000001180), 0xfffffffffffffffe, 0x0) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], &(0x7f0000001180), 0xfffffffffffffffe, 0x0) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000003b00090000000200cd00000001000000180002"], 0x2c}}, 0x0) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 1: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 0: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 2: mq_open(&(0x7f0000001b40)='\\\x00', 0x800, 0x20, 0x0) r0 = memfd_create(&(0x7f0000001c80)='[\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(r1, 0x9) r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) openat$pidfd(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r1, 0x20000) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x428c0, 0x0) r4 = getpid() r5 = getpid() tgkill(r4, r5, 0x0) r6 = mq_open(&(0x7f0000000040)='\x0eyrk\b\xff', 0x40, 0x0, 0x0) ioctl$FIOCLEX(r6, 0x5451) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) [ 295.742309][T14848] netlink: 'syz-executor.1': attribute type 2 has an invalid length. executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000a70000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffce5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='block_split\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x2b0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x2, 0x1, 0x0, 0xe, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x60}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_MLD_VERSION={0x5}]}}}]}, 0x3c}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) iopl(0x3) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000a70000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffce5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='block_split\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x2b0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x2, 0x1, 0x0, 0xe, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x60}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_MLD_VERSION={0x5}]}}}]}, 0x3c}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) iopl(0x3) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000a70000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffce5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='block_split\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x2b0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x2, 0x1, 0x0, 0xe, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0x60}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_MLD_VERSION={0x5}]}}}]}, 0x3c}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) iopl(0x3) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r0, 0x0, 0x0, 0x24008850, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) executing program 1: symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, 0x0) ioperm(0x0, 0x7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x10, 0x2, [@TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0xfffffffffffffffa}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r3 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000) executing program 0: symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, 0x0) ioperm(0x0, 0x7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x10, 0x2, [@TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0xfffffffffffffffa}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r3 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000) executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x32) setresuid(0x0, r2, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40043d0d, 0x0) executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x6b6176a54f4febf3}, 0x14}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000400), r0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000058000000030a01020000000000000000010800000900030073797a32000000002c00048008000240172af2e40800014000000002080002401c791e7108000240423930ce08000140000000050900010073797a300000000040000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000000400048038010000020a05"], 0x218}}, 0x0) executing program 2: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x9}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001000010400000000a5a9000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006272696467650000180002800c0023"], 0x48}}, 0x0) executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f00000003c0)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc7}}]}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) [ 296.345971][T14889] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], &(0x7f0000001180), 0xfffffffffffffffe, 0x0) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], &(0x7f0000001180), 0xfffffffffffffffe, 0x0) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000003b00090000000200cd00000001000000180002"], 0x2c}}, 0x0) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) [ 296.419140][T14891] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 296.431894][T14891] bridge7: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10}]}]}, @IFLA_GROUP={0x8}]}, 0x40}}, 0x0) [ 296.479992][T14899] netlink: 'syz-executor.0': attribute type 2 has an invalid length. executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020800000100000000000001000000000100140003"], 0x18}}, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x24}]) executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) [ 296.518990][T14903] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. executing program 1: socket$phonet_pipe(0x23, 0x5, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a0033d487277b9b108b4ab502", @ANYRES32, @ANYRES8=r1], 0xfe33) executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/202, 0xca}, 0x2000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x120084, &(0x7f0000000800)=ANY=[@ANYBLOB='cruft,block=0x0000000000000400\x00session=0x0000000000000006,check=relaxed,utf8,cruftAuid=', @ANYRES64, @ANYBLOB="2c8ef6ff096071854bb02441c2edff2c66736dbd9a23113d3078303030303030303030303001003066581c000000000000bd2551db78fc65706d62c543fd92499a55c4676e4ab57351fab1f213c1c9b96d7f9297aea36961e03f1f9b339e1208fe76adf8245531e4f11e82cd11bccd3e4d4cd5b4502ba9708a2827923cada4cc8ec20e806b1b5ece7f4afbdb8475f9b71f1eafd72d05729591892caacc55317bb19441bd11c979ca9786b51118d9b1c2246f0b407eaa2083113d1bab6700000000000000"], 0x0, 0x632, &(0x7f0000000100)="$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") r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfb1, 0x0) read$usbfs(r4, &(0x7f0000002240)=""/133, 0x85) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000dc, &(0x7f0000000780)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095", @ANYRES8=r2, @ANYRES8=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @dev}, 0x58, 0x0}}], 0x6c00, 0x0) dup(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000080000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000004e0a00000900000007000000000000009500400000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) r6 = fsopen(&(0x7f0000000080)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000000)='#}-%]*]}:(,@}/\'[)^-\xbd!-+\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000001c0)=ANY=[], 0x12, 0x9ef, &(0x7f0000000e40)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000}, [@printk={@lli, {0x3, 0x3, 0x3, 0xa, 0x1, 0xfe00}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd9}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x34d, &(0x7f0000001e00)=""/4071}, 0x90) executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) executing program 3: io_setup(0x81, &(0x7f0000000180)=0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) io_submit(r0, 0x1, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x200000000000000, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000340)='p', 0x300, 0xeffdffffffffffff}]) executing program 0: symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, 0x0) ioperm(0x0, 0x7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x10, 0x2, [@TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0xfffffffffffffffa}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r3 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000) executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="034886dd010000000000000000006000000001002100fe880001000000000000060000007d01ff0200000000000000000000000000010000eca140e00f24eb"], 0xfdef) executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) [ 296.673593][T14925] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 296.681902][T14925] netlink: 15999 bytes leftover after parsing attributes in process `syz-executor.1'. [ 296.690605][T14927] dccp_v6_rcv: dropped packet with invalid checksum executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x32) setresuid(0x0, r2, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40043d0d, 0x0) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10}]}]}, @IFLA_GROUP={0x8}]}, 0x40}}, 0x0) executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x11, 0x413}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'netdevsim0\x00'}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pwrite64(r2, &(0x7f0000000000)="c1", 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x6, 0x0, 0x6}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000300)=@raw=[@map_idx, @initr0, @map_idx, @func], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400), 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') r3 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r2, &(0x7f0000000d80)={0xa, 0x4e22, 0x3, @local, 0x1ff}, 0x1c) r4 = dup2(r3, r3) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000080)='[', 0x1}], 0x1) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@map=r2, 0x22, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map=r4, r4, 0x32, 0x2004, 0x0, @link_id=r5, r6}, 0x20) open(&(0x7f0000000100)='./file0\x00', 0xd9a996b82b51f8af, 0x1e0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x4, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = creat(&(0x7f00000006c0)='./file0\x00', 0x40) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x8, r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000780)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r17, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r18, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r17}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b80)={r18, &(0x7f0000000a00)='g', &(0x7f0000000b00)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x2a, &(0x7f0000000bc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4957, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb3}, @generic={0x95, 0xd, 0x2, 0xfff, 0x8}], &(0x7f0000000200)='GPL\x00', 0x6, 0xc3, &(0x7f0000000540)=""/195, 0x41100, 0x20, '\x00', r8, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8001, 0x8}, 0x10, r9, r0, 0x2, &(0x7f0000000900)=[r10, r11, r12, 0x1, r13, r14, r15, r16, r18], &(0x7f0000000940)=[{0x1, 0x7538c059, 0xa, 0x8}, {0x2, 0x1, 0x6}], 0x10, 0x9}, 0x90) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c0000001a0a01030000e6ff0000000002000000090001"], 0x7c}}, 0x0) executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) [ 296.787063][T14937] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xbdff, 0x0, "ec28a1ba80a20507"}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x17) executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x13, r1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x10e, 0x5, 0x0, 0x20000000) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) [ 296.832199][T14944] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 296.862104][ T28] audit: type=1400 audit(1714783452.262:2291): avc: denied { bind } for pid=14947 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 executing program 3: r0 = syz_io_uring_setup(0x24fb, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000200)='\a', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}) listen(r3, 0x100) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setgroups(0x0, 0x0) fchown(r0, 0x0, r1) executing program 4: symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, 0x0) ioperm(0x0, 0x7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x10, 0x2, [@TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0xfffffffffffffffa}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r3 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000) executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) executing program 4: io_setup(0x81, &(0x7f0000000180)=0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) io_submit(r0, 0x1, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x200000000000000, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000340)='p', 0x300, 0xeffdffffffffffff}]) executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) executing program 4: socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x3a) r0 = syz_io_uring_setup(0x416f, &(0x7f0000000780)={0x0, 0x0, 0x10100}, &(0x7f0000001240)=0x0, &(0x7f0000001340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x27}) io_uring_enter(r0, 0x567, 0x0, 0x0, 0x0, 0x0) executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x7, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000780), 0xe9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x50, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x50}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@access_uid}], [], 0x6b}}) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r10 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r10, r9, 0x0, 0x100800001) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fsmount(0xffffffffffffffff, 0x0, 0x0) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002cc0)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_script(r1, 0x0, 0x7) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x9, 0x0, "774c3302b1f1b066a380bfe207b87eee3eae02bd83c2a1221c61cc28de9738dd65a7087c64eb12c6b6de92c94c30ac369a9c40de052c528fa8db2e5e374fb46ca3db74fa6de1fc0d3b3daed2a0227652"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x2b, 0x0, "fca57b76070d3dab6b0ec22c3b4e860e817343e91f2a7ebc860f6f4fb693e0ffd7f933e856d35e17f5e064800e1b8ab99c03a012548145d120157e5da1bd9e00"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) [ 297.113818][ T28] audit: type=1400 audit(1714783452.512:2292): avc: denied { read } for pid=14966 comm="syz-executor.4" path="socket:[49396]" dev="sockfs" ino=49396 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000240)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {0x16}, [@ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x34}}, 0x0) executing program 0: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x205, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}]}, @NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc4}}, 0x0) executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0x2001) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0xf5, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x800, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time}], 0x38) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001040)="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", 0x108}], 0x1}}], 0x1, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r9 = dup2(r7, r8) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r9, &(0x7f0000000140)=ANY=[], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x800700, &(0x7f0000000d00), 0x2, 0x44a, &(0x7f0000000400)="$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") executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x13, r1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x10e, 0x5, 0x0, 0x20000000) executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0x2001) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0xf5, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x800, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time}], 0x38) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001040)="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", 0x108}], 0x1}}], 0x1, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r9 = dup2(r7, r8) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r9, &(0x7f0000000140)=ANY=[], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020800000100000000000001000000000100140003"], 0x18}}, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x24}]) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) executing program 0: r0 = socket(0x1e, 0x805, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_ct={0x64, 0x1, 0x0, 0x0, {{0x7}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_ACTION={0x6, 0x3, 0x28}, @TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)={0x80000011}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper', 0x42, 0x0) sendfile(r5, r5, 0x0, 0x8) epoll_wait(r3, &(0x7f00000006c0)=[{}], 0x1, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000500), r0) executing program 0: r0 = socket(0x1e, 0x805, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_ct={0x64, 0x1, 0x0, 0x0, {{0x7}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_ACTION={0x6, 0x3, 0x28}, @TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)={0x80000011}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper', 0x42, 0x0) sendfile(r5, r5, 0x0, 0x8) epoll_wait(r3, &(0x7f00000006c0)=[{}], 0x1, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000500), r0) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xbdff, 0x0, "ec28a1ba80a20507"}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x17) executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xbdff, 0x0, "ec28a1ba80a20507"}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x17) executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x7, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000780), 0xe9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x50, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x50}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@access_uid}], [], 0x6b}}) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r10 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r10, r9, 0x0, 0x100800001) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fsmount(0xffffffffffffffff, 0x0, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setgroups(0x0, 0x0) fchown(r0, 0x0, r1) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) r1 = syz_io_uring_setup(0x34d5, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r4 = syz_open_pts(r0, 0x0) r5 = dup3(r4, r0, 0x0) ioctl$TIOCSTI(r5, 0x5437, 0x0) executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/202, 0xca}, 0x2000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x120084, &(0x7f0000000800)=ANY=[@ANYBLOB='cruft,block=0x0000000000000400\x00session=0x0000000000000006,check=relaxed,utf8,cruftAuid=', @ANYRES64, @ANYBLOB="2c8ef6ff096071854bb02441c2edff2c66736dbd9a23113d3078303030303030303030303001003066581c000000000000bd2551db78fc65706d62c543fd92499a55c4676e4ab57351fab1f213c1c9b96d7f9297aea36961e03f1f9b339e1208fe76adf8245531e4f11e82cd11bccd3e4d4cd5b4502ba9708a2827923cada4cc8ec20e806b1b5ece7f4afbdb8475f9b71f1eafd72d05729591892caacc55317bb19441bd11c979ca9786b51118d9b1c2246f0b407eaa2083113d1bab6700000000000000"], 0x0, 0x632, &(0x7f0000000100)="$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") r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfb1, 0x0) read$usbfs(r4, &(0x7f0000002240)=""/133, 0x85) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000dc, &(0x7f0000000780)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095", @ANYRES8=r2, @ANYRES8=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @dev}, 0x58, 0x0}}], 0x6c00, 0x0) dup(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000080000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000004e0a00000900000007000000000000009500400000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) r6 = fsopen(&(0x7f0000000080)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000000)='#}-%]*]}:(,@}/\'[)^-\xbd!-+\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000001c0)=ANY=[], 0x12, 0x9ef, &(0x7f0000000e40)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x3}, {0x8, 0x2}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3}}]}, {0x0, [0x5f, 0x61, 0x4f, 0x2e, 0x61, 0x0, 0x0]}}, &(0x7f0000000180)=""/4096, 0x6d, 0x1000, 0x1}, 0x20) executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) executing program 0: r0 = socket(0x1e, 0x805, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_ct={0x64, 0x1, 0x0, 0x0, {{0x7}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_ACTION={0x6, 0x3, 0x28}, @TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)={0x80000011}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper', 0x42, 0x0) sendfile(r5, r5, 0x0, 0x8) epoll_wait(r3, &(0x7f00000006c0)=[{}], 0x1, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000500), r0) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000240)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {0x16}, [@ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x34}}, 0x0) executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89e8, 0x0) executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0x2001) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0xf5, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x800, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time}], 0x38) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001040)="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", 0x108}], 0x1}}], 0x1, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r9 = dup2(r7, r8) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r9, &(0x7f0000000140)=ANY=[], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) executing program 0: r0 = socket(0x1e, 0x805, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_ct={0x64, 0x1, 0x0, 0x0, {{0x7}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_ACTION={0x6, 0x3, 0x28}, @TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)={0x80000011}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper', 0x42, 0x0) sendfile(r5, r5, 0x0, 0x8) epoll_wait(r3, &(0x7f00000006c0)=[{}], 0x1, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000500), r0) executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0x2001) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0xf5, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x800, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time}], 0x38) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001040)="d6f40579c1c807eb87880f9f98831f2a881f9dac39befc6ccba9107e728c245ef46bca70c52cb6b78c0f8ef48fefdcb8d1a71221c5e298b288f20734d87d2eef10618a3fe382ce5f2897b19617815f4425f5138db8bfbcb7006e44d7d3847d9b4a40030cc4b2ffb7493f244c2da779ac3e02be6086418f7c11d81403a00b6a6c0d327e7779981017e7fb538d83574e69f0f06cfea21d1ada00f06fed2c41f9d6aa0cce4a547f05854708baecf9fd1320cb639d8d8c14195d6f1dad25b742f91c6a1048a7c0aa194098a9d2a9cd446bca35db982cdc4b6059b12d77ba9cbbd2443dda2a098f3807b9cde298d0c9c9a6470f5d99b52a01c9fe0cc2db0a1c84c5f8afb8b16bb76f8fdf", 0x108}], 0x1}}], 0x1, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r9 = dup2(r7, r8) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r9, &(0x7f0000000140)=ANY=[], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x7, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000780), 0xe9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x50, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x50}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@access_uid}], [], 0x6b}}) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r10 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r10, r9, 0x0, 0x100800001) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fsmount(0xffffffffffffffff, 0x0, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x9, 0x0, "774c3302b1f1b066a380bfe207b87eee3eae02bd83c2a1221c61cc28de9738dd65a7087c64eb12c6b6de92c94c30ac369a9c40de052c528fa8db2e5e374fb46ca3db74fa6de1fc0d3b3daed2a0227652"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x2b, 0x0, "fca57b76070d3dab6b0ec22c3b4e860e817343e91f2a7ebc860f6f4fb693e0ffd7f933e856d35e17f5e064800e1b8ab99c03a012548145d120157e5da1bd9e00"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6}, @IFLA_GRE_IFLAGS={0x6}]}}}]}, 0x48}}, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setgroups(0x0, 0x0) fchown(r0, 0x0, r1) executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x7, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000780), 0xe9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x50, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x50}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@access_uid}], [], 0x6b}}) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r10 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r10, r9, 0x0, 0x100800001) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fsmount(0xffffffffffffffff, 0x0, 0x0) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000018c0)='./file0\x00', 0x0, 0x3d800, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187017, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000, 0x0) executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000018c0)='./file0\x00', 0x0, 0x3d800, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187017, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000, 0x0) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000018c0)='./file0\x00', 0x0, 0x3d800, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187017, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000, 0x0) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) r1 = syz_io_uring_setup(0x34d5, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r4 = syz_open_pts(r0, 0x0) r5 = dup3(r4, r0, 0x0) ioctl$TIOCSTI(r5, 0x5437, 0x0) executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000300), 0x1, 0x257, &(0x7f0000000340)="$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") syz_emit_ethernet(0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd"], 0x0) executing program 0: r0 = socket(0x1e, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xa0179e12}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000001080)=[{}], 0x1, 0x0) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/202, 0xca}, 0x2000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x120084, &(0x7f0000000800)=ANY=[@ANYBLOB='cruft,block=0x0000000000000400\x00session=0x0000000000000006,check=relaxed,utf8,cruftAuid=', @ANYRES64, @ANYBLOB="2c8ef6ff096071854bb02441c2edff2c66736dbd9a23113d3078303030303030303030303001003066581c000000000000bd2551db78fc65706d62c543fd92499a55c4676e4ab57351fab1f213c1c9b96d7f9297aea36961e03f1f9b339e1208fe76adf8245531e4f11e82cd11bccd3e4d4cd5b4502ba9708a2827923cada4cc8ec20e806b1b5ece7f4afbdb8475f9b71f1eafd72d05729591892caacc55317bb19441bd11c979ca9786b51118d9b1c2246f0b407eaa2083113d1bab6700000000000000"], 0x0, 0x632, &(0x7f0000000100)="$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") r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfb1, 0x0) read$usbfs(r4, &(0x7f0000002240)=""/133, 0x85) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000dc, &(0x7f0000000780)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095", @ANYRES8=r2, @ANYRES8=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @dev}, 0x58, 0x0}}], 0x6c00, 0x0) dup(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000080000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000004e0a00000900000007000000000000009500400000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) r6 = fsopen(&(0x7f0000000080)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000000)='#}-%]*]}:(,@}/\'[)^-\xbd!-+\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000001c0)=ANY=[], 0x12, 0x9ef, &(0x7f0000000e40)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x9, 0x0, "774c3302b1f1b066a380bfe207b87eee3eae02bd83c2a1221c61cc28de9738dd65a7087c64eb12c6b6de92c94c30ac369a9c40de052c528fa8db2e5e374fb46ca3db74fa6de1fc0d3b3daed2a0227652"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x2b, 0x0, "fca57b76070d3dab6b0ec22c3b4e860e817343e91f2a7ebc860f6f4fb693e0ffd7f933e856d35e17f5e064800e1b8ab99c03a012548145d120157e5da1bd9e00"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) r1 = syz_io_uring_setup(0x34d5, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r4 = syz_open_pts(r0, 0x0) r5 = dup3(r4, r0, 0x0) ioctl$TIOCSTI(r5, 0x5437, 0x0) executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000400)={[{@norecovery}, {@oldalloc}, {@grpid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@block_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xcfb}}]}, 0x3, 0x434, &(0x7f0000000940)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0185879, &(0x7f0000000680)={0x0, 0x200002000001, 0xa690, 0x0, 0x0, 0x0, 0x2401}) executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/202, 0xca}, 0x2000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x120084, &(0x7f0000000800)=ANY=[@ANYBLOB='cruft,block=0x0000000000000400\x00session=0x0000000000000006,check=relaxed,utf8,cruftAuid=', @ANYRES64, @ANYBLOB="2c8ef6ff096071854bb02441c2edff2c66736dbd9a23113d3078303030303030303030303001003066581c000000000000bd2551db78fc65706d62c543fd92499a55c4676e4ab57351fab1f213c1c9b96d7f9297aea36961e03f1f9b339e1208fe76adf8245531e4f11e82cd11bccd3e4d4cd5b4502ba9708a2827923cada4cc8ec20e806b1b5ece7f4afbdb8475f9b71f1eafd72d05729591892caacc55317bb19441bd11c979ca9786b51118d9b1c2246f0b407eaa2083113d1bab6700000000000000"], 0x0, 0x632, &(0x7f0000000100)="$eJzs3ctu2+gZxvGHsmwrLhAUbTEIgkzyTdIBHDRVJHniQEgXZSlK5lQSBZIubKDAIJ3YgyBypk1SoPFm4E0PwPQGuptNF72IAl33LrosMGh3BbpRQVK0ZOtkx7Kdaf4/wxFFvuT3fqTCF7R4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAkOXUSqWypabX3twykzm1wG9NmZ4ubVF304G7M9uVrPhXhYKupaOufW8w+b34n9u6kb67oUL8UtD+t9779qPv5nPZ/FMSehM67QJfvt5/9rjb3Xkx50TeAsqdIKjhtr3Q91p2wzVe6Jvq+nrp/kY9NHWv6YbbYeS2jBO4ucgPzKpz15Sr1TXjFrf9zXajZjfdbOTDH1ZKpXXz8XJ/89//uBg6G16z6bUbSUw8OY55aL78eRri2i1jdp92d9ZmJRkHlU8SVJkVVClVKuVypVJef1B98LBUyo+MKB2jkYi5f2jxDTO/nTdwRrm4/v/DkpoqqK1NbcmM/XFUUyBfrQnT+7L6/+F9d2q7w/U/q/LXBpOvK6n/N9N3NyfV/wm5GJlkhnFTrAnj3+znpV5rX8/0WF11taMX81nurflleL4/DSkveQrly1NLthpyZfpjjKpa17pK+kQbqiuUUV2emnIValuhIrlqJdskkCtbkXwFMlqVo7syKquqqtZk5KqobfnaVFsN1WTrP71eb1dPk/W+NiVHZUHlkwRVpgRNqv+/+CL9nFL/32Uaqu1T44C3Ra9//H9Kt84nGwAAAAAAcB6s5K/vVvLd/fuSeqp7Tbd02WkBAAAAAIA5Sr75vxG/LMZD78uacPzfu/jcAAAAAADAfFjJNXaWpJXkpH5rcCXUSU4CWLiAFAEAAAAAwBkl3//fXJJ6yb3Xbsk61fE/AAAAAAD4Bvj90D3289k9dnvZ1/o5SWFn2frrv5YVLFoHna3vW3t2PMXe68eMnAEQ1a9bV/s36k1eliQl7xz3hjV4MICV/BbSN1/vzrrXvxUcS2BpIfvzxawE1vP9d/pSH6QxH/TbfbKfUzIlbWWl7jXdouM3H5Vl21dzkbsV/fr5099IwWE/d592d4qfft59kuRyEI862Ivz+OJIOrlZubxK7reQXHMxrsdXVM+a/EO7tWIl7Zay/i/I3ssNN3Sy/v9Wt9OY2yvp68p+tgWS/hfi/peLySYb9D65O4Q1yKJ8vOfjNsSELApJFnfSmDurd9KXLL9+Fj9YkCrF0W0QDGdRGc5i9rqw/j2yLmZkEa+LtTiLv8ULmpDF2umyGNkiAHBZdgdVKLmJ+eg99o/X3TfZy82u7j8+bCX5HuLVn3rpBYcLUr7/3cTUVgqK9+iracySkh1r/vqYPXqpX1cKmrBHL52husVt/WXwDKR+2iNZ/LfX6z0qJ+3+8VhV/Sqe4auJ7YbNykK8Cu+/2vtlcgP82Gc7n+08r1TW1ksflUoPKlpMutF/ofYAAMaY/YydmRHWR4dH1U/++WE6dKTifefwlIKiPtXn6uqJ7mWPELg1fqkrQ6ch3Bs9ao1jr0jHY8u6N/GoLqmlQ7GVw9hFZbMcrdSD2LVz3goAAFys2zPq8Enq/73suHv1+tjj7qO1/PgTgifFli94TQAA8O5wg6+tleh3VhB4nU/K1WrZjjZcE/jOT03g1Rqu8dqRGzgbdrvhmk7gR77jN00n0LJXc0MTbnY6fhCZuh+Yjh96W8mT303/0e+h27LbkeeEnaZrh65x/HZkO5GpeaFjOps/aXrhhhskM4cd1/HqnmNHnt82ob8ZOG7RmNB1hwK9mtuOvLoXD7ZNJ/BadrBtfuY3N1uuqbmhE3idyE8XmLXltet+0EoWW1Tv1A86BADg/9HL1/vPHne7Oy+mDBxoaEx2buD44KVxC7zsPgIAgKOo0gAAAAAAAAAAAAAAAAAAAAAAvP1Ocv3fqQYWNWaSdDjmV1dPtBxL807sNAO5N5/971NirhyOyVb/cMzBJfRU6UB+/ku+Io37JJzbwI920zU6MUaTLlpdPtwW+fn/d4gHnv95wqRer9ebPvvy0XW4NK2DRwfykl4snWETXM7+CMDF+V8AAAD//0gyQSk=") r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfb1, 0x0) read$usbfs(r4, &(0x7f0000002240)=""/133, 0x85) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000dc, &(0x7f0000000780)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095", @ANYRES8=r2, @ANYRES8=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @dev}, 0x58, 0x0}}], 0x6c00, 0x0) dup(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000080000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000004e0a00000900000007000000000000009500400000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) r6 = fsopen(&(0x7f0000000080)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000000)='#}-%]*]}:(,@}/\'[)^-\xbd!-+\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000001c0)=ANY=[], 0x12, 0x9ef, &(0x7f0000000e40)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) [ 298.241998][ T281] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 298.378827][ T281] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x451498c376979b4d}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = epoll_create1(0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000300)={0x40002006}) epoll_pwait(r2, &(0x7f0000006140)=[{}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x25e, &(0x7f0000000800)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af2502"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0x1, "17dcea46805d"}]}}}}}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000200000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x38, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x38}}, 0x0) [ 298.420440][ T281] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000018c0)='./file0\x00', 0x0, 0x3d800, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000002100)='./file0/file0\x00', 0x0, 0x2187017, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1000, 0x0) [ 298.481466][ T281] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 298.508741][T15061] lo speed is unknown, defaulting to 1000 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x20, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000008c0)={r0, 0x0, 0x2d, 0xffffffffffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x54}, {0x6}]}, 0x10) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000300), 0x1, 0x257, &(0x7f0000000340)="$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") syz_emit_ethernet(0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd"], 0x0) executing program 2: r0 = socket(0x1e, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xa0179e12}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000001080)=[{}], 0x1, 0x0) [ 298.534777][T15058] lo speed is unknown, defaulting to 1000 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) tkill(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) inotify_init() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002cc0)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_script(r1, 0x0, 0x7) [ 298.599829][ T281] bridge_slave_1: left allmulticast mode [ 298.605655][ T281] bridge_slave_1: left promiscuous mode [ 298.611303][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.637067][ T281] bridge_slave_0: left allmulticast mode [ 298.642804][ T281] bridge_slave_0: left promiscuous mode executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) tkill(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) inotify_init() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) tkill(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) inotify_init() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 298.648634][ T281] bridge0: port 1(bridge_slave_0) entered disabled state executing program 1: timer_create(0xfffffffd, 0x0, &(0x7f00000011c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) timer_delete(0x0) executing program 2: r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000440)={0x0, 0x0, 0x10100}, &(0x7f00000003c0)=0x0, &(0x7f0000000140)=0x0) r3 = socket$qrtr(0x2a, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@ieee802154={0x24, @long}}) io_uring_enter(r0, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$MAP_CREATE(0x10, &(0x7f00000002c0)=@bloom_filter, 0x9d) [ 298.739427][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 298.739444][ T28] audit: type=1326 audit(1714783454.142:2295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15094 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645e301ca9 code=0x0 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvmmsg(r0, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/33, 0x21}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) [ 298.977643][ T281] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 298.988288][ T281] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 299.000123][ T281] bond0 (unregistering): Released all slaves [ 299.076913][T15061] chnl_net:caif_netlink_parms(): no params data found [ 299.108663][ T281] hsr_slave_0: left promiscuous mode [ 299.114347][ T281] hsr_slave_1: left promiscuous mode executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x7, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000780), 0xe9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x50, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x50}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@access_uid}], [], 0x6b}}) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') r10 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r10, r9, 0x0, 0x100800001) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fsmount(0xffffffffffffffff, 0x0, 0x0) [ 299.120239][ T281] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 299.127707][ T281] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 299.135735][ T281] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 299.143189][ T281] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 299.153525][ T281] veth1_macvtap: left promiscuous mode [ 299.159119][ T281] veth0_macvtap: left promiscuous mode [ 299.164714][ T281] veth1_vlan: left promiscuous mode [ 299.170739][ T281] veth0_vlan: left promiscuous mode [ 299.260235][ T281] team0 (unregistering): Port device team_slave_1 removed [ 299.270878][ T281] team0 (unregistering): Port device team_slave_0 removed executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x101001) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x80, 0x0, 0x0, 0x6}) executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x1, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0xa}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 299.340311][T15098] lo speed is unknown, defaulting to 1000 [ 299.364354][T15061] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.371528][T15061] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.379149][T15061] bridge_slave_0: entered allmulticast mode executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000080)=@udp}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f00000005c0)="9f", &(0x7f0000000140)=@tcp6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000002c0)={r2, &(0x7f00000001c0), 0x0}, 0x20) executing program 0: socket$phonet_pipe(0x23, 0x5, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a0033d487277b9b108b4ab502", @ANYRES32, @ANYRES8=r1], 0xfe33) [ 299.386073][T15061] bridge_slave_0: entered promiscuous mode [ 299.392772][T15058] chnl_net:caif_netlink_parms(): no params data found [ 299.407808][T15061] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.415108][T15061] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.422366][T15061] bridge_slave_1: entered allmulticast mode [ 299.428878][T15061] bridge_slave_1: entered promiscuous mode [ 299.469330][T15061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.486025][T15061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.512730][T15132] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 299.521037][T15132] netlink: 15999 bytes leftover after parsing attributes in process `syz-executor.0'. [ 299.532352][T15061] team0: Port device team_slave_0 added [ 299.543316][T15058] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.551244][T15058] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.559386][T15058] bridge_slave_0: entered allmulticast mode executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) tkill(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) inotify_init() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}], 0x1, &(0x7f00000001c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x1, 0x0) [ 299.565930][T15058] bridge_slave_0: entered promiscuous mode [ 299.573789][T15061] team0: Port device team_slave_1 added [ 299.590982][T15058] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.598198][T15058] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.605524][T15058] bridge_slave_1: entered allmulticast mode [ 299.612503][T15058] bridge_slave_1: entered promiscuous mode [ 299.643890][T15061] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 299.650947][T15061] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 299.677472][T15061] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x9}) [ 299.692631][T15061] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 299.699683][T15061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 299.725760][T15061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 299.760902][T15141] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 9 (only 8 groups) [ 299.774241][T15058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.809321][T15058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.837769][T15098] chnl_net:caif_netlink_parms(): no params data found [ 299.861741][T15061] hsr_slave_0: entered promiscuous mode [ 299.868032][T15061] hsr_slave_1: entered promiscuous mode [ 299.873999][T15061] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 299.881657][T15061] Cannot create hsr debugfs directory [ 299.900073][T15058] team0: Port device team_slave_0 added [ 299.907369][T15058] team0: Port device team_slave_1 added executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xbdff, 0x0, "ec28a1ba80a20507"}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x17) [ 299.937839][T15058] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 299.944894][T15058] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 299.970992][T15058] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 299.991142][T15058] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 299.998242][T15058] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.024188][T15058] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.042971][T15098] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.050206][T15098] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.057681][T15098] bridge_slave_0: entered allmulticast mode [ 300.064201][T15098] bridge_slave_0: entered promiscuous mode [ 300.073844][T15098] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.081097][T15098] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.088714][T15098] bridge_slave_1: entered allmulticast mode [ 300.095151][T15098] bridge_slave_1: entered promiscuous mode [ 300.128446][ T281] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.143535][T15058] hsr_slave_0: entered promiscuous mode [ 300.149826][T15058] hsr_slave_1: entered promiscuous mode [ 300.156172][T15058] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 300.163756][T15058] Cannot create hsr debugfs directory [ 300.177138][T15098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.191220][ T281] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.204261][T15098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.232162][ T281] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) r1 = syz_io_uring_setup(0x34d5, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r4 = syz_open_pts(r0, 0x0) r5 = dup3(r4, r0, 0x0) ioctl$TIOCSTI(r5, 0x5437, 0x0) [ 300.252994][T15098] team0: Port device team_slave_0 added [ 300.264297][T15061] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.276853][T15098] team0: Port device team_slave_1 added [ 300.292342][ T281] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvmmsg(r0, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/33, 0x21}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) [ 300.310430][T15098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.317460][T15098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.343565][T15098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.359840][T15061] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.371271][T15098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.378563][T15098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.404500][T15098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvmmsg(r0, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/33, 0x21}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) [ 300.452514][T15098] hsr_slave_0: entered promiscuous mode [ 300.458823][T15098] hsr_slave_1: entered promiscuous mode [ 300.465058][T15098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 300.472639][T15098] Cannot create hsr debugfs directory [ 300.490280][T15061] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f0000000240), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300030e000000000700000000000004000900a0000000e9255bb992464e73a02159d3720df19f7a1dfec30000000003000600000000000200000000000000000000000000000002000100000000fffffffb0d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) [ 300.548014][T15061] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000400)={[{@norecovery}, {@oldalloc}, {@grpid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@block_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xcfb}}]}, 0x3, 0x434, &(0x7f0000000940)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0185879, &(0x7f0000000680)={0x0, 0x200002000001, 0xa690, 0x0, 0x0, 0x0, 0x2401}) [ 300.603632][ T281] bridge_slave_1: left allmulticast mode [ 300.609374][ T281] bridge_slave_1: left promiscuous mode [ 300.615162][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.623072][ T281] bridge_slave_0: left allmulticast mode [ 300.628887][ T281] bridge_slave_0: left promiscuous mode [ 300.634577][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.646683][ T281] bridge_slave_1: left allmulticast mode [ 300.652399][ T281] bridge_slave_1: left promiscuous mode [ 300.658215][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.666188][ T281] bridge_slave_0: left allmulticast mode [ 300.671952][ T281] bridge_slave_0: left promiscuous mode [ 300.677637][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.758979][ T281] bond1 (unregistering): (slave ip6gretap1): Releasing active interface executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000340)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @loopback}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @mcast1}], 0x1c) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x20, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000008c0)={r0, 0x0, 0x2d, 0xffffffffffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$MAP_CREATE(0x10, &(0x7f00000002c0)=@bloom_filter, 0x9d) executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) tkill(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) inotify_init() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x9}) executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/202, 0xca}, 0x2000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x120084, &(0x7f0000000800)=ANY=[@ANYBLOB='cruft,block=0x0000000000000400\x00session=0x0000000000000006,check=relaxed,utf8,cruftAuid=', @ANYRES64, @ANYBLOB="2c8ef6ff096071854bb02441c2edff2c66736dbd9a23113d3078303030303030303030303001003066581c000000000000bd2551db78fc65706d62c543fd92499a55c4676e4ab57351fab1f213c1c9b96d7f9297aea36961e03f1f9b339e1208fe76adf8245531e4f11e82cd11bccd3e4d4cd5b4502ba9708a2827923cada4cc8ec20e806b1b5ece7f4afbdb8475f9b71f1eafd72d05729591892caacc55317bb19441bd11c979ca9786b51118d9b1c2246f0b407eaa2083113d1bab6700000000000000"], 0x0, 0x632, &(0x7f0000000100)="$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") r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfb1, 0x0) read$usbfs(r4, &(0x7f0000002240)=""/133, 0x85) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000dc, &(0x7f0000000780)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095", @ANYRES8=r2, @ANYRES8=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @dev}, 0x58, 0x0}}], 0x6c00, 0x0) dup(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000080000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000004e0a00000900000007000000000000009500400000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) r6 = fsopen(&(0x7f0000000080)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000000)='#}-%]*]}:(,@}/\'[)^-\xbd!-+\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000001c0)=ANY=[], 0x12, 0x9ef, &(0x7f0000000e40)="$eJzs3ctvXNd9B/Dv5UOiaUOSbdV1BdsayZVM2yxFUrVUwYtWIkcSXT4KkgIsdGG5FlUIYuvWbgHbKFAZKLqKkQAJskh2RlZZGfAm3gTeJbtklUWAwP+CkZWyYnDvDKkhOeSQMh+y/PkQM3Mfv3vO7859HM7MnTlhf914YrO5d9dNWTq8amxpqbo94Pi1n3+T1Pn2uzT+1aeffVLePr6bA+nOa8Uvkr4ktaQnybNJ79j47MxUh4LuJDeSfJkUSQ6m8bglN1J8Py2HwZcpflrWu6EDWy2ZTpb4Ttvv/Q8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB5Gxdj48PBIcSAT09ferDUktXXGxmdniiwtrZ+zvEzDF1Wv38UXHetNivKWvr7lrr6fPXp/9jNJaifzXGPsuapD8vTlo8efOfL60z1dy8tvlM03cnDrxb7/4Ud33l5cXHhvVxJ5+F2pT0/MzUxMXbxSr03MzdQunDs3fObq5bna5YnJ+tz1ufn6VG1stn5xfma2NjD2cm3kwoWztfrQ9Zlr01fGhybryxPP/83o8PC52htD/1S/ODs3M33mjaG5sasTk5MT01eqmHJ2GXO+3BH/cWK+Nl+/OFWr3bq9uHB2TU7dWbP/lkEjndakDBrtFDQ6PDo6MjI6OvJxs/fslQnnXrvw2vnh4Z7hNbIuYpd2Wh4uj228mXf+JA4PqKvR/ieTmch0ruXN1Nr+jWU8s5nJ1Abzm5bb/1Nn6pvW29r+N1v5npbZx8q7k3mhOdq3Qfu/QS579/d+PsxHuZO3s5jFLOS9fc9ob/+upJ7pTGQuM5nIVC5WU2rNKbVcyLmcy3DeytUcz1xquZyJTKaeuVzPXOZTr/aoscymnouZz0xmU8tAxvJyahnJhVzI2dRSz1CuZybXMp0rGc/FqpRbuV0972c3yXElaGQrQaObBK1rzLfd/tfX/nPCd87On8ThAS012/8DnUMHxvYiIQAAAGDH/dWvc+joU7/6Q1Lk+ep9+csTk/Xh/U4LAAAA2EHV5XrPlQ+95dDzKbz+BwAAgEdNUX3HrkjSn+ONoeVvQnkTAAAAAB4R1ef/L6Q4fn+C1/8AAADwiOn8G/sdI4rB5Z//rd1sPN5sRjTGiv7LE5P1obGZyddHcrr6lYHqmwbrSutOit7q6wev5EQj6kR/47H/follnX1l1MjQ6yN5JSebKzLwYvnw4kCbyNFG5EuNyJdaI7uzKvJsGQkAj7qTm7THW23/X8lgI2LwWNXk9xxr0wYPa1kB4GGx0sfOn5pdmrVp/5sRL2zU/v/tJq//y4incut445KCobyTd7OYmxlM84qD4+1KXe6NoHEZwmCHdwP6m5cs/PZ8VwbXvR/Qt7KurbELGc1g23cEWsotlnM424jr3p1tAAB77eSm7fDW2v/BDq//+11SCAAPlZUe7HdxYL/XEQBYTSsNAAAAAAAAAAAAAAAAAAAAAAAAAAAAO29LP+D/m9PJ4uJCsgedBawM9G0nw80HurJHOe/7QHeS/ar977Ptpcpt/LA8dQZWD+zziQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA9USTd7aZ3JQeTDCc5s/dZ7Z67+53ATqk92GLFvdzLBzm00+kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHzXNX//vyuNx8cbk9LTlZxKciPJP+93jjvp3n4nsG/+rbpv+f3/rqQ3S0V6Gps9Re/Y+OzMVLn5i4Pl/K8+/eyT8ta57PW9KpQFlDWs6lyiWUPLlN7VSz1ZLdU/vvD+nf969z9q45eqHfPS/OXJ8akrs/9wP/CZ4vNGFwit3SAs5/s/p375g5bJB5qVf16uaXtr671c1Tu+vt6/bLf0BvVuwe3FhdGypvn6m/P//e+3P2iZ9VROJC8OJAOra/rX8rZBTSfWPp+rFV8X/18cyo9zo9r+5bNRLBXlJjpcrf9jt24vLgy98+7izZWc/ndVTkdyPMnNpG/rOR2vzidtVXtdV29Z63AVVN4d7VDeplpKHNngeX2y2mX6t7UOtY3XodLheW9mdLZtRj/8z6dzettb+nSHGtsqvi5+X1zN7/J/Lf1/dJXb/1TaHp1tiqgiW/aU1nmrDq+uRmS15qOtM95aW+aGRyW74Hv5l/zdyvbvajn/N7fV3pyPWmpsf1wk2z8ufnZ4XYtyX9UiHV3TIjXPPhst08zzaCNqgzz/Iq8mPce2dUZ5tcMZZbeO/58UA/lj7ur/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAePgVSXe76V3JqSRHkhwux2vJ0tqYuw9QX1d/8SBp7pgHyfnbp9hwRYt7uZcPcmivMwIAAAAAAABgd1wa/+rTzz4pb9Xn8d35667mnFrSk+RI8aPesfHZmakOBfUmN5Y/0u/bXg43yrsn7o9/WY4922Gh/b18AAC+1f4cAAD//7IYb70=") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000250000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) munlock(&(0x7f0000b70000/0x4000)=nil, 0x4000) [ 300.963015][T15180] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 9 (only 8 groups) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f0000000240), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300030e000000000700000000000004000900a0000000e9255bb992464e73a02159d3720df19f7a1dfec30000000003000600000000000200000000000000000000000000000002000100000000fffffffb0d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) executing program 1: ioperm(0x0, 0xf4, 0x10000007f) bpf$BPF_MAP_CONST_STR_FREEZE(0x15, &(0x7f0000000f80), 0x4) executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xbdff, 0x0, "ec28a1ba80a20507"}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x17) [ 301.377602][ T281] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 301.387804][ T281] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 301.398080][ T281] bond0 (unregistering): Released all slaves [ 301.407492][ T281] bond1 (unregistering): Released all slaves [ 301.416780][ T281] bond2 (unregistering): Released all slaves [ 301.426580][ T281] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 301.436831][ T281] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 301.447492][ T281] bond0 (unregistering): Released all slaves [ 301.469784][T15061] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 301.478687][T15061] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 301.488833][ T281] tipc: Disabling bearer [ 301.494084][ T281] tipc: Left network mode [ 301.494121][T15061] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 301.508016][T15061] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 301.548250][T15061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.561439][T15061] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.575898][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.583015][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.586118][ T281] IPVS: stopping backup sync thread 12468 ... [ 301.592779][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.603913][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.621628][ T281] hsr_slave_0: left promiscuous mode [ 301.627644][ T281] hsr_slave_1: left promiscuous mode [ 301.636840][ T281] hsr_slave_0: left promiscuous mode [ 301.642545][ T281] hsr_slave_1: left promiscuous mode [ 301.648793][ T281] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 301.656398][ T281] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 301.664350][ T281] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 301.671840][ T281] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 301.683117][ T281] veth1_macvtap: left promiscuous mode [ 301.688684][ T281] veth1_vlan: left promiscuous mode [ 301.693909][ T281] veth0_vlan: left promiscuous mode [ 301.699991][ T281] veth1_macvtap: left promiscuous mode [ 301.705592][ T281] veth0_macvtap: left promiscuous mode [ 301.711331][ T281] veth1_vlan: left promiscuous mode [ 301.716649][ T281] veth0_vlan: left promiscuous mode executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000340)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @loopback}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @mcast1}], 0x1c) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x20, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000008c0)={r0, 0x0, 0x2d, 0xffffffffffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clock_adjtime(0xffffffd3, &(0x7f00000001c0)) [ 301.870516][ T281] team0 (unregistering): Port device team_slave_1 removed [ 301.883887][ T281] team0 (unregistering): Port device team_slave_0 removed executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 1: r0 = socket(0x1e, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xa0179e12}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000001080)=[{}], 0x1, 0x0) [ 301.928009][ T28] audit: type=1326 audit(1714783457.322:2296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5426bbfca9 code=0x7ffc0000 [ 301.952123][ T28] audit: type=1326 audit(1714783457.332:2297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5426bbfca9 code=0x7ffc0000 [ 301.977108][ T28] audit: type=1326 audit(1714783457.332:2298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5426bbfca9 code=0x7ffc0000 [ 302.001316][ T28] audit: type=1326 audit(1714783457.332:2299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5426bbfca9 code=0x7ffc0000 [ 302.026275][ T28] audit: type=1326 audit(1714783457.332:2300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5426bbfca9 code=0x7ffc0000 [ 302.050868][ T28] audit: type=1326 audit(1714783457.332:2301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5426bbfca9 code=0x7ffc0000 executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x9}) [ 302.074886][ T28] audit: type=1326 audit(1714783457.332:2302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5426bbd427 code=0x7ffc0000 [ 302.099414][ T28] audit: type=1326 audit(1714783457.332:2303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5426b830f9 code=0x7ffc0000 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000250000002300000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) munlock(&(0x7f0000b70000/0x4000)=nil, 0x4000) [ 302.124426][ T28] audit: type=1326 audit(1714783457.332:2304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15200 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5426bbd427 code=0x7ffc0000 [ 302.129287][T15211] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 9 (only 8 groups) executing program 1: r0 = syz_io_uring_setup(0x24fb, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000200)='\a', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}) listen(r3, 0x100) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) [ 302.184592][ T281] team0 (unregistering): Port device team_slave_1 removed [ 302.195603][ T281] team0 (unregistering): Port device team_slave_0 removed executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x3) ioctl$TIOCVHANGUP(r0, 0x5437, 0x2) [ 302.249767][T13668] lo speed is unknown, defaulting to 1000 [ 302.262792][T15061] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 302.273315][T15061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x237, &(0x7f0000000300)="$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") executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x16, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth1_vlan\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x4) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}, @TCA_RATE={0x6}]}, 0x58}}, 0x0) executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvmmsg(r0, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/33, 0x21}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) [ 302.359054][T15058] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 302.369785][T15058] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 302.378743][T15058] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 302.391326][T15061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 302.399485][T15058] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 302.456362][T15058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.473184][T15058] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.483430][T13681] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.490638][T13681] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x12000}}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x33fe0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clock_getres(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0xf, 0x0, "0c9e089c01860b471037f43d223b3c1b324debec40e55a07f709417eb48821996aff1c7154e746be4d7686455261c425a7519cc269d04e6205abaabde24a2b12440b329ad5bd35f21907c7988d1300"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}}, 0x0, 0x0, 0x2, 0x0, "a1c1dd75a68473ba07d945c3b03e10951cd4b347113e55eb499419be4f7542da0bc21470e441225642855b5f2f4bb561dc9363aed4a18d67efd5f2fdf98328de9441031348589b763d46d14810acc5f7"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}}}, 0x0, 0x0, 0x2e, 0x0, "4e546b1007c27b28975a08ad8d502c94527041b796e8eb1ef5f5198d75e4b6ec28f5dd3b26065546d59b038819cbd3aaa4baed161001a3bb63cac17691410038c6706a842abb55eb1a4c75c2f3012e2b"}, 0xd8) socket$kcm(0xa, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendto$inet6(r1, 0x0, 0x0, 0x4c881, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x2, 0x0, 0xfffffffffffffd25) [ 302.503081][T13681] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.510254][T13681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.622868][T15058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 302.637170][T15061] veth0_vlan: entered promiscuous mode [ 302.646651][T15061] veth1_vlan: entered promiscuous mode [ 302.671380][T15061] veth0_macvtap: entered promiscuous mode [ 302.683103][T15061] veth1_macvtap: entered promiscuous mode [ 302.706738][T15098] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 302.719184][T15061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 302.729923][T15061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.739938][T15061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 302.750497][T15061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.761760][T15061] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 302.769472][T15098] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 302.778290][T15098] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 302.787679][T15098] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 302.799898][T15061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 302.810461][T15061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.820554][T15061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 302.831021][T15061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 302.841902][T15061] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 302.859302][T15061] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.868176][T15061] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.877066][T15061] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.885948][T15061] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/202, 0xca}, 0x2000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x120084, &(0x7f0000000800)=ANY=[@ANYBLOB='cruft,block=0x0000000000000400\x00session=0x0000000000000006,check=relaxed,utf8,cruftAuid=', @ANYRES64, @ANYBLOB="2c8ef6ff096071854bb02441c2edff2c66736dbd9a23113d3078303030303030303030303001003066581c000000000000bd2551db78fc65706d62c543fd92499a55c4676e4ab57351fab1f213c1c9b96d7f9297aea36961e03f1f9b339e1208fe76adf8245531e4f11e82cd11bccd3e4d4cd5b4502ba9708a2827923cada4cc8ec20e806b1b5ece7f4afbdb8475f9b71f1eafd72d05729591892caacc55317bb19441bd11c979ca9786b51118d9b1c2246f0b407eaa2083113d1bab6700000000000000"], 0x0, 0x632, &(0x7f0000000100)="$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") r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfb1, 0x0) read$usbfs(r4, &(0x7f0000002240)=""/133, 0x85) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000dc, &(0x7f0000000780)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095", @ANYRES8=r2, @ANYRES8=r1], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @dev}, 0x58, 0x0}}], 0x6c00, 0x0) dup(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000080000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000004e0a00000900000007000000000000009500400000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) r6 = fsopen(&(0x7f0000000080)='ext4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000000)='#}-%]*]}:(,@}/\'[)^-\xbd!-+\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000001c0)=ANY=[], 0x12, 0x9ef, &(0x7f0000000e40)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) [ 302.916551][T15058] veth0_vlan: entered promiscuous mode [ 302.938785][T15058] veth1_vlan: entered promiscuous mode [ 302.975867][T15265] loop4: detected capacity change from 0 to 164 [ 302.983930][T15058] veth0_macvtap: entered promiscuous mode [ 303.003563][T15058] veth1_macvtap: entered promiscuous mode [ 303.017447][T15098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.041623][T15058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 303.052250][T15058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.062111][T15058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 303.072613][T15058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0xb) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000380)={0x0, 0x0}) setpgid(0x0, r4) fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x2, r4}) close_range(r2, 0xffffffffffffffff, 0x0) [ 303.082488][T15058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 303.093083][T15058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.110251][T15058] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 303.122303][T15098] 8021q: adding VLAN 0 to HW filter on device team0 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000504c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010005080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1}, 0x0) [ 303.160724][T13665] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.167890][T13665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.267883][T13681] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.275044][T13681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.283384][T15058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 303.294041][T15058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.303944][T15058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 303.314465][T15058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.324335][T15058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 303.334799][T15058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.353363][T15058] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 0: ioperm(0x0, 0xf4, 0x10000007f) bpf$BPF_MAP_CONST_STR_FREEZE(0x15, &(0x7f0000000f80), 0x4) [ 303.374191][T15058] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 303.383117][T15058] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 303.391984][T15058] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 303.400883][T15058] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 303.452345][T15098] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 303.462855][T15098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f0000000240), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300030e000000000700000000000004000900a0000000e9255bb992464e73a02159d3720df19f7a1dfec30000000003000600000000000200000000000000000000000000000002000100000000fffffffb0d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) r1 = syz_io_uring_setup(0x34d5, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r4 = syz_open_pts(r0, 0x0) r5 = dup3(r4, r0, 0x0) ioctl$TIOCSTI(r5, 0x5437, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_getvlan={0x20, 0x72, 0xfd029edff438e20f, 0x0, 0x0, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x4}]}, 0x20}}, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x5, 0x48040) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x11}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0xc, &(0x7f00000000c0)={0x6}, 0x8}, 0x90) executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x93, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000c4e82ff00000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0xfe82, 0x0, &(0x7f00000007c0)="f8ad48cc02cb29fcc800775b865f", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000504c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010005080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1}, 0x0) [ 303.613973][T15293] netlink: 'syz-executor.0': attribute type 1 has an invalid length. executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x16, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth1_vlan\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x4) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}, @TCA_RATE={0x6}]}, 0x58}}, 0x0) [ 303.662434][T15098] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f0000000240), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300030e000000000700000000000004000900a0000000e9255bb992464e73a02159d3720df19f7a1dfec30000000003000600000000000200000000000000000000000000000002000100000000fffffffb0d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xa0179e12}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000001080)=[{}], 0x1, 0x0) [ 303.886553][T15272] chnl_net:caif_netlink_parms(): no params data found executing program 3: r0 = syz_io_uring_setup(0x24fb, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000200)='\a', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}) listen(r3, 0x100) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) [ 303.932359][T15098] veth0_vlan: entered promiscuous mode [ 303.955787][T15098] veth1_vlan: entered promiscuous mode [ 304.058425][T15098] veth0_macvtap: entered promiscuous mode executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) creat(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020701200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001100a7cc4a372eaf541d002007000000", @ANYRES32=r3, @ANYBLOB="00000000100000001c001a80080002802d00ff0008000200", @ANYRES16, @ANYRES32=r4], 0x44}}, 0x0) [ 304.099464][T15272] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.106771][T15272] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.125101][T15272] bridge_slave_0: entered allmulticast mode [ 304.155721][T15272] bridge_slave_0: entered promiscuous mode [ 304.167649][T15098] veth1_macvtap: entered promiscuous mode [ 304.176580][T15272] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.183683][T15272] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000080)=@udp}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f00000005c0)="9f", &(0x7f0000000140)=@tcp6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000002c0)={r2, &(0x7f00000001c0), 0x0}, 0x20) [ 304.207343][T15272] bridge_slave_1: entered allmulticast mode [ 304.213891][T15272] bridge_slave_1: entered promiscuous mode [ 304.264320][T15272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.280704][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 304.291309][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.301271][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 304.311798][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.321816][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 304.332342][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.342262][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 304.352738][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0x2001) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0xf5, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x800, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time}], 0x38) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001040)="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", 0x108}], 0x1}}], 0x1, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r9 = dup2(r7, r8) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r9, &(0x7f0000000140)=ANY=[], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) [ 304.373554][T15098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 304.385663][T15272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.401922][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 304.412417][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.422314][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 304.433308][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.443293][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 304.453815][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.463666][T15098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000504c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010005080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1}, 0x0) [ 304.474260][T15098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.487471][T15098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 304.540748][T15098] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.549775][T15098] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.558690][T15098] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.567558][T15098] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.579312][T15272] team0: Port device team_slave_0 added executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xbf, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac14141607089f034d2f87e544026aab845013f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5}, &(0x7f00000003c0), &(0x7f0000000300)}, 0x20) [ 304.596689][T15272] team0: Port device team_slave_1 added [ 304.626335][T15272] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.633329][T15272] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.660341][T15272] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.675844][T15272] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 304.682844][T15272] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.709852][T15272] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) r2 = socket(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$MAP_CREATE(0x10, &(0x7f00000002c0)=@bloom_filter, 0x9d) [ 304.755414][T15337] veth0_vlan: entered allmulticast mode executing program 2: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600a964600140628c0e84c64ed8e909fcfb01a95b4ee3ae905389a1d7b31c832a5aa65593c1d203631704f3f6b27c18f4fbed662f5"], 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e21, 0x0, @private1, 0x4}}, 0x0, 0x0, 0x0, 0x0, "608a2698b78ea1620f40ca6e9eecec3e4dcefab3bfa7129784069ecbcf82dbcb440ed2265180c4169a9d858983a263e0f0b73615fcfadfc4a1528e50be3ac2046d3544ca36ddf34591a1e74336b05f75"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) r0 = semget$private(0x0, 0x0, 0x60a) semctl$SETALL(r0, 0x0, 0x11, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x9) semop(0x0, &(0x7f0000000080)=[{0x1, 0xfffe, 0x1800}, {0x43d923f6413557d7, 0x8}], 0x2) semctl$SETVAL(r0, 0x2, 0x10, 0x0) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@ldst={0x7}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0xb) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000380)={0x0, 0x0}) setpgid(0x0, r4) fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x2, r4}) close_range(r2, 0xffffffffffffffff, 0x0) executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0xb) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000380)={0x0, 0x0}) setpgid(0x0, r4) fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x2, r4}) close_range(r2, 0xffffffffffffffff, 0x0) executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0xa04254, &(0x7f0000000080)=ANY=[], 0x5, 0x31f, &(0x7f0000000100)="$eJzs3M9LI2cYwPEnP4xJxEwOpaWF4kt7aXsYNO25NBSF0kBFTakWCqNO2pBpIplgSSl197TXZf+DvexBPHoTdvcf8LK33cte9uZlYQ8ri+wsmR+aaBLd0Wz88f2A5HWe5xnfl4nheUMye7/d/btSsvWS0ZBoUklERGRfJCtRCUT8x6g7Tki7W/L12Kunn88vLv2cLxSm55SayS98m1NKZSYe/vNfyk/bGZXd7B97L3Mvdj/e/XTv7cJfZVuVbVWtNZShlmvPG8ayZarVsl3RlZq1TMM2Vblqm3UvXvPiJau2ttZURnV1PL1WN21bGdWmqphN1aipRr2pjD+NclXpuq7G09JNouvRm6q4OTdn5EMWr1zwZBDWG8dx+oSdSN6IiUjqRKS4OdB5AQCAS+l4/x9ttfSh+n/JuP1/K/mo/9/64nFj7NftjN//7yS69f/fPfPO1dH/J0VkAP1/p5Md0ZW38T7J5+r/cTlMnNzTRjp+q9fzRtr//3Xd/n1r0h3Q/wMAAAAAAAAAAAAAAAAAAAAAcBXsO47mOI4WPPo/3xxleMeGOUcMTo/rr42KSLJ19R2u/3U2v7gkSfeLe/GMiHVnvbhe9B79eJA4KZocuM8HX2scfPNItWTlkbXh12+sF2NuJF+SslhiypRokj1e7zgzPxWmp5Sns35E0u31OdHko+71ua71Cfnqy7Z6XTR5siI1sWS19bw+cA7r/59S6sdfCsfqU24eAAAAAADXga4Odd2/63qvuFd/uL/ufH9ApG1/Ptl1fx7XPosPd+0AAAAAANwUdvPfimFZZr3PICWn54QfxMOVj/TLibWt8KwnTLifdxEZ3Er7DIIPUlQSbaGk3PcPhzlzsP7BzDkqYaomxBn1ZnWevx68bdQrR2YHfb3iPUKf3HvwOtyZI/5de9tD328nT1npwAYjZ3rxcGLnfPUBAAAA8CEFTX/KDo78MNwJAQAAAAAAAAAAAAAAAAAAAAAAAAAAAABwA/W5DVj8om4nNuw1AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJfFuwAAAP//EWYBXg==") open(0x0, 0x0, 0x0) truncate(&(0x7f0000000600)='./file2\x00', 0x1b) [ 304.924373][T15342] veth0_vlan: left promiscuous mode executing program 2: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={0x0}, 0x18) read(r0, &(0x7f0000000040)=""/148, 0xffffff96) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x31, &(0x7f0000000200), 0x4) listen(r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a300000000060000000060a010400000000000000000100000008000b400000000038000480240001800c0001006269747769736500140002800800034000000000080006400000100010000180080001006c6f6700040002800900010073797a3000000000140000001100010000"], 0xd4}}, 0x0) executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2403, 0x7f) [ 304.966810][T15342] veth0_vlan: entered promiscuous mode [ 305.038949][T15272] hsr_slave_0: entered promiscuous mode [ 305.048849][T15272] hsr_slave_1: entered promiscuous mode [ 305.059874][T15272] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 305.074401][T15272] Cannot create hsr debugfs directory executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000c80)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x5c}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$NL80211_CMD_SET_PMKSA(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000c40)=ANY=[], 0x20}}, 0x0) [ 305.092941][ T3979] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file2\x00', 0x14b042, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), r0) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000107200000000000000003000000"], 0x14}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f00000001c0)={0x4000}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="dc0000001e7a620a000400000000000000020000c70032000115f9b158ff052bb707c9351ace3f524a8973d1b8bbd09e972cf4642c57a1d79fd15644925376124983201eb7c82bfc0444d3bfd4079ff226b54c86d98ec2fd6b8f97ecca2def8efca10d139b914742df7183ec41220d85946c673efeddefe88e94e402f7e7596671f60d5231fb183e72ea4466df81b3b4c77fba3cfbff4d93d8f6787f16bdcafe43893fe59a756322f4fa746b028251295ed4348d96b6019629bda93a6dba736e27dba14fcf5290e706b7af2c5fcf4999caa3495d616d3504a288da00"], 0xdc}, 0x1, 0x0, 0x0, 0x40804}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r1, &(0x7f0000000b40)="020000004806a6234ab19e3793", &(0x7f0000000b80)=@tcp6=r2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000005c0)={r3, &(0x7f0000000400)='P', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000dc0)='/', &(0x7f0000000e00)=@udp6=r2}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) dup(r4) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x705, 0x0, 0x3c8, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @sit={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @local}]}}}]}, 0x50}, 0x1, 0x4c00000000000000}, 0x0) [ 305.242263][T15364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31262 sclass=netlink_route_socket pid=15364 comm=syz-executor.0 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0xf3a, 0x0) vmsplice(r4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="f8", 0x1}], 0x1, 0x0) write(r1, &(0x7f0000001100)="94", 0x1) tee(r0, r5, 0xaf5, 0x0) write$binfmt_script(r5, &(0x7f0000001140)={'#! ', './file0'}, 0xfffffe48) write(r2, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x34, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x4}}}]}, 0x34}}, 0x0) executing program 2: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f00000018c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f000000e0c0), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r2, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2284, &(0x7f0000001200)) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0xfe44, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020d3"]) executing program 2: r0 = syz_io_uring_setup(0x24fb, &(0x7f0000000000)={0x0, 0x0, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000200)='\a', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}) listen(r3, 0x100) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) executing program 1: ioperm(0x0, 0x1, 0x1) modify_ldt$write(0x1, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r0}, 0x4) [ 305.516863][T15374] vhci_hcd: invalid port number 97 [ 305.522102][T15374] vhci_hcd: default hub control req: d364 v6665 i0061 l29804 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0xb) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000380)={0x0, 0x0}) setpgid(0x0, r4) fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x2, r4}) close_range(r2, 0xffffffffffffffff, 0x0) executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x1, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0xa}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) executing program 1: iopl(0x3) syslog(0x2, 0xffffffffffffffff, 0xffffffffffffff81) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xbf, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac14141607089f034d2f87e544026aab845013f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5}, &(0x7f00000003c0), &(0x7f0000000300)}, 0x20) [ 305.592005][T15366] netlink: 'syz-executor.0': attribute type 1 has an invalid length. executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={0x0}, 0x18) read(r0, &(0x7f0000000040)=""/148, 0xffffff96) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x31, &(0x7f0000000200), 0x4) listen(r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a300000000060000000060a010400000000000000000100000008000b400000000038000480240001800c0001006269747769736500140002800800034000000000080006400000100010000180080001006c6f6700040002800900010073797a3000000000140000001100010000"], 0xd4}}, 0x0) [ 305.635683][T15388] veth0_vlan: entered allmulticast mode [ 305.711694][T15393] veth0_vlan: left promiscuous mode executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000504c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010005080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1}, 0x0) [ 305.734518][T15393] veth0_vlan: entered promiscuous mode executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={0x0}, 0x18) read(r0, &(0x7f0000000040)=""/148, 0xffffff96) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x31, &(0x7f0000000200), 0x4) listen(r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a300000000060000000060a010400000000000000000100000008000b400000000038000480240001800c0001006269747769736500140002800800034000000000080006400000100010000180080001006c6f6700040002800900010073797a3000000000140000001100010000"], 0xd4}}, 0x0) executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x20) connect$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000002c0)=0x46, 0x4) getpeername$l2tp6(r0, 0x0, &(0x7f00000000c0)) executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0xa04254, &(0x7f0000000080)=ANY=[], 0x5, 0x31f, &(0x7f0000000100)="$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") open(0x0, 0x0, 0x0) truncate(&(0x7f0000000600)='./file2\x00', 0x1b) executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f000000e0c0), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r2, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2284, &(0x7f0000001200)) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0xfe44, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002302230102090500000010000020d3"]) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$tipc(0x1e, 0x5, 0x0) bpf$BPF_LINK_CREATE(0x9, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x10, 0x0, @val=@netfilter}, 0x40) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) bind$tipc(r1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(r1) [ 306.175463][T15410] vhci_hcd: invalid port number 97 [ 306.180621][T15410] vhci_hcd: default hub control req: d364 v6665 i0061 l29804 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$tipc(0x1e, 0x5, 0x0) bpf$BPF_LINK_CREATE(0x9, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x10, 0x0, @val=@netfilter}, 0x40) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) bind$tipc(r1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(r1) [ 306.230553][T15412] tipc: Failed to remove unknown binding: 66,1,1/0:13330796/13330798 [ 306.260655][T15412] tipc: Failed to remove unknown binding: 66,1,1/0:13330796/13330798 [ 306.268895][T15412] tipc: Failed to remove unknown binding: 66,1,1/0:13330796/13330798 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_getvlan={0x20, 0x72, 0xfd029edff438e20f, 0x0, 0x0, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x4}]}, 0x20}}, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x5, 0x48040) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x11}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0xc, &(0x7f00000000c0)={0x6}, 0x8}, 0x90) executing program 3: ioperm(0x0, 0x1, 0x1) modify_ldt$write(0x1, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r0}, 0x4) executing program 0: fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file2\x00', 0x14b042, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), r0) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000107200000000000000003000000"], 0x14}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f00000001c0)={0x4000}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="dc0000001e7a620a000400000000000000020000c70032000115f9b158ff052bb707c9351ace3f524a8973d1b8bbd09e972cf4642c57a1d79fd15644925376124983201eb7c82bfc0444d3bfd4079ff226b54c86d98ec2fd6b8f97ecca2def8efca10d139b914742df7183ec41220d85946c673efeddefe88e94e402f7e7596671f60d5231fb183e72ea4466df81b3b4c77fba3cfbff4d93d8f6787f16bdcafe43893fe59a756322f4fa746b028251295ed4348d96b6019629bda93a6dba736e27dba14fcf5290e706b7af2c5fcf4999caa3495d616d3504a288da00"], 0xdc}, 0x1, 0x0, 0x0, 0x40804}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r1, &(0x7f0000000b40)="020000004806a6234ab19e3793", &(0x7f0000000b80)=@tcp6=r2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000005c0)={r3, &(0x7f0000000400)='P', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000dc0)='/', &(0x7f0000000e00)=@udp6=r2}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) dup(r4) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x705, 0x0, 0x3c8, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @sit={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @local}]}}}]}, 0x50}, 0x1, 0x4c00000000000000}, 0x0) [ 306.290015][T15414] tipc: Failed to remove unknown binding: 66,1,1/0:63348859/63348861 [ 306.316114][T15414] tipc: Failed to remove unknown binding: 66,1,1/0:63348859/63348861 [ 306.320311][T15416] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 306.324226][T15414] tipc: Failed to remove unknown binding: 66,1,1/0:63348859/63348861 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$sock(r0, &(0x7f000000fd40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000007480)="60ca1874ec34", 0x6}, {&(0x7f0000000640)="364f4f5e5e9ad0e1", 0x8}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f000000f780)=[@mark={{0x14, 0x1, 0x41}}], 0x18}}], 0x2, 0x0) executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, &(0x7f0000000240)) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$tipc(0x1e, 0x5, 0x0) bpf$BPF_LINK_CREATE(0x9, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x10, 0x0, @val=@netfilter}, 0x40) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) bind$tipc(r1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(r1) [ 306.380587][T15420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31262 sclass=netlink_route_socket pid=15420 comm=syz-executor.0 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x20) connect$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000002c0)=0x46, 0x4) getpeername$l2tp6(r0, 0x0, &(0x7f00000000c0)) executing program 2: ioperm(0x0, 0x1, 0x1) modify_ldt$write(0x1, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r0}, 0x4) executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f000000e0c0), 0x10010) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r2, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000002"]) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2284, &(0x7f0000001200)) [ 306.472303][T15426] tipc: Failed to remove unknown binding: 66,1,1/0:2647055244/2647055246 [ 306.510030][T15426] tipc: Failed to remove unknown binding: 66,1,1/0:2647055244/2647055246 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0xf3a, 0x0) vmsplice(r4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="f8", 0x1}], 0x1, 0x0) write(r1, &(0x7f0000001100)="94", 0x1) tee(r0, r5, 0xaf5, 0x0) write$binfmt_script(r5, &(0x7f0000001140)={'#! ', './file0'}, 0xfffffe48) write(r2, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x34, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x4}}}]}, 0x34}}, 0x0) executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x27}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) [ 306.518588][T15426] tipc: Failed to remove unknown binding: 66,1,1/0:2647055244/2647055246 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x1c}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000440)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x4d}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[], 0x14}}, 0x0) executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x16, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth1_vlan\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x4) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}, @TCA_RATE={0x6}]}, 0x58}}, 0x0) executing program 3: ioperm(0x0, 0x1, 0x1) modify_ldt$write(0x1, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r0}, 0x4) executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='b'], 0x10) executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1a, 0x0, 0x0, 0x0, 0x1036, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$sock(r0, &(0x7f000000fd40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000007480)="60ca1874ec34", 0x6}, {&(0x7f0000000640)="364f4f5e5e9ad0e1", 0x8}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f000000f780)=[@mark={{0x14, 0x1, 0x41}}], 0x18}}], 0x2, 0x0) executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, &(0x7f0000000240)) executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x20) connect$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000002c0)=0x46, 0x4) getpeername$l2tp6(r0, 0x0, &(0x7f00000000c0)) executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x12000}}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x33fe0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clock_getres(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0xf, 0x0, "0c9e089c01860b471037f43d223b3c1b324debec40e55a07f709417eb48821996aff1c7154e746be4d7686455261c425a7519cc269d04e6205abaabde24a2b12440b329ad5bd35f21907c7988d1300"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}}, 0x0, 0x0, 0x2, 0x0, "a1c1dd75a68473ba07d945c3b03e10951cd4b347113e55eb499419be4f7542da0bc21470e441225642855b5f2f4bb561dc9363aed4a18d67efd5f2fdf98328de9441031348589b763d46d14810acc5f7"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}}}, 0x0, 0x0, 0x2e, 0x0, "4e546b1007c27b28975a08ad8d502c94527041b796e8eb1ef5f5198d75e4b6ec28f5dd3b26065546d59b038819cbd3aaa4baed161001a3bb63cac17691410038c6706a842abb55eb1a4c75c2f3012e2b"}, 0xd8) socket$kcm(0xa, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendto$inet6(r1, 0x0, 0x0, 0x4c881, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x2, 0x0, 0xfffffffffffffd25) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$tipc(0x1e, 0x5, 0x0) bpf$BPF_LINK_CREATE(0x9, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x10, 0x0, @val=@netfilter}, 0x40) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) bind$tipc(r1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(r1) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000016c0), 0x3af4701e) getdents64(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0xc5, &(0x7f0000001800)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000600), 0x8, 0x59, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x59) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0xa, 0x3, &(0x7f0000003000)=ANY=[@ANYBLOB="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"/3538], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24}, 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072beb311ccd3ec8a755c1e1380081ffad008036e8d5003aff010000001400000500248409880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000001500)={'bridge_slave_1\x00', {0x2, 0x0, @rand_addr=0x64010100}}) syz_emit_ethernet(0x1f, &(0x7f0000001540)=ANY=[@ANYBLOB="aaaaaaaaaaef01321bac2361748d0f5f1f3dfc9c075843f3d607f3fcb6d204a4b176c890396f80cdd3d9a187786ad9ddff010000f6126d0913fa9bcd9047d1d15e0e6c7d4b6df703273d3fe3ea3f82ff5500524451ae81efc295c2294ea19f5925532700bbf5c5b8002229ea1034f23c07aff8aab7dd6423d1623e5d20d500"/136], 0x0) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="8c0000001000714400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000080004005c"], 0x8c}}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000007000000f8ffffffbfa40000", @ANYRES32=r9, @ANYBLOB="0000000000000000b732040000080000003b3c9613fe64ea2f1c4286995031fa"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9a, 0x9a, 0x8, [@datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x8000}, {0x5, 0xffffff00, 0x90b8}, {0x0, 0x40400000, 0x5}, {0x1, 0x1, 0x100}, {0x3, 0x5f51, 0x6}], 'dD'}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x21, 0x4}, @fwd={0xc}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x62, 0x4}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x30, 0x61]}}, &(0x7f00000007c0)=""/202, 0xbc, 0xca, 0x1, 0x6}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0x0, 0x300) [ 306.796394][T15437] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 306.818610][ T3979] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000016c0), 0x3af4701e) getdents64(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0xc5, &(0x7f0000001800)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000600), 0x8, 0x59, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x59) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0xa, 0x3, &(0x7f0000003000)=ANY=[@ANYBLOB="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"/3538], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24}, 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072beb311ccd3ec8a755c1e1380081ffad008036e8d5003aff010000001400000500248409880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="59235bd7a9324ff307d87177332368fbdeefaa1544600ea1870645446c357de433206896637019b84d57c3de1ea07638e494dd701db1af6fc15db78cf79f5ab4bc7aee8553677ffe377a35b4afdb989fb7da1ff63956ffb796d51daf1c268b9f1a4a06583f8c03ec1671b151a8a495c1b006fa5f2f3a54a46aeee8005b178b9516d2b928984ccb942fa2278a2e33a0b619f2dd814fc91942e03c48fd9b7d19d9a6612b46805b267ef3132a724cbfcd1c715be67930e2ae2b9a2479c5a4b2fecd301a745a6fd67598a5e5ecc1e56e58159c47def7f9285acfedc980596377e6f9ee076fa094e5d8f838b718ed63ff8265a1dbc1549bed03e6b27b6fc2b8a07373506a1a41d5a71cbf0eaa24ec737b02a8a2d5114c3c4e5810a2c3eae3373fd341800cfb0fb35cefe04ca4da2b02a83c40126e23cdf3c817b530bbe7b431bc0b7d864e3e6dd1ab90259a8bd7ad7dd4c6366ea6da661fd016b394adcce5988fff85fbc832a927c97b89337e195f562cd284911eef1ee52e4ff033b33beedea7cf43c4d0cc0471fa91011e1e7e8733bf82c01346d6ecb49f1a84e92d063c81a7227d89be33f7273b87e29ae53a5f38dc94cf391fcb82c9432821ef1a0f6bbfe8f7d6574479a8f621e1d8f7d9bb20f3d8d469e6d232d7d7837ff12a224a65c604907e787baaf7c863ad48a5edecbe1470c20507a6ee5dee75e9ef84c71af5af800a9ce9787ebdee9e1c8189fbf66048d5c3757fb2b697ce68cfd316a7b25a385111e0cd2fddb81602e36e74c4f99b403cb304a4774e648054c0456c7869f9d97873ff80e2664c1265292941a9b767c7f40767cfccdbcaa156453d6a910fd5440f7a2bf8f4bb6d6d9fd443f2304617a684b6afa99c157dcf70e51fdb55fd0dbf5c6733841024599f8d1791a07c5dc3a4ccaf4d7c0ca3d101b2beba3a49d2378c9fe4fdb10babd95083a0c4db5a30c4490828d97efe807a13e587fbac1089843964facfd27d287262759384fe9b610f81048be430c1e8fe6327c0f2fd003021d20563ec0c7e39aec6718649c958da2e02cb3848c76924492678889c18bea02ed5ee080106e9838cbca9ad5f66c0434182225b13a236b342cf80562c10d4a3459aea17589b84904d3d2c2b", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000001500)={'bridge_slave_1\x00', {0x2, 0x0, @rand_addr=0x64010100}}) syz_emit_ethernet(0x1f, &(0x7f0000001540)=ANY=[@ANYBLOB="aaaaaaaaaaef01321bac2361748d0f5f1f3dfc9c075843f3d607f3fcb6d204a4b176c890396f80cdd3d9a187786ad9ddff010000f6126d0913fa9bcd9047d1d15e0e6c7d4b6df703273d3fe3ea3f82ff5500524451ae81efc295c2294ea19f5925532700bbf5c5b8002229ea1034f23c07aff8aab7dd6423d1623e5d20d500"/136], 0x0) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="8c0000001000714400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000080004005c"], 0x8c}}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000007000000f8ffffffbfa40000", @ANYRES32=r9, @ANYBLOB="0000000000000000b732040000080000003b3c9613fe64ea2f1c4286995031fa"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9a, 0x9a, 0x8, [@datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x8000}, {0x5, 0xffffff00, 0x90b8}, {0x0, 0x40400000, 0x5}, {0x1, 0x1, 0x100}, {0x3, 0x5f51, 0x6}], 'dD'}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x21, 0x4}, @fwd={0xc}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x62, 0x4}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x30, 0x61]}}, &(0x7f00000007c0)=""/202, 0xbc, 0xca, 0x1, 0x6}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0x0, 0x300) [ 306.845568][T15467] tipc: Failed to remove unknown binding: 66,1,1/0:4249685417/4249685419 [ 306.859200][T15467] tipc: Failed to remove unknown binding: 66,1,1/0:4249685417/4249685419 [ 306.867731][T15467] tipc: Failed to remove unknown binding: 66,1,1/0:4249685417/4249685419 [ 306.915438][T15472] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x4d}, {0x16}]}, 0x10) sendmmsg$inet(r0, &(0x7f0000005680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 307.014474][T15474] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000016c0), 0x3af4701e) getdents64(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0xc5, &(0x7f0000001800)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000600), 0x8, 0x59, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x59) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0xa, 0x3, &(0x7f0000003000)=ANY=[@ANYBLOB="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"/3538], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24}, 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072beb311ccd3ec8a755c1e1380081ffad008036e8d5003aff010000001400000500248409880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000001500)={'bridge_slave_1\x00', {0x2, 0x0, @rand_addr=0x64010100}}) syz_emit_ethernet(0x1f, &(0x7f0000001540)=ANY=[@ANYBLOB="aaaaaaaaaaef01321bac2361748d0f5f1f3dfc9c075843f3d607f3fcb6d204a4b176c890396f80cdd3d9a187786ad9ddff010000f6126d0913fa9bcd9047d1d15e0e6c7d4b6df703273d3fe3ea3f82ff5500524451ae81efc295c2294ea19f5925532700bbf5c5b8002229ea1034f23c07aff8aab7dd6423d1623e5d20d500"/136], 0x0) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="8c0000001000714400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000080004005c"], 0x8c}}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000007000000f8ffffffbfa40000", @ANYRES32=r9, @ANYBLOB="0000000000000000b732040000080000003b3c9613fe64ea2f1c4286995031fa"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9a, 0x9a, 0x8, [@datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x8000}, {0x5, 0xffffff00, 0x90b8}, {0x0, 0x40400000, 0x5}, {0x1, 0x1, 0x100}, {0x3, 0x5f51, 0x6}], 'dD'}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x21, 0x4}, @fwd={0xc}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x62, 0x4}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x30, 0x61]}}, &(0x7f00000007c0)=""/202, 0xbc, 0xca, 0x1, 0x6}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0x0, 0x300) executing program 1: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={0x0}, 0x18) read(r0, &(0x7f0000000040)=""/148, 0xffffff96) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x31, &(0x7f0000000200), 0x4) listen(r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a300000000060000000060a010400000000000000000100000008000b400000000038000480240001800c0001006269747769736500140002800800034000000000080006400000100010000180080001006c6f6700040002800900010073797a3000000000140000001100010000"], 0xd4}}, 0x0) [ 307.213768][T15482] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 1: ioperm(0x0, 0x1, 0x1) modify_ldt$write(0x1, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r0}, 0x4) executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x16, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth1_vlan\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x4) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}, @TCA_RATE={0x6}]}, 0x58}}, 0x0) executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$sock(r0, &(0x7f000000fd40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000007480)="60ca1874ec34", 0x6}, {&(0x7f0000000640)="364f4f5e5e9ad0e1", 0x8}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f000000f780)=[@mark={{0x14, 0x1, 0x41}}], 0x18}}], 0x2, 0x0) executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='b'], 0x10) executing program 1: ioperm(0x0, 0x1, 0x1) modify_ldt$write(0x1, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) madvise(&(0x7f00005f3000/0x4000)=nil, 0x4000, 0x17) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r0}, 0x4) executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, &(0x7f0000000240)) executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000033f000/0x2000)=nil, 0x3) executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0xf3a, 0x0) vmsplice(r4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="f8", 0x1}], 0x1, 0x0) write(r1, &(0x7f0000001100)="94", 0x1) tee(r0, r5, 0xaf5, 0x0) write$binfmt_script(r5, &(0x7f0000001140)={'#! ', './file0'}, 0xfffffe48) write(r2, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x34, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x4}}}]}, 0x34}}, 0x0) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@multicast1, @multicast2}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100000000000600d, 0x0) creat(&(0x7f00000015c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x92) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = dup2(r2, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) readahead(r4, 0x6, 0x7) pread64(r2, &(0x7f0000000000)=""/9, 0x9, 0x5) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) setsockopt$inet_buf(r5, 0x0, 0x41, &(0x7f00008e2fba)="958e392937a186d6306a3615593baa57ff0002060000000000079ab4d5ed5cff03000000000000ffff8dffff080cf4eacc49d4df311e370043159379595d0000000000000093bffffffeffbd03ba89734f4e49fda5060255", 0x58) r6 = dup(r2) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x220040, 0x0) getpeername$inet(r5, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) ftruncate(r7, 0x6e) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "a0d6485672bc7343", "9defff8ba4b09f35bf23531e83e8aef8", "c60e9be7", "b8363bdde448379f"}, 0x28) accept4(r3, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000380)=0x80, 0x80000) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x1276, &(0x7f00000001c0)={'\x00', 0x2000, 0xb, 0x10000, 0x0, 0x0, 0xffffffffffffffff}) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_getvlan={0x20, 0x72, 0xfd029edff438e20f, 0x0, 0x0, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x4}]}, 0x20}}, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x5, 0x48040) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x11}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0xc, &(0x7f00000000c0)={0x6}, 0x8}, 0x90) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000440)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x4d}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[], 0x14}}, 0x0) [ 307.398631][ T3979] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@multicast1, @multicast2}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100000000000600d, 0x0) creat(&(0x7f00000015c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x92) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = dup2(r2, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) readahead(r4, 0x6, 0x7) pread64(r2, &(0x7f0000000000)=""/9, 0x9, 0x5) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) setsockopt$inet_buf(r5, 0x0, 0x41, &(0x7f00008e2fba)="958e392937a186d6306a3615593baa57ff0002060000000000079ab4d5ed5cff03000000000000ffff8dffff080cf4eacc49d4df311e370043159379595d0000000000000093bffffffeffbd03ba89734f4e49fda5060255", 0x58) r6 = dup(r2) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x220040, 0x0) getpeername$inet(r5, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) ftruncate(r7, 0x6e) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "a0d6485672bc7343", "9defff8ba4b09f35bf23531e83e8aef8", "c60e9be7", "b8363bdde448379f"}, 0x28) accept4(r3, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000380)=0x80, 0x80000) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x1276, &(0x7f00000001c0)={'\x00', 0x2000, 0xb, 0x10000, 0x0, 0x0, 0xffffffffffffffff}) executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 307.445923][T15504] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 307.459338][ T3979] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file2\x00', 0x14b042, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), r0) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000107200000000000000003000000"], 0x14}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xbf22}, 0x48) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f00000001c0)={0x4000}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="dc0000001e7a620a000400000000000000020000c70032000115f9b158ff052bb707c9351ace3f524a8973d1b8bbd09e972cf4642c57a1d79fd15644925376124983201eb7c82bfc0444d3bfd4079ff226b54c86d98ec2fd6b8f97ecca2def8efca10d139b914742df7183ec41220d85946c673efeddefe88e94e402f7e7596671f60d5231fb183e72ea4466df81b3b4c77fba3cfbff4d93d8f6787f16bdcafe43893fe59a756322f4fa746b028251295ed4348d96b6019629bda93a6dba736e27dba14fcf5290e706b7af2c5fcf4999caa3495d616d3504a288da00"], 0xdc}, 0x1, 0x0, 0x0, 0x40804}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r1, &(0x7f0000000b40)="020000004806a6234ab19e3793", &(0x7f0000000b80)=@tcp6=r2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000005c0)={r3, &(0x7f0000000400)='P', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000dc0)='/', &(0x7f0000000e00)=@udp6=r2}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) dup(r4) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x705, 0x0, 0x3c8, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @sit={{0x8}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @local}]}}}]}, 0x50}, 0x1, 0x4c00000000000000}, 0x0) executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 307.526882][ T3979] bridge_slave_1: left allmulticast mode [ 307.532592][ T3979] bridge_slave_1: left promiscuous mode [ 307.537414][T15514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31262 sclass=netlink_route_socket pid=15514 comm=syz-executor.0 [ 307.538346][ T3979] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.560556][ T3979] bridge_slave_0: left allmulticast mode [ 307.566419][ T3979] bridge_slave_0: left promiscuous mode [ 307.572227][ T3979] bridge0: port 1(bridge_slave_0) entered disabled state executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000016c0), 0x3af4701e) getdents64(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0xc5, &(0x7f0000001800)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000600), 0x8, 0x59, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x59) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0xa, 0x3, &(0x7f0000003000)=ANY=[@ANYBLOB="850000002200000007000000000000089500000000000000e26c9bd1a6361b80cdd6ff0700000000000869045aac0000659f55df08f9b90788ff7f00000010000029c21ebbcde61d8ab5920aef6c3e007fe61241638962cf0b89ef506cfd3f1d4163d3cfca3733b30070a7cf53021a9554320000000000000014569d65e33d46f8d8ae24ba69c657afac04379cb536008c219991704f11c5a01ba62ed8f2c6a503dd1b1d076f03b0f917c766f3a7598bbc00feb3bc8e88f79df517b37b56bcbc290080000000000000e675458a43b8a8935bf9cf0be7d0aeaac41405e341cd0ba0d6fd562489dad595712a4051bb6cf826ab757193fe093b8b3353fbbb278d19000000000000007b61805ed430ef06000000000000001e93f640f159320c8b088f4d64977b2eb312d4967aff9e4c14c66c90000054ed82c7cba4c81f91d6dfed18767bf0df584b4b6c4204df411f921e3aa02a67dd324b8176020e9c024751df38c05727f82c92046bfe64babb6d7ba86526b7886a0c2481c5812812a6fa3fca3758cbd8c32b25c28be225bd1f16297baa065f5bf96330fad0aaa4388c06c0eb2ecdf829af9577fcd868cc269b740000b777d73a63246ce6f0467167626329ab91df7a13d9ec9a64e7f6b56aeab8c38f69a213c96e2d2ad7978c9d721c270f27e7025d576535198742d403ec43572d7d0baf00e882617b260627805ca44200335ea4363066944d0aa6feb9705b09ba40d4642519281151f875cbf13a582f90ad719f0eccf02a473dd508a16138904933689ea6ee02412064730700e5ff2b69c2f2bf6f691c3560e068743ae8e8771280da61fd8fdc3f7a35ea352e35753c59ebc1bd27ab66f7e5afb1b3f057fbb7ed3aabe702b3c6301d3f5c295d1d69d1541d0e64631c95d6c0999e27e8d1a55db02db9ed8076dd465f32f28f6a00f19102d2bfaf53f25a45637b1c577ae50c4c56d9abc40c64a20c14ff0b1bf4d23fe07ae90f503ba9c64bf89b26e7d8d70710b04f9ece69023acadbb4582272e5b3a0a270180e0545b0c824ad36f7cc8be12b3874d5a19349b0ede845e9ece24d546d3af1bae069b89f6ecf2aabb17eb1840bc8e0ed1dd8b9b7eeaf32a185d80250a7f2eeb756eadafe20bbc616bc44b347abc8caf722b2c3b06884c1d1690f23b06fa4541bb2a81073b452764f04bd39008b65ee222cf697ac21b087548e9708dffaff2859e973b1e88668c8022cc6dac8548167e5798ec9c7d288a7fa7749f07513187cd8f060abbbc5e37dd1be3aab927be1b409be733b7408534e5b0951e9ecfd0a1c77e3a29be4c4093330124615056e3ce0ce6ac91b1242d3bb2e787a186dc2ec284d60e9d8a03884a22eeaa1efa497ee88c6cb565b164a260afb5157e392b1ebb1a4d4f992011ecbac4a0a6df5bdc6f7994a422bb2761edd2d8f20f5f879a88f89d48b8314f862585e4b7a9d6a6681f40e8b82cc6555dcdb951d164cc9a70e640ac8974faa2587a6e3af3b9458f7d4b4077b3002536b10ea24d73307a33090c4c270909a5322eac32cb175e68fa83457b21465c08c02dcefccc0c714c2862ddbe567755f05a1e671328d160d3752345ca1db6e74c720e42afca982ba6befd96c5575f1dd8f87ff6606301c0000000000000000000000000000000000000004d0d54b4caf78018766cdb971e8b168d4763c21181f00000003d4e1d842caf457797f93db93e4f38a9dbd79f6bf5dc40b55fdbf9b856665061b2e2924f27eb2d2b5a181ccfd9eeb11dec165b6f12433f00bb06124041ffdcdcdc91f3b3b76635a689c9249cf69bcae654bfa81e75b7c7002b883c56026d83520395b7d511f607cf2f899c7b1c75e2192f775d72247167285857588ace1115fbebfe63c16b84cf7036d41c493a63c09f2ce46c1f5995c2d7fe58c15e64bb4cb7e7f336cc22fa1ea1363bce375bd3d579be1dddb08ed5147b629e4b3f0e65783ee5e20d9270802f2a7500738bf356131ca5300d7ba8d486fb26252d684b84fa24639089064ca7b93057c041f12d544dab4d24a4f952b4f265a69ba279929959991b7ac63786055b3c029a0e8b6e4c26497c029bb61462623a58556cd62844d4d23cc738ee5b36c71d2c010b089251d5806000b1ade92dd9f441468967c052aecd9de81b4b55d06670597991f37ddc4fa19a6369d5bf76c474633a337f676ad255869881da5cadcf49ce9188129cc978977f87b32bd49457536430ffbd3e01e67ff087644f52fcf0a3c732b0586cb87972c43d2616bf4e521dc3126bf1760243d51a197d3ecfd74bd625e9f496175cfeaaa020817d33d513f3e97854ea76e04e96a8639a297871485a8609f8ca842b3321932c4d9e224a0cec5946cec9e359fd3687415cad5fb8c678136f36d9f781fade9f2469477748f4dfa0f56c326c89bb5d07f35aaf95303b5a620fc84e1c735647895713cbcea57b2277831f8f633f0d29371e645e5544e57010a9b76457f6ad73231a9f31f6bbb1b95248aeda5a9df9dea64cc1fd1f06a980fcf3a792bb0910e45fce298ab0a0298fc33a423e860d5b308d7849381b294106af25f15fec047d5b844a99f36e342165df728e381b48c20e0900f8d265157467d3494f2b96acf060f74084760d226f50edb115c2e075f3c663a4b4169b900fa0a13cf796e0d7a9dad86953c13ed6241206d682e194c64c491de6a531e9bd45abe705f07000a82ccd41a2c1b9d5dd8bf6c28653eb84f117e476e052a9db790e0a71dac9d31343efebdc026860000000000000000000000000000aad579302085dfdf75bea24798c680b3de341e3bd57543cd8dfd58bcebdbb883c743ed43ba7f540f2c4e0310c21e7deff9e45b8bd2e365bb584091b8e80e34b3e59185fe32d1d73dd4f62712a39b13661516723b6b80a7e99e5aa6536982c02275fc53fa3ef14d9fccb05f9c4e69a3af0fde863af2d9a0f8a94fc571b0ab4ad714f41fa4ee0b8b44e3c41a3125be95e4b23d5f05395852761bfaebe0db979d5f3991d826cc74542b85cfd0dba66bc93cfd79178ab0b79fa3b29ff9c19e0424513c91980187c9d94b8354337a1fc782505db900c47d83bd49276cfe6e242ba8365b1ea4598a21f50f5415a70990b5bb4a1f6bd8acdf2c7da3d648754767089c9b5ceb556fafa3cc5afd2f3e9a62a90262a76ff89a2751b59a744f0d3f36ca503357daa3e29ce6f357dc1e4839277d003e93fdbb955e1a1302a76aea7e73835094fb15464e94e814c77c293121d0433e80d444c4ca17abaf32b521d8686666055da023aef9c8df3e80d2ed640ed10aa19a036dcef172dbd3b3600b69d7b90c6222e167d7c76059f2b5f3b3004e8a20d1f6612efeb629573be97aa949c6016e7e1628902a986aaa4fc8a098708ebe36f377ada63d9b464c39342e0682549862de3ec75e7b031bc49f341a21417fb6375e8701481b59d1722c8369618046668016069425e30b520bf1615a4bbf30aa74d60ec6b657f2dd298b0419da43fc708a60c94a7ff2fd6a2d08005ad73c9e2d6143d2857be8fb3f12bfa6628bccb153e39172d07563d6a1dc75c347c08060304f091230bd74b49ecdd13bf480db3984622a167c8603b8c501280059a7b6123c8f8cd217f64eccc2dffe4f3a1e8c9a96a13d8126f3ea26779fbd0069d729a7764d4ddd7d9d820b0de2530969362b94b974678527f5bac7eb8d6e321b2be0b2f7534634a5ecd1248d7ad7e8e03163e92e9f1d620e28597bd881eea0981e8adfd70b670b0763ce9226f7c3e156b353e22fdea6942b577bbc539aab23cbd46bdd0ea1e67140c759f208c12dc57f3100000000e4965fcb6c0749955eac9476687e63b41c6282bbcb0c3d8b0c9493a3a5f6d879d7257b4b68dc7cac3d9d5f5bbe937c501866ee4042b250e516ec074559e1e551167138766eeecb6941e8305d9cde1800c821536f9d25bd14163890842a08135bdb7a90db630b18f099855a7d9de65c80fa71ff90e873361d0e11a7dfebe56ffb2000b711a0b7914d6351ff605b3e48af60e1ffecba7cd6f8ab662eb3c8f3164139e994d6a706afb92722595d649a04f1ff64e5634e7cb9106173a9d5d8cf3e5a959e6bfdc1b6507b851c4ba43312726cfec58dedece1355a087c1b60882713a6161914f09267e2ce8aa886b3c0add5cd92e185d345c9b2933a78a4215133e8e7247fa444aee30bfb6c0fcada974254bc5feda6cee9a0803b2a0b63f440202ed5f278e4cf06565370893e7481efdfbc49b118eb17ba0104000000000000b342fdef64b143b525daae4e27e7368f913e6111bb5329b8b133d03cc34d736d22ba139b03b7fc83ac49f2dfc915a2f27e2eac8dc2a6ba72e6bdd423b3946a4500e0a42340700b93bca902e02f744ceb51534f1fb9fa87f850a6c6eed76f7376e2a7e72d3a64a82720ded8f0ce31b1de3561362e975ed32a7167d9e0ad3f2a77f7a10c1614a9ba938a98da2976cb1a0d049446e67073c9a1a38ecc881c693a524c5291f89677de9fe904c752e450eba71d2f32805501d0df5b4a41123233554bdc35b562d9f5a2a026a3b40fc7c9a8546fc8d8300a9876114ffd7dfb909656d54c31bbb655af54bbeeb0174e451ceb7b35e5bd1ac15792ff474abcde8353fe0de700b110a00305ff77c133181688a62a49cff6db4cb4a5a90d40d35e927d216435df804b8bd6033a7ce49f11491f752fefa99e9c54428b725486291490d311b13eb02d14a0ae56733141a8dc6d51e35100000000000000002708cac64111287c9f384a63b97dfde5bf4e460da804842872c764478acd61bbbc3880b20d849f17922042bf908da86906fcc425e0c80dbc06669df33b14518a9dc6fc60c65c279ab498d6e3233737b724834055fba7b70e49615a98ac9410836eee7dd6265d24ef82eb5b37bcf709db9a7dc8366fe44961a15eff37bb7e8356389ae944e604ea35f6fbed902654fed411064f37d70b7c2b039bdb00"/3538], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x24}, 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072beb311ccd3ec8a755c1e1380081ffad008036e8d5003aff010000001400000500248409880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000001500)={'bridge_slave_1\x00', {0x2, 0x0, @rand_addr=0x64010100}}) syz_emit_ethernet(0x1f, &(0x7f0000001540)=ANY=[@ANYBLOB="aaaaaaaaaaef01321bac2361748d0f5f1f3dfc9c075843f3d607f3fcb6d204a4b176c890396f80cdd3d9a187786ad9ddff010000f6126d0913fa9bcd9047d1d15e0e6c7d4b6df703273d3fe3ea3f82ff5500524451ae81efc295c2294ea19f5925532700bbf5c5b8002229ea1034f23c07aff8aab7dd6423d1623e5d20d500"/136], 0x0) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="8c0000001000714400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000080004005c"], 0x8c}}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000007000000f8ffffffbfa40000", @ANYRES32=r9, @ANYBLOB="0000000000000000b732040000080000003b3c9613fe64ea2f1c4286995031fa"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9a, 0x9a, 0x8, [@datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x8000}, {0x5, 0xffffff00, 0x90b8}, {0x0, 0x40400000, 0x5}, {0x1, 0x1, 0x100}, {0x3, 0x5f51, 0x6}], 'dD'}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x21, 0x4}, @fwd={0xc}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x62, 0x4}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x30, 0x61]}}, &(0x7f00000007c0)=""/202, 0xbc, 0xca, 0x1, 0x6}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0x0, 0x300) [ 307.774575][ T3979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 307.788402][ T3979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 307.799253][ T3979] bond0 (unregistering): Released all slaves executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@multicast1, @multicast2}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100000000000600d, 0x0) creat(&(0x7f00000015c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x92) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = dup2(r2, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) readahead(r4, 0x6, 0x7) pread64(r2, &(0x7f0000000000)=""/9, 0x9, 0x5) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) setsockopt$inet_buf(r5, 0x0, 0x41, &(0x7f00008e2fba)="958e392937a186d6306a3615593baa57ff0002060000000000079ab4d5ed5cff03000000000000ffff8dffff080cf4eacc49d4df311e370043159379595d0000000000000093bffffffeffbd03ba89734f4e49fda5060255", 0x58) r6 = dup(r2) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x220040, 0x0) getpeername$inet(r5, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) ftruncate(r7, 0x6e) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "a0d6485672bc7343", "9defff8ba4b09f35bf23531e83e8aef8", "c60e9be7", "b8363bdde448379f"}, 0x28) accept4(r3, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000380)=0x80, 0x80000) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x1276, &(0x7f00000001c0)={'\x00', 0x2000, 0xb, 0x10000, 0x0, 0x0, 0xffffffffffffffff}) executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r1 = open(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="b164d355dedcf3b4534b2a1f8f9bf0f590d5ed05634b254973c12202b9f66e53fdc912be6a9b31adb279eda8760aafb338a228bf64dfe4385f1e30786506b3377286c2926f901dcb3ba49efd4ccf1f21e70d9427a1504b94", 0x58}], 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x9, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x0, 0x800) syz_io_uring_setup(0x58f2, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) syz_io_uring_setup(0x62df, &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000000)) r4 = fsmount(r1, 0x0, 0x8c) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000400)={{r0}, 0x0, 0x16, @unused=[0xb7, 0x9, 0x401, 0x8], @subvolid=0x380000000000}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000004"], 0x6c}}, 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000080)="4c00000012001f15b9409b849ac00a00a5784004000000000000030038c88cc055c5ac27a6c5b068d0bf46d323452536005ad94a461cdbfee9bdb942352359a351d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) [ 307.821635][T15499] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 307.830730][T15526] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000080)="4c00000012001f15b9409b849ac00a00a5784004000000000000030038c88cc055c5ac27a6c5b068d0bf46d323452536005ad94a461cdbfee9bdb942352359a351d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/544]}, 0x298) [ 307.911321][T15534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 307.927432][ T3979] hsr_slave_0: left promiscuous mode [ 307.935700][ T3979] hsr_slave_1: left promiscuous mode [ 307.941822][ T3979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 307.949383][ T3979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 307.965341][ T3979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 307.972890][ T3979] batman_adv: batadv0: Removing interface: batadv_slave_1 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}]}, 0x48}}, 0x0) executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0xf3a, 0x0) vmsplice(r4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="f8", 0x1}], 0x1, 0x0) write(r1, &(0x7f0000001100)="94", 0x1) tee(r0, r5, 0xaf5, 0x0) write$binfmt_script(r5, &(0x7f0000001140)={'#! ', './file0'}, 0xfffffe48) write(r2, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_newroute={0x34, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x4}}}]}, 0x34}}, 0x0) [ 308.005739][ T3979] veth1_macvtap: left promiscuous mode [ 308.011349][ T3979] veth0_macvtap: left promiscuous mode [ 308.016996][ T3979] veth1_vlan: left promiscuous mode [ 308.022596][ T3979] veth0_vlan: left promiscuous mode [ 308.129900][ T3979] team0 (unregistering): Port device team_slave_1 removed [ 308.141170][ T3979] team0 (unregistering): Port device team_slave_0 removed executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, &(0x7f0000000240)) executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000033f000/0x2000)=nil, 0x3) executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@multicast1, @multicast2}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100000000000600d, 0x0) creat(&(0x7f00000015c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x92) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = dup2(r2, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) readahead(r4, 0x6, 0x7) pread64(r2, &(0x7f0000000000)=""/9, 0x9, 0x5) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) setsockopt$inet_buf(r5, 0x0, 0x41, &(0x7f00008e2fba)="958e392937a186d6306a3615593baa57ff0002060000000000079ab4d5ed5cff03000000000000ffff8dffff080cf4eacc49d4df311e370043159379595d0000000000000093bffffffeffbd03ba89734f4e49fda5060255", 0x58) r6 = dup(r2) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x220040, 0x0) getpeername$inet(r5, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) ftruncate(r7, 0x6e) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "a0d6485672bc7343", "9defff8ba4b09f35bf23531e83e8aef8", "c60e9be7", "b8363bdde448379f"}, 0x28) accept4(r3, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000380)=0x80, 0x80000) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x1276, &(0x7f00000001c0)={'\x00', 0x2000, 0xb, 0x10000, 0x0, 0x0, 0xffffffffffffffff}) [ 308.259957][T15547] netlink: 'syz-executor.0': attribute type 1 has an invalid length. executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0xb, &(0x7f0000000340)={0x2}, 0x10) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x24, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x4, 0x1, 'syz0\x00'}]}, 0x24}}, 0x0) [ 308.302996][T15557] block device autoloading is deprecated and will be removed. executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0xb, &(0x7f0000000340)={0x2}, 0x10) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x24, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x4, 0x1, 'syz0\x00'}]}, 0x24}}, 0x0) executing program 1: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={0x0}, 0x18) read(r0, &(0x7f0000000040)=""/148, 0xffffff96) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x31, &(0x7f0000000200), 0x4) listen(r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a300000000060000000060a010400000000000000000100000008000b400000000038000480240001800c0001006269747769736500140002800800034000000000080006400000100010000180080001006c6f6700040002800900010073797a3000000000140000001100010000"], 0xd4}}, 0x0) [ 308.395573][T15272] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 308.404836][T15272] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 308.414514][T15272] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 308.424087][T15272] netdevsim netdevsim4 netdevsim3: renamed from eth3 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 308.476827][T15272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.491850][T15272] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.502243][T13679] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.509415][T13679] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@multicast1, @multicast2}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100000000000600d, 0x0) creat(&(0x7f00000015c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x92) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = dup2(r2, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) readahead(r4, 0x6, 0x7) pread64(r2, &(0x7f0000000000)=""/9, 0x9, 0x5) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) setsockopt$inet_buf(r5, 0x0, 0x41, &(0x7f00008e2fba)="958e392937a186d6306a3615593baa57ff0002060000000000079ab4d5ed5cff03000000000000ffff8dffff080cf4eacc49d4df311e370043159379595d0000000000000093bffffffeffbd03ba89734f4e49fda5060255", 0x58) r6 = dup(r2) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x220040, 0x0) getpeername$inet(r5, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) ftruncate(r7, 0x6e) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "a0d6485672bc7343", "9defff8ba4b09f35bf23531e83e8aef8", "c60e9be7", "b8363bdde448379f"}, 0x28) accept4(r3, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000380)=0x80, 0x80000) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0x1276, &(0x7f00000001c0)={'\x00', 0x2000, 0xb, 0x10000, 0x0, 0x0, 0xffffffffffffffff}) [ 308.524831][T13665] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.532070][T13665] bridge0: port 2(bridge_slave_1) entered forwarding state executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r1 = open(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="b164d355dedcf3b4534b2a1f8f9bf0f590d5ed05634b254973c12202b9f66e53fdc912be6a9b31adb279eda8760aafb338a228bf64dfe4385f1e30786506b3377286c2926f901dcb3ba49efd4ccf1f21e70d9427a1504b94", 0x58}], 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x9, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x0, 0x800) syz_io_uring_setup(0x58f2, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) syz_io_uring_setup(0x62df, &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000000)) r4 = fsmount(r1, 0x0, 0x8c) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000400)={{r0}, 0x0, 0x16, @unused=[0xb7, 0x9, 0x401, 0x8], @subvolid=0x380000000000}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000004"], 0x6c}}, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 308.649356][T15578] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 308.667978][T15272] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r1 = open(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="b164d355dedcf3b4534b2a1f8f9bf0f590d5ed05634b254973c12202b9f66e53fdc912be6a9b31adb279eda8760aafb338a228bf64dfe4385f1e30786506b3377286c2926f901dcb3ba49efd4ccf1f21e70d9427a1504b94", 0x58}], 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x9, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x0, 0x800) syz_io_uring_setup(0x58f2, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) syz_io_uring_setup(0x62df, &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000000)) r4 = fsmount(r1, 0x0, 0x8c) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000400)={{r0}, 0x0, 0x16, @unused=[0xb7, 0x9, 0x401, 0x8], @subvolid=0x380000000000}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000004"], 0x6c}}, 0x0) executing program 2: mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, 0x80ffffff}, [@alu={0x7, 0x1}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r1, &(0x7f0000000c80)='./file0\x00', 0x0, &(0x7f0000000cc0)={0x0, 0x0, 0x80000}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r2) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r5, &(0x7f0000002dc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)="86", 0x1}], 0x1}}], 0x2, 0x2400005c) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff050003000000000005000300000000000500030080ffffff0800020003"], 0x50}}, 0x0) r6 = io_uring_setup(0x3dd3, &(0x7f0000001100)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000051ec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000006c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x3, "4ad80a766d1a7c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000002180)={0x2, [{}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "509f0658ac5d88"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000001180)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x31, "9a9cca4e7cd4e0"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, &(0x7f0000000000)={{r18, 0x4, 0x2, 0x1f, 0x3a, 0x2, 0x3, 0x124b, 0x5, 0x7797, 0x7, 0x1f, 0x0, 0x5, 0xb4}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x20) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) executing program 3: mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, 0x80ffffff}, [@alu={0x7, 0x1}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r1, &(0x7f0000000c80)='./file0\x00', 0x0, &(0x7f0000000cc0)={0x0, 0x0, 0x80000}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r2) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r5, &(0x7f0000002dc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)="86", 0x1}], 0x1}}], 0x2, 0x2400005c) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff050003000000000005000300000000000500030080ffffff0800020003"], 0x50}}, 0x0) r6 = io_uring_setup(0x3dd3, &(0x7f0000001100)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000051ec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000006c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x3, "4ad80a766d1a7c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000002180)={0x2, [{}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "509f0658ac5d88"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000001180)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x31, "9a9cca4e7cd4e0"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, &(0x7f0000000000)={{r18, 0x4, 0x2, 0x1f, 0x3a, 0x2, 0x3, 0x124b, 0x5, 0x7797, 0x7, 0x1f, 0x0, 0x5, 0xb4}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x20) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) [ 308.757433][ T28] kauditd_printk_skb: 77 callbacks suppressed [ 308.757448][ T28] audit: type=1400 audit(1714783464.162:2382): avc: denied { read write } for pid=15098 comm="syz-executor.2" name="loop2" dev="devtmpfs" ino=545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 308.815574][T15588] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, 0x80ffffff}, [@alu={0x7, 0x1}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r1, &(0x7f0000000c80)='./file0\x00', 0x0, &(0x7f0000000cc0)={0x0, 0x0, 0x80000}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r2) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r5, &(0x7f0000002dc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)="86", 0x1}], 0x1}}], 0x2, 0x2400005c) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff050003000000000005000300000000000500030080ffffff0800020003"], 0x50}}, 0x0) r6 = io_uring_setup(0x3dd3, &(0x7f0000001100)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000051ec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000006c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x3, "4ad80a766d1a7c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000002180)={0x2, [{}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "509f0658ac5d88"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000001180)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x31, "9a9cca4e7cd4e0"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, &(0x7f0000000000)={{r18, 0x4, 0x2, 0x1f, 0x3a, 0x2, 0x3, 0x124b, 0x5, 0x7797, 0x7, 0x1f, 0x0, 0x5, 0xb4}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x20) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) [ 308.849124][ T28] audit: type=1400 audit(1714783464.162:2383): avc: denied { open } for pid=15098 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 308.872664][ T28] audit: type=1400 audit(1714783464.162:2384): avc: denied { ioctl } for pid=15098 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=545 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 308.897594][ T28] audit: type=1400 audit(1714783464.252:2385): avc: denied { ioctl } for pid=15590 comm="syz-executor.3" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=52419 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="17000000690001"], 0x18}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304, 0x38}, '\x00', "e20000000000000010000000002000", "e0f10400", "8c478bf902150108"}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x35, 0x0, 0x0) executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c}, {0x74}, {0x6}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 309.042163][T15272] veth0_vlan: entered promiscuous mode [ 309.063280][T15272] veth1_vlan: entered promiscuous mode [ 309.084078][T15272] veth0_macvtap: entered promiscuous mode [ 309.092948][T15272] veth1_macvtap: entered promiscuous mode [ 309.099374][ T28] audit: type=1326 audit(1714783464.512:2386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15603 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5426bbfca9 code=0x0 [ 309.104523][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.133456][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.143304][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.153792][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.163738][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.174492][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.184703][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.195167][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.207571][T15272] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 309.220568][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.231134][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.241107][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.251994][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.262239][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.272852][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.282864][T15272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000002d0000b7000000000000005600000000dd000095"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) [ 309.293445][T15272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.304293][T15272] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 309.314971][T15272] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.323724][T15272] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.332721][T15272] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002680)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x50}}, 0x0) executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f00000005c0), 0x10) recvmmsg(r0, &(0x7f0000003080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000000c0)=0x1, 0x4) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000580)=0x1, 0x4) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000140)=@can={{}, 0x0, 0x0, 0x0, 0x0, "5b7ba3698f28aaf0"}, 0x10}}, 0x0) [ 309.341628][T15272] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0xb, &(0x7f0000000340)={0x2}, 0x10) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x24, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x4, 0x1, 'syz0\x00'}]}, 0x24}}, 0x0) [ 309.471658][ T10] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.518641][ T10] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r0, 0xb15, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x27f3, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000300), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r5, r4, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r3, 0x184c, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x24}}, 0x0) [ 309.628886][ T10] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'gretap0\x00', 0x0}) executing program 4: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x1}, 0x5c) r1 = socket(0xa, 0x3, 0x3a) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x2000858, &(0x7f0000000500)=ANY=[], 0x5, 0x2d6, &(0x7f0000000200)="$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") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$MRT6_FLUSH(r1, 0x29, 0xd4, &(0x7f0000000240)=0x2, 0x4) [ 309.698708][ T10] netdevsim netdevsim1 ÿÿÿÿ (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x1}, 0x5c) r1 = socket(0xa, 0x3, 0x3a) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x2000858, &(0x7f0000000500)=ANY=[], 0x5, 0x2d6, &(0x7f0000000200)="$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") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$MRT6_FLUSH(r1, 0x29, 0xd4, &(0x7f0000000240)=0x2, 0x4) [ 309.789239][T15647] loop4: detected capacity change from 0 to 128 [ 309.827513][ T10] bridge_slave_1: left allmulticast mode [ 309.833286][ T10] bridge_slave_1: left promiscuous mode [ 309.839038][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.847090][ T10] bridge_slave_0: left allmulticast mode [ 309.852821][ T10] bridge_slave_0: left promiscuous mode [ 309.858672][ T10] bridge0: port 1(bridge_slave_0) entered disabled state executing program 0: mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, 0x80ffffff}, [@alu={0x7, 0x1}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r1, &(0x7f0000000c80)='./file0\x00', 0x0, &(0x7f0000000cc0)={0x0, 0x0, 0x80000}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r2) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r5, &(0x7f0000002dc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)="86", 0x1}], 0x1}}], 0x2, 0x2400005c) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff050003000000000005000300000000000500030080ffffff0800020003"], 0x50}}, 0x0) r6 = io_uring_setup(0x3dd3, &(0x7f0000001100)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000051ec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000006c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x3, "4ad80a766d1a7c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000002180)={0x2, [{}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "509f0658ac5d88"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000001180)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x31, "9a9cca4e7cd4e0"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, &(0x7f0000000000)={{r18, 0x4, 0x2, 0x1f, 0x3a, 0x2, 0x3, 0x124b, 0x5, 0x7797, 0x7, 0x1f, 0x0, 0x5, 0xb4}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x20) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) executing program 0: r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, &(0x7f0000000100)='4', 0x1}) io_uring_enter(r0, 0x7f5f, 0x0, 0x0, 0x0, 0x0) dup2(r0, r3) [ 309.958578][T15653] loop4: detected capacity change from 0 to 128 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000600)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@private0, 0x0, 0x2b}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@mcast2}]}, 0x104}}, 0x0) [ 310.137448][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 310.148034][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 310.159166][ T10] bond0 (unregistering): Released all slaves executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 310.279743][ T10] hsr_slave_0: left promiscuous mode [ 310.286156][ T10] hsr_slave_1: left promiscuous mode [ 310.291969][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 310.299545][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 310.307681][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 310.315172][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 310.325154][ T10] veth1_macvtap: left promiscuous mode [ 310.330658][ T10] veth0_macvtap: left promiscuous mode [ 310.336374][ T10] veth1_vlan: left promiscuous mode [ 310.341635][ T10] veth0_vlan: left promiscuous mode executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x44, r1, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x44}}, 0x0) executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xaf, "c8e88e99b06f0973962221885b336b8e48aaef197f4ee6d4a717e8af5e429214c0a8e5bcfe28d059fe7b2ac5856f4ffe2738c93d2b44e2910f761edd6ae091fc19ac0b9393c6df5263d8c3b4ce4b04d8f6667c6f2e805accb35e1819e0dd5cf7300d4bd7a3f2b245a4f21c14132fc6cf70dfc1fe1f462ae6ea6ec3021d55069fb198e933073f2fc76064d4e7aca11c2c2280cc8d35cab610b6bc8fdc951fb17100fa598d7a95e068562371cbada95c"}, &(0x7f0000000580)=0xb7) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = epoll_create1(0x0) socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)) [ 310.440923][ T10] team0 (unregistering): Port device team_slave_1 removed [ 310.454476][ T10] team0 (unregistering): Port device team_slave_0 removed executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x0, 0xfffffffffffffffe}}}, 0x90) [ 310.517438][T15625] chnl_net:caif_netlink_parms(): no params data found [ 310.548837][T15615] chnl_net:caif_netlink_parms(): no params data found executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f00000005c0), 0x10) recvmmsg(r0, &(0x7f0000003080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000000c0)=0x1, 0x4) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000580)=0x1, 0x4) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000140)=@can={{}, 0x0, 0x0, 0x0, 0x0, "5b7ba3698f28aaf0"}, 0x10}}, 0x0) [ 310.593903][T15610] chnl_net:caif_netlink_parms(): no params data found [ 310.634744][T15625] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.641939][T15625] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.649388][T15625] bridge_slave_0: entered allmulticast mode [ 310.656045][T15625] bridge_slave_0: entered promiscuous mode executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) [ 310.679446][T15625] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.686957][T15625] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.694631][T15625] bridge_slave_1: entered allmulticast mode [ 310.701341][T15625] bridge_slave_1: entered promiscuous mode [ 310.714305][T15615] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.721629][T15615] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.729518][T15615] bridge_slave_0: entered allmulticast mode executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'gretap0\x00', 0x0}) [ 310.736477][T15615] bridge_slave_0: entered promiscuous mode [ 310.743668][T15615] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.751108][T15615] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.760592][T15615] bridge_slave_1: entered allmulticast mode [ 310.767741][T15615] bridge_slave_1: entered promiscuous mode executing program 4: futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)) executing program 4: mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, 0x80ffffff}, [@alu={0x7, 0x1}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r1, &(0x7f0000000c80)='./file0\x00', 0x0, &(0x7f0000000cc0)={0x0, 0x0, 0x80000}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r2) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r5, &(0x7f0000002dc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)="86", 0x1}], 0x1}}], 0x2, 0x2400005c) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff050003000000000005000300000000000500030080ffffff0800020003"], 0x50}}, 0x0) r6 = io_uring_setup(0x3dd3, &(0x7f0000001100)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000051ec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000006c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x3, "4ad80a766d1a7c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000002180)={0x2, [{}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "509f0658ac5d88"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000001180)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x31, "9a9cca4e7cd4e0"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, &(0x7f0000000000)={{r18, 0x4, 0x2, 0x1f, 0x3a, 0x2, 0x3, 0x124b, 0x5, 0x7797, 0x7, 0x1f, 0x0, 0x5, 0xb4}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x20) open(&(0x7f0000000000)='./bus\x00', 0x16d43e, 0x0) [ 310.810887][T15625] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.821829][T15625] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.850671][T15615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=@newtaction={0x6c, 0x30, 0x1, 0x0, 0x0, {}, [{0x58, 0x1, [@m_mpls={0x54, 0x1, 0x0, 0x0, {{0x9}, {0x28, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_MPLS_PROTO={0x6}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x0) [ 310.893208][T15610] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.900422][T15610] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.921836][T15610] bridge_slave_0: entered allmulticast mode [ 310.945710][T15610] bridge_slave_0: entered promiscuous mode [ 310.963411][T15615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.974188][T15625] team0: Port device team_slave_0 added [ 311.009847][T15625] team0: Port device team_slave_1 added [ 311.031507][T15610] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.038737][T15610] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.045997][T15610] bridge_slave_1: entered allmulticast mode [ 311.052601][T15610] bridge_slave_1: entered promiscuous mode [ 311.079819][T15625] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.086859][T15625] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.113175][T15625] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.139083][T15610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.149140][T15615] team0: Port device team_slave_0 added [ 311.156090][T15615] team0: Port device team_slave_1 added [ 311.162258][T15625] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.169343][T15625] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.195340][T15625] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.212663][T15610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.249638][T15615] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.256692][T15615] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.282644][T15615] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.295319][T15615] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.302332][T15615] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.328683][T15615] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.356372][T15610] team0: Port device team_slave_0 added [ 311.364435][T15625] hsr_slave_0: entered promiscuous mode [ 311.370699][T15625] hsr_slave_1: entered promiscuous mode [ 311.376678][T15625] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 311.384338][T15625] Cannot create hsr debugfs directory [ 311.410256][T15610] team0: Port device team_slave_1 added [ 311.433620][T15615] hsr_slave_0: entered promiscuous mode [ 311.439807][T15615] hsr_slave_1: entered promiscuous mode [ 311.445782][T15615] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 311.453331][T15615] Cannot create hsr debugfs directory [ 311.468259][T15610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.475624][T15610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.501604][T15610] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.516873][T15610] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.523832][T15610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.549851][T15610] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.613537][ T10] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.630031][T15610] hsr_slave_0: entered promiscuous mode [ 311.636525][T15610] hsr_slave_1: entered promiscuous mode [ 311.642372][T15610] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 311.650025][T15610] Cannot create hsr debugfs directory [ 311.687349][ T10] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.716269][T15668] chnl_net:caif_netlink_parms(): no params data found [ 311.733120][T15625] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.748959][ T10] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.786202][T15625] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.811815][ T10] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.828265][T15668] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.835447][T15668] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.842948][T15668] bridge_slave_0: entered allmulticast mode [ 311.849517][T15668] bridge_slave_0: entered promiscuous mode [ 311.859320][T15625] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.870735][T15668] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.877990][T15668] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.885328][T15668] bridge_slave_1: entered allmulticast mode [ 311.891789][T15668] bridge_slave_1: entered promiscuous mode [ 311.910803][T15668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.922944][T15625] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.935771][T15668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.973714][T15668] team0: Port device team_slave_0 added [ 311.982735][T15668] team0: Port device team_slave_1 added [ 311.993513][ T10] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.020599][T15668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 312.027620][T15668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.053736][T15668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 312.067214][T15625] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 312.076086][T15625] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 312.085370][T15668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 312.092334][T15668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.118367][T15668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 312.131589][ T10] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.143384][T15625] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 312.152912][T15625] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 312.183063][T15668] hsr_slave_0: entered promiscuous mode [ 312.189532][T15668] hsr_slave_1: entered promiscuous mode [ 312.195615][T15668] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 312.203192][T15668] Cannot create hsr debugfs directory [ 312.217335][ T10] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.282084][ T10] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.296960][T15625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.308496][T15625] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.324908][T13686] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.332142][T13686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.346098][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.353176][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.405688][ T10] bridge_slave_1: left allmulticast mode [ 312.411446][ T10] bridge_slave_1: left promiscuous mode [ 312.417150][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.425367][ T10] bridge_slave_0: left allmulticast mode [ 312.431105][ T10] bridge_slave_0: left promiscuous mode [ 312.436829][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.445384][ T10] bridge_slave_1: left allmulticast mode [ 312.451065][ T10] bridge_slave_1: left promiscuous mode [ 312.456740][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.464543][ T10] bridge_slave_0: left allmulticast mode [ 312.470229][ T10] bridge_slave_0: left promiscuous mode [ 312.475917][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.484034][ T10] bridge_slave_1: left allmulticast mode [ 312.489726][ T10] bridge_slave_1: left promiscuous mode [ 312.495526][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.503797][ T10] bridge_slave_0: left allmulticast mode [ 312.509482][ T10] bridge_slave_0: left promiscuous mode [ 312.515204][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.857830][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 312.868092][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 312.878718][ T10] bond0 (unregistering): Released all slaves [ 312.888656][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 312.899242][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 312.909832][ T10] bond0 (unregistering): Released all slaves [ 312.919519][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 312.930285][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 312.940931][ T10] bond0 (unregistering): Released all slaves [ 312.978319][T15615] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 312.987995][T15615] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 312.997500][T15615] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 313.006561][T15615] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 313.028930][T15625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 313.067663][T15615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.080027][T15615] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.093049][T13682] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.100255][T13682] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.116365][T13682] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.123525][T13682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.151523][T15625] veth0_vlan: entered promiscuous mode [ 313.163596][T15625] veth1_vlan: entered promiscuous mode [ 313.183265][T15625] veth0_macvtap: entered promiscuous mode [ 313.198374][T15625] veth1_macvtap: entered promiscuous mode [ 313.206686][ T10] hsr_slave_0: left promiscuous mode [ 313.212322][ T10] hsr_slave_1: left promiscuous mode [ 313.218593][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.226155][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 313.233935][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.241397][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 313.251721][ T10] hsr_slave_0: left promiscuous mode [ 313.257607][ T10] hsr_slave_1: left promiscuous mode [ 313.263399][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.270870][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 313.278767][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.286325][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 313.296641][ T10] hsr_slave_0: left promiscuous mode [ 313.302499][ T10] hsr_slave_1: left promiscuous mode [ 313.308304][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.315834][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 313.323837][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.331488][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 313.344706][ T10] veth1_macvtap: left promiscuous mode [ 313.350236][ T10] veth0_macvtap: left promiscuous mode [ 313.355861][ T10] veth1_vlan: left promiscuous mode [ 313.361327][ T10] veth0_vlan: left promiscuous mode [ 313.367332][ T10] veth1_macvtap: left promiscuous mode [ 313.372823][ T10] veth0_macvtap: left promiscuous mode [ 313.378387][ T10] veth1_vlan: left promiscuous mode [ 313.383599][ T10] veth0_vlan: left promiscuous mode [ 313.389902][ T10] veth1_macvtap: left promiscuous mode [ 313.395412][ T10] veth0_macvtap: left promiscuous mode [ 313.400913][ T10] veth1_vlan: left promiscuous mode [ 313.406276][ T10] veth0_vlan: left promiscuous mode [ 313.602946][ T10] team0 (unregistering): Port device team_slave_1 removed [ 313.613563][ T10] team0 (unregistering): Port device team_slave_0 removed [ 313.682201][ T10] team0 (unregistering): Port device team_slave_1 removed [ 313.692569][ T10] team0 (unregistering): Port device team_slave_0 removed [ 313.763611][ T10] team0 (unregistering): Port device team_slave_1 removed [ 313.774824][ T10] team0 (unregistering): Port device team_slave_0 removed [ 313.833713][T15625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 313.844237][T15625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.855475][T15625] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.869634][T15610] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 313.878201][T15610] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 313.887040][T15610] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 313.899269][T15625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 313.909908][T15625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.920797][T15625] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 313.929826][T15625] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.938724][T15625] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.947590][T15625] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.956317][T15625] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.968159][T15610] netdevsim netdevsim3 netdevsim3: renamed from eth3 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0xb, &(0x7f0000000340)={0x2}, 0x10) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x24, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x4, 0x1, 'syz0\x00'}]}, 0x24}}, 0x0) [ 313.978962][T15615] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 2: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x1}, 0x5c) r1 = socket(0xa, 0x3, 0x3a) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x2000858, &(0x7f0000000500)=ANY=[], 0x5, 0x2d6, &(0x7f0000000200)="$eJzs3E1PE2sUwPHTUkopgXZxc2/uTW44uXejmwnUvbExkBibSJAaXxLjAFNtOrak02BqjOjKrfFDuCAs2ZEoX4CNO1du3LExcSEL45jOCxQogoVSXv6/hMyB85zyPFMg55kws3779eNSwTEKZk2iCZWIiMiGSFqiEooEx6gXx6XZC7k48PXjvzfv3L2ezeXGJlXHs1OXMqo6NPzuybP+YNhKn6yl769/yXxe+3Pt7/UfU4+KjhYdLVdqaup05VPNnLYtnS06JUN1wrZMx9Ji2bGqfr7i5wt2ZW6urmZ5djA5V7UcR81yXUtWXWsVrVXraj40i2U1DEMHk4L95BcnJ81sm8UzRzwZdEi1mjV7RKR/Vya/2JUJAQCArtrZ/0cbLX07/X+sZf+/9N9qbeDW8lDQ/6/EG/2/SFP//2Drtbb1/wkR6Xj/v7sjOltc99f5Q/X/OCUa/X8y+P31vLy3NOIF9P8AAAAAAAAAAAAAAAAAAAAAAJwGG66bcl03FR7Djz4RSXh3kPifd3ue6Aze//Nt68EdsSER+9V8fj7vH4MBqyJiiyUjkpLv3s9DoBGH9wJqQ1re2wtB/cJ8vsfLZAtS9OpHJSXpnfWuO34tNzaqvu31vZJsrs9ISv5oXZ9pWR+XC/831RuSkg8zUhFbZoM748L656OqV2/kdtT3e+MAAAAAADgLDN20uX/va84bu/P+/tjPb+6vW14f8PfXIy335zH5J9atVQMAAAAAcL449acl07at6pkLwhUetCr8X4Y9xkQkslfqCILwm5+MU3eAINrWVIfjv/mmtAzCy0Z7jZGJdl7ZTYkc9rT89ebtt6M7z5eXE/ustGNB7/H9BQIAAABwXLaa/vArV7o7IQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzqHjeJxYt9cIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBQ/AwAA//8Kygul") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$MRT6_FLUSH(r1, 0x29, 0xd4, &(0x7f0000000240)=0x2, 0x4) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000600)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@private0, 0x0, 0x2b}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@mcast2}]}, 0x104}}, 0x0) [ 314.070402][T15610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.079994][T15730] loop2: detected capacity change from 0 to 128 [ 314.084661][T15610] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.105316][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.112435][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.135173][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.142269][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state executing program 2: r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, &(0x7f0000000100)='4', 0x1}) io_uring_enter(r0, 0x7f5f, 0x0, 0x0, 0x0, 0x0) dup2(r0, r3) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)='PO', 0x2}], 0x1}}], 0x1, 0x4008801) recvmmsg$unix(r2, &(0x7f0000004cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12002, 0x0) [ 314.176408][T15615] veth0_vlan: entered promiscuous mode [ 314.190638][T15615] veth1_vlan: entered promiscuous mode [ 314.200358][T15610] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.210905][T15610] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.257498][T15615] veth0_macvtap: entered promiscuous mode [ 314.270435][T15668] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 314.281698][T15615] veth1_macvtap: entered promiscuous mode [ 314.295043][T15668] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 314.304457][T15668] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 314.313460][T15668] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 314.329688][T15615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 314.340199][T15615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 314.350126][T15615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 314.360580][T15615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 314.371745][T15615] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 314.380728][T15615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 314.391285][T15615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 314.401275][T15615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 314.411765][T15615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 314.423086][T15615] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 314.443733][T15615] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.452765][T15615] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.461702][T15615] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.470624][T15615] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.487963][T15610] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002680)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x50}}, 0x0) executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4b5, &(0x7f0000000080), &(0x7f0000ff0000), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000100)=""/77, 0x4d}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) [ 314.544393][T15668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.573353][T15668] 8021q: adding VLAN 0 to HW filter on device team0 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) r1 = open(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="b164d355dedcf3b4534b2a1f8f9bf0f590d5ed05634b254973c12202b9f66e53fdc912be6a9b31adb279eda8760aafb338a228bf64dfe4385f1e30786506b3377286c2926f901dcb3ba49efd4ccf1f21e70d9427a1504b94", 0x58}], 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x9, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x0, 0x800) syz_io_uring_setup(0x58f2, &(0x7f0000000140)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) syz_io_uring_setup(0x62df, &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000000)) r4 = fsmount(r1, 0x0, 0x8c) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000400)={{r0}, 0x0, 0x16, @unused=[0xb7, 0x9, 0x401, 0x8], @subvolid=0x380000000000}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000004"], 0x6c}}, 0x0) [ 314.605108][T13679] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.612345][T13679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.655429][T15668] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.665960][T15668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.678762][T13679] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.686000][T13679] bridge0: port 2(bridge_slave_1) entered forwarding state executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1bb681f193ffd6d7) r1 = socket(0x10, 0x803, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000440), 0x4, 0x10100) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6f21f808cad58526f39eeee220"}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044005) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x20}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380), 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xc}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, &(0x7f0000000040)="468bd68196be3d927ca867432303df5c577901305056bdd2117ac86dc06c8cdc97daeac14f96bd326574ec2246247c7b18934da642532a972fe12a2cf5bdd043a2de40feeb8f44735ee30c06324d975c941963591dce0701715b5b45d0a4dc77b18b868dde8d0d9a4e10dacec8615c489a7161951ac25b60cd8f1adbbb477e34fc29ed83bbfb97e65c898cd03cba406d5492f6739ca0d260c64055e2ea3f82eb26dc80", 0xa3, 0x90, &(0x7f0000000200)={0xa, 0x4e24, 0xffffffff, @empty, 0x5}, 0x1c) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000001bc0)={'batadv_slave_1\x00', 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000300)={@remote, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000a00)={'ip6tnl0\x00', &(0x7f0000000980)={'syztnl2\x00', r10, 0x29, 0xd2, 0x6f, 0x101, 0x3, @local, @local, 0x10, 0x8000, 0x7, 0x8}}) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000900)={{}, {0x3}, 0x3, 0x0, 0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="4dc263c30c971af9fbfa96faf5ef4f1aa33d51137037556812166fdfd64888afd07e78a58ca7e24848b19ba2c8a883f508c423c928a422b008d3b0c32738d71ee1e6a1ecf12de1a5f1178b316d2b0bc8194e86c1e8269f590ae3cac3a6c2be47588e9d54222a9b71b575d954d6b9", 0x6e, 0x0, &(0x7f0000000680)={0x2, 0x1df, {0x0, 0xc, 0xe3, "1391977b748b997daaa8772cd927e6da968434ca05d78c813243b6e2a3f58f5a64497579905b091b7234d6d555e778114c5e3ee99826d7cbf026d957bd879b024b7740fefcf1115118ab2902a33e41971e1c2a1a64054038d9954d4a8fd27a681355c8ead606cec0e5bdf7056ef389eb05f5b311cdebd8c614500b1b859b3dc70c991d35610e8ebb24b7c97e71a87a38c1665b4262ff2ab119bee4cbba91fa8f20d56bc986cb490497b2131987f296335b3b9c592ff3319c6b70b808cfe1da133a712228fbac3f0ed97beae801b33a0695d866d4ee2c35739ab2813d44d8690b41ba5c", 0xef, "e7e049549b3a6bafd9faca78b6ad03df926780e74a41e89f703c41821624f4c1d0c6d76279cac7a909ebe5cd6aca53532cbcad738b37356533f9a47a2f6713cbba558020464d42aca128ab3d775c9c6d7748ac6b97ae598c5cf4af58271f9a3830194b3823d9c230395b90e2a7011fd0aae9d9a39fd94bfd90c04e458838f0c3767a45d95bd4762117d7d63ea43d18629a5ed0fd37569ec24fcc35a1a837fa9117816c90627a3dc7345a537201d3eb621a233d23d9490118b44843697f3075af395b8c4662f98ca1d6fdf612185e7405891a6e49dc0f8afa15e73b503abb85baf43bac6e3f5af082e6fc0db0bfcf8a"}, 0x6b, "7ee32c9521c3250cfc651fe53aedadd7fbfd12f7ff44a008e500253bb5575ae9ddd0986f3f77bdc34a3120e0c9c473be68b009961ac06044fce324ca5fd58f63986e5a58818fea723290087e729e041753f584926c1dd6512527851f217e9efd27808be95f9bc86d894e4a"}, 0x256}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000bc0), 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ffff000000000000000000000000000114000600000000000600000000000000000000000800080000040000bf1a57822ae5ba2ba8815368ddef4208fad372b2441021cd87d76a7313db0c99e8a59e2780000000000000003dca5e30d7a6c2007f00cf3d9be52da868c2d8f73fbc9883935a31c277e7570f0909fc317d1d413f0600c0fd3502d73100"/150], 0x48}, 0x1, 0x0, 0x0, 0x400c1}, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000003c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x1d, r7}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, 0x4}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000894}, 0xc000) r12 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 314.717507][T15756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 314.731915][T15610] veth0_vlan: entered promiscuous mode [ 314.753710][T15610] veth1_vlan: entered promiscuous mode executing program 4: r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, &(0x7f0000000100)='4', 0x1}) io_uring_enter(r0, 0x7f5f, 0x0, 0x0, 0x0, 0x0) dup2(r0, r3) [ 314.790927][T15610] veth0_macvtap: entered promiscuous mode [ 314.807160][T15610] veth1_macvtap: entered promiscuous mode [ 314.829084][T15668] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'gretap0\x00', 0x0}) [ 314.947401][T15610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 314.958018][T15610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 314.967961][T15610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 314.978470][T15610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 314.988412][T15610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 314.998867][T15610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.014374][T15610] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.023499][T15610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 315.033994][T15610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.043931][T15610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 315.054471][T15610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.064454][T15610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 315.074936][T15610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.090206][T15610] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xaf, "c8e88e99b06f0973962221885b336b8e48aaef197f4ee6d4a717e8af5e429214c0a8e5bcfe28d059fe7b2ac5856f4ffe2738c93d2b44e2910f761edd6ae091fc19ac0b9393c6df5263d8c3b4ce4b04d8f6667c6f2e805accb35e1819e0dd5cf7300d4bd7a3f2b245a4f21c14132fc6cf70dfc1fe1f462ae6ea6ec3021d55069fb198e933073f2fc76064d4e7aca11c2c2280cc8d35cab610b6bc8fdc951fb17100fa598d7a95e068562371cbada95c"}, &(0x7f0000000580)=0xb7) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = epoll_create1(0x0) socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)) [ 315.101783][T15610] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.110839][T15610] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.119635][T15610] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.128387][T15610] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000002d0000b7000000000000005600000000dd000095"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x160, 0x4c, 0x2500, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) executing program 3: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') mount$tmpfs(0x20100000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x1) executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_pressure(r0, &(0x7f00000001c0)={'some'}, 0x4cdad095) io_setup(0x6, &(0x7f0000001400)=0x0) io_submit(r1, 0x1, &(0x7f0000001900)=[&(0x7f00000014c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, 0x0}]) unlink(&(0x7f0000000300)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) executing program 2: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x2800000, &(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRESDEC], 0x0, 0x28d, &(0x7f0000000140)="$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") [ 315.351490][T15790] xt_CT: No such helper "syz0" [ 315.370075][T15668] veth0_vlan: entered promiscuous mode [ 315.397338][T15668] veth1_vlan: entered promiscuous mode [ 315.412358][T15796] loop2: detected capacity change from 0 to 256 [ 315.461429][T15796] FAT-fs (loop2): bogus sectors per cluster 7 [ 315.467718][T15796] FAT-fs (loop2): Can't find a valid FAT filesystem [ 315.472306][T15668] veth0_macvtap: entered promiscuous mode [ 315.488194][T15668] veth1_macvtap: entered promiscuous mode [ 315.509897][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 315.520466][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.530445][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 315.540899][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.550867][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x6, {{0x2, 0x0, @multicast1}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)=""/4091, &(0x7f0000001000)=0xffb) [ 315.561323][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.571331][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 315.581833][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.598648][T15668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.607957][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 315.618780][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.628685][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 315.639149][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.649112][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00]']) [ 315.659593][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.669440][T15668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 315.679885][T15668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.691322][T15668] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF2(r1, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a59f47e69eb7658650b809de0ddbc25a2caa4c"}) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x0, "1ac9a7ef920d07daa40af7727d8d5aa0755a94"}) [ 315.737214][ T10] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.755094][T15668] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.764224][T15668] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.773118][T15668] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program 2: futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)) [ 315.778018][T15803] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 315.782011][T15668] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xc, [@var={0xa, 0x0, 0x0, 0x11, 0x4, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2}, @func_proto={0x2, 0x0, 0x0, 0x6, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x5c}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0xe, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xc, [@var={0xa, 0x0, 0x0, 0x11, 0x4, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2}, @func_proto={0x2, 0x0, 0x0, 0x6, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x5c}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0xe, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) [ 315.878039][ T10] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000480), 0x4) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/55, 0x35}, {&(0x7f0000000380)=""/229}], 0x1, &(0x7f0000000200)=""/153, 0xc}}], 0x1, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000000)={&(0x7f0000000c00)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1}, 0x0) executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xaf, "c8e88e99b06f0973962221885b336b8e48aaef197f4ee6d4a717e8af5e429214c0a8e5bcfe28d059fe7b2ac5856f4ffe2738c93d2b44e2910f761edd6ae091fc19ac0b9393c6df5263d8c3b4ce4b04d8f6667c6f2e805accb35e1819e0dd5cf7300d4bd7a3f2b245a4f21c14132fc6cf70dfc1fe1f462ae6ea6ec3021d55069fb198e933073f2fc76064d4e7aca11c2c2280cc8d35cab610b6bc8fdc951fb17100fa598d7a95e068562371cbada95c"}, &(0x7f0000000580)=0xb7) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = epoll_create1(0x0) socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)) [ 315.928731][ T10] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.943065][T15767] chnl_net:caif_netlink_parms(): no params data found executing program 2: r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, &(0x7f0000000100)='4', 0x1}) io_uring_enter(r0, 0x7f5f, 0x0, 0x0, 0x0, 0x0) dup2(r0, r3) executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) io_uring_setup(0x7d5, &(0x7f0000000500)) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)) executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) read(r2, &(0x7f0000000140)=""/173, 0xec0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x10034) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002680)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x50}}, 0x0) [ 316.032291][ T10] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000000)="b9ff060000000000000014f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 3: mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) sendmsg$can_bcm(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="0500000003"], 0x48}}, 0x0) executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xaf, "c8e88e99b06f0973962221885b336b8e48aaef197f4ee6d4a717e8af5e429214c0a8e5bcfe28d059fe7b2ac5856f4ffe2738c93d2b44e2910f761edd6ae091fc19ac0b9393c6df5263d8c3b4ce4b04d8f6667c6f2e805accb35e1819e0dd5cf7300d4bd7a3f2b245a4f21c14132fc6cf70dfc1fe1f462ae6ea6ec3021d55069fb198e933073f2fc76064d4e7aca11c2c2280cc8d35cab610b6bc8fdc951fb17100fa598d7a95e068562371cbada95c"}, &(0x7f0000000580)=0xb7) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = epoll_create1(0x0) socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)) executing program 2: timerfd_settime(0xffffffffffffffff, 0x4, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) [ 316.121373][T15767] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.128833][T15767] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.149156][T15767] bridge_slave_0: entered allmulticast mode [ 316.160697][T15767] bridge_slave_0: entered promiscuous mode executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF2(r1, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a59f47e69eb7658650b809de0ddbc25a2caa4c"}) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x0, "1ac9a7ef920d07daa40af7727d8d5aa0755a94"}) executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, r0, 0x0) [ 316.187860][T15767] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.195115][T15767] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.225219][T15767] bridge_slave_1: entered allmulticast mode executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF2(r1, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a59f47e69eb7658650b809de0ddbc25a2caa4c"}) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x0, "1ac9a7ef920d07daa40af7727d8d5aa0755a94"}) executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xc, [@var={0xa, 0x0, 0x0, 0x11, 0x4, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2}, @func_proto={0x2, 0x0, 0x0, 0x6, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x5c}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0xe, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) [ 316.233881][T15767] bridge_slave_1: entered promiscuous mode executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_pressure(r0, &(0x7f00000001c0)={'some'}, 0x4cdad095) io_setup(0x6, &(0x7f0000001400)=0x0) io_submit(r1, 0x1, &(0x7f0000001900)=[&(0x7f00000014c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, 0x0}]) unlink(&(0x7f0000000300)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) [ 316.280340][T15767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.309346][ T10] bridge_slave_1: left allmulticast mode [ 316.315072][ T10] bridge_slave_1: left promiscuous mode [ 316.320741][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.330463][ T10] bridge_slave_0: left allmulticast mode [ 316.336280][ T10] bridge_slave_0: left promiscuous mode [ 316.342008][ T10] bridge0: port 1(bridge_slave_0) entered disabled state executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000480), 0x4) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/55, 0x35}, {&(0x7f0000000380)=""/229}], 0x1, &(0x7f0000000200)=""/153, 0xc}}], 0x1, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000000)={&(0x7f0000000c00)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1}, 0x0) executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) io_uring_setup(0x7d5, &(0x7f0000000500)) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="7f450700000053c407cd"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)) executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x0, 0x0}) [ 316.469991][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 316.497308][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.526969][ T10] bond0 (unregistering): Released all slaves [ 316.542758][T15767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4b5, &(0x7f0000000080), &(0x7f0000ff0000), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000100)=""/77, 0x4d}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000002d0000b7000000000000005600000000dd000095"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) [ 316.585843][T15767] team0: Port device team_slave_0 added [ 316.599075][T15767] team0: Port device team_slave_1 added executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x8d}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) [ 316.658129][ T10] hsr_slave_0: left promiscuous mode [ 316.676906][ T10] hsr_slave_1: left promiscuous mode [ 316.687415][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 316.695042][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) read(r2, &(0x7f0000000140)=""/173, 0xec0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x10034) executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) fcntl$addseals(r0, 0x409, 0x9) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x65bef000) executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, r0, 0x0) [ 316.714034][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 316.721682][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 316.733114][ T10] veth1_macvtap: left promiscuous mode [ 316.738710][ T10] veth0_macvtap: left promiscuous mode [ 316.744362][ T10] veth1_vlan: left promiscuous mode [ 316.749649][ T10] veth0_vlan: left promiscuous mode executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000250000002300000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000840), 0x1000a) executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000180)={0x0, 0x0, 0x800, 0x0, 0x1}, 0x20) executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000480), 0x4) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/55, 0x35}, {&(0x7f0000000380)=""/229}], 0x1, &(0x7f0000000200)=""/153, 0xc}}], 0x1, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000000)={&(0x7f0000000c00)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1}, 0x0) executing program 1: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) [ 316.927640][ T10] team0 (unregistering): Port device team_slave_1 removed [ 316.945505][ T10] team0 (unregistering): Port device team_slave_0 removed executing program 0: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) [ 317.000959][T15767] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.007981][T15767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.033952][T15767] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active executing program 2: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) [ 317.049496][T15767] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.056522][T15767] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.082763][T15767] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)='PO', 0x2}], 0x1}}], 0x1, 0x4008801) recvmmsg$unix(r2, &(0x7f0000004cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12002, 0x0) [ 317.114770][T15767] hsr_slave_0: entered promiscuous mode [ 317.128762][T15767] hsr_slave_1: entered promiscuous mode [ 317.155042][T15767] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 317.164093][T15767] Cannot create hsr debugfs directory [ 317.456767][T15767] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 317.477310][T15767] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 317.492561][T15767] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 317.513320][T15767] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 317.565052][T15767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.584900][T15767] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.597581][ T3176] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.604687][ T3176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.628607][ T3176] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.636517][ T3176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.656778][T15767] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.722286][T15767] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 1: mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) sendmsg$can_bcm(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="0500000003"], 0x48}}, 0x0) executing program 1: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x8d}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000500000014"], 0x28}}, 0x0) [ 317.875279][T15767] veth0_vlan: entered promiscuous mode [ 317.884662][T15767] veth1_vlan: entered promiscuous mode [ 317.910199][T15767] veth0_macvtap: entered promiscuous mode [ 317.918456][T15767] veth1_macvtap: entered promiscuous mode [ 317.939854][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 317.950434][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.960455][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 317.971178][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000250000002300000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000840), 0x1000a) [ 317.981109][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 317.991614][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.001553][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 318.012048][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.031815][T15767] batman_adv: batadv0: Interface activated: batadv_slave_0 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20}, {0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="4003d4f6", 0x4}], 0x1}}], 0x1, 0x0) [ 318.043710][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 318.054272][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.064166][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 318.074650][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) read(r2, &(0x7f0000000140)=""/173, 0xec0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x10034) executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) [ 318.084535][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 318.095052][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.104940][T15767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 318.115431][T15767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000011c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000001200)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="8d", 0xfdef}, {0x0}], 0x2) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r3}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000180)='O', 0x1}], 0x1}}], 0x1, 0x0) executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xc, [@var={0xa, 0x0, 0x0, 0x11, 0x4, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2}, @func_proto={0x2, 0x0, 0x0, 0x6, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x5c}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0xe, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) [ 318.143851][T15767] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 318.153032][T15767] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.161871][T15767] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.170785][T15767] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.179585][T15767] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) prctl$PR_SET_VMA(0x21, 0x0, &(0x7f000098b000/0x2000)=nil, 0x2000, 0x0) [ 318.268911][ T28] audit: type=1326 audit(1714783473.672:2387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2984b9eca9 code=0x7ffc0000 [ 318.293345][ T28] audit: type=1326 audit(1714783473.672:2388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2984b9eca9 code=0x7ffc0000 [ 318.345562][ T28] audit: type=1326 audit(1714783473.722:2389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2984b9eca9 code=0x7ffc0000 [ 318.370092][ T28] audit: type=1326 audit(1714783473.722:2390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2984b9eca9 code=0x7ffc0000 [ 318.394532][ T28] audit: type=1326 audit(1714783473.722:2391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2984b9eca9 code=0x7ffc0000 [ 318.418726][ T28] audit: type=1326 audit(1714783473.722:2392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2984b9eca9 code=0x7ffc0000 [ 318.442834][ T28] audit: type=1326 audit(1714783473.722:2393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2984b9c427 code=0x7ffc0000 [ 318.466934][ T28] audit: type=1326 audit(1714783473.722:2394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2984b620f9 code=0x7ffc0000 executing program 0: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) chdir(&(0x7f0000000600)='./file0\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvmmsg(r1, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/33, 0x21}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000000)=0x8a8, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRES8=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)="9989f66cad7f1373040076d77a62a870bb018b6c95", 0x15}}, 0x0) perf_event_open(&(0x7f00000014c0)={0x2, 0x80, 0x1b, 0xef, 0x0, 0x5, 0x0, 0x0, 0x21a04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x0, 0x2, 0x0, 0x5, 0x2, 0x80, 0x0, 0x0, 0x4000}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup=r4, 0xffffffffffffffff, 0x2f, 0x0, 0x4, @prog_fd}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @multicast2}, '\x00\x00\x00\x00\x00\x00 \x00'}}}}}, 0x0) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000702060800000000000014008500000075000000a70000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) executing program 4: r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, &(0x7f0000000100)='4', 0x1}) io_uring_enter(r0, 0x7f5f, 0x0, 0x0, 0x0, 0x0) dup2(r0, r3) executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x5d031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100), 0xfffffd9d) sendfile(r0, r1, 0x0, 0x8000002b) [ 318.490902][ T28] audit: type=1326 audit(1714783473.722:2395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2984b9c427 code=0x7ffc0000 [ 318.514985][ T28] audit: type=1326 audit(1714783473.722:2396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2984b620f9 code=0x7ffc0000 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000500000014"], 0x28}}, 0x0) executing program 3: open$dir(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x400000}}, 0xb8}}, 0x4000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0xee01}}}, 0xb8}}, 0x0) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20}, {0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="4003d4f6", 0x4}], 0x1}}], 0x1, 0x0) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000250000002300000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000840), 0x1000a) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r3}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000180)='O', 0x1}], 0x1}}], 0x1, 0x0) executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) read(r2, &(0x7f0000000140)=""/173, 0xec0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x10034) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={0x0, 0x0}, 0x20) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="7000000000010104000000000000000002000000240001"], 0x70}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@generic={0x3, 0x2}, @mptcp=@ack={0x1e, 0x4}]}}}}}}}}, 0x0) executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x5d031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000011c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000001200)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="8d", 0xfdef}, {0x0}], 0x2) executing program 4: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000702060800000000000014008500000075000000a70000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000f00008095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0xa4, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x74, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4], [0x0, 0x8]}}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x4000000}]}]}]}}]}, 0xa4}}, 0x0) executing program 0: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) [ 318.747876][T15979] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r3}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000180)='O', 0x1}], 0x1}}], 0x1, 0x0) executing program 1: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) chdir(&(0x7f0000000600)='./file0\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvmmsg(r1, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/33, 0x21}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000000)=0x8a8, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRES8=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)="9989f66cad7f1373040076d77a62a870bb018b6c95", 0x15}}, 0x0) perf_event_open(&(0x7f00000014c0)={0x2, 0x80, 0x1b, 0xef, 0x0, 0x5, 0x0, 0x0, 0x21a04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x0, 0x2, 0x0, 0x5, 0x2, 0x80, 0x0, 0x0, 0x4000}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup=r4, 0xffffffffffffffff, 0x2f, 0x0, 0x4, @prog_fd}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @multicast2}, '\x00\x00\x00\x00\x00\x00 \x00'}}}}}, 0x0) executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, r0, 0x0) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r3}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000180)='O', 0x1}], 0x1}}], 0x1, 0x0) executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0xf3a, 0x0) tee(r3, r0, 0x80000001, 0x2) vmsplice(r4, &(0x7f0000000380)=[{&(0x7f0000013580)='\r', 0x1}], 0x1, 0x0) write(r1, 0x0, 0x0) executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0xf3a, 0x0) tee(r3, r0, 0x80000001, 0x2) vmsplice(r4, &(0x7f0000000380)=[{&(0x7f0000013580)='\r', 0x1}], 0x1, 0x0) write(r1, 0x0, 0x0) executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x8}, 0x20) executing program 3: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xa, &(0x7f0000000500)={0x0, 0x18, "3f5a78252310798a61405205e7db9df37ddde591d3e8f4a1"}, &(0x7f0000000140)=0x20) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x3, 0x4) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$unix(r3, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x3, 0x4) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$unix(r3, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x5120b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}]}, 0x3c}}, 0x0) sendmmsg$inet(r1, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56561}, 0x24}}, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000098c0), 0x0, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000003c0)={0x0, 0x0, 0xffffffc0, 0x0, 0x0, "83843c556dec3a9a90800124b904cfc27929a3", 0x0, 0x87}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000180)='.\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00'}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) r5 = syz_pidfd_open(0x0, 0x0) r6 = pidfd_getfd(r5, r5, 0x0) setns(r6, 0x66020000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x2, 0x83ff, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0x4045b725}}, './file0/file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4000005, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r8, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r10, 0x29, 0x8, &(0x7f0000000080), 0x4) executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) [ 319.384964][T16031] loop4: detected capacity change from 0 to 512 [ 319.393994][T16031] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xaf, "c8e88e99b06f0973962221885b336b8e48aaef197f4ee6d4a717e8af5e429214c0a8e5bcfe28d059fe7b2ac5856f4ffe2738c93d2b44e2910f761edd6ae091fc19ac0b9393c6df5263d8c3b4ce4b04d8f6667c6f2e805accb35e1819e0dd5cf7300d4bd7a3f2b245a4f21c14132fc6cf70dfc1fe1f462ae6ea6ec3021d55069fb198e933073f2fc76064d4e7aca11c2c2280cc8d35cab610b6bc8fdc951fb17100fa598d7a95e068562371cbada95c"}, &(0x7f0000000580)=0xb7) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = epoll_create1(0x0) socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)) [ 319.428546][T16031] EXT4-fs error (device loop4): ext4_get_journal_inode:5775: comm syz-executor.4: inode #67108864: comm syz-executor.4: iget: illegal inode # [ 319.451927][T16031] EXT4-fs (loop4): no journal found [ 319.457368][T16031] EXT4-fs (loop4): can't get journal size [ 319.478068][T16031] EXT4-fs (loop4): failed to initialize system zone (-22) [ 319.485919][T16031] EXT4-fs (loop4): mount failed [ 319.518118][T16036] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 319.527543][T16036] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 319.604293][T16039] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 319.613725][T16039] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56561}, 0x24}}, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000098c0), 0x0, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000003c0)={0x0, 0x0, 0xffffffc0, 0x0, 0x0, "83843c556dec3a9a90800124b904cfc27929a3", 0x0, 0x87}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000180)='.\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00'}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) r5 = syz_pidfd_open(0x0, 0x0) r6 = pidfd_getfd(r5, r5, 0x0) setns(r6, 0x66020000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x2, 0x83ff, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0x4045b725}}, './file0/file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4000005, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r8, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r10, 0x29, 0x8, &(0x7f0000000080), 0x4) [ 319.685695][T16041] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 319.695075][T16041] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = socket(0x840000000002, 0x3, 0xff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) sendmmsg$inet(r0, &(0x7f0000001c40)=[{{&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000600)="a90900000000746400006277000000003552bde5", 0x14}], 0x1}}], 0x1, 0x0) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="7a0af8ff75253073bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000b2595285faa6ead0169191d54f81d9217fc560e2fc91f6da4dad4fdc2eb1b5986fc4a3f611a7c8edd3aa5d6ee7ab10b1a297cf52866651ddd73f30f2382f6cda4bfdd45be583823c0f09621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000098045f785a1292fcb8c1d3079a00db453620ce72d75946c2b638d91dbef661935839c77edf2d34b12cd48a1b20fb7dd8430a19f2c50d77bc0ea9b0af58e604f4942eb613eff28902010045ef76d7d864409ef2dc9518a09f4886afc26abba34635d0e8b598a51bc7421d33fe226c944bc76be40d435aa8b5208ff0df2db7619a12df6bee431a668135b8214afa5827b56a8074bf1e6cf5d84b35a3a3a4c66824fe12dbe20fcf50a194185b9e2d8b815fedb0d982936156be34dda66fb977aef7c9cb92428ef25d9bf665bd60020500000000000000abe4cb8d826e1ec03cc492f5cad6227c94fea467aea7fa8b58abc37056433edf43fba5566a3e02200b95941d34ac81fd48f9b7314ffa730017f3d37fdb23bc26992529402a520ef67e246415a697a95ca3314ded0d8a24abd57e042888a9141ab4e6c6b939aaefc248791464970c43120211b9bc82a85cd2fc18f535c7986c2d52ba62f74f000000000080c4adf75a0a108585e9b2000000000000000000000074054d643c2b5692d8304a23eaf9153c457ae5bbe49b3c164461470a452bd357fa62341c759dc21b45a06ec414cadf9695d030012acad582e3fe75e61ae908347e4d6d089b"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r3}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000180)='O', 0x1}], 0x1}}], 0x1, 0x0) executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xa, &(0x7f0000000500)={0x0, 0x18, "3f5a78252310798a61405205e7db9df37ddde591d3e8f4a1"}, &(0x7f0000000140)=0x20) executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x8}, 0x20) executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x7) listen(r1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x3) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={0x0, 0x0}, 0x20) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="7000000000010104000000000000000002000000240001"], 0x70}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@generic={0x3, 0x2}, @mptcp=@ack={0x1e, 0x4}]}}}}}}}}, 0x0) executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0xf3a, 0x0) tee(r3, r0, 0x80000001, 0x2) vmsplice(r4, &(0x7f0000000380)=[{&(0x7f0000013580)='\r', 0x1}], 0x1, 0x0) write(r1, 0x0, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56561}, 0x24}}, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000098c0), 0x0, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000003c0)={0x0, 0x0, 0xffffffc0, 0x0, 0x0, "83843c556dec3a9a90800124b904cfc27929a3", 0x0, 0x87}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000180)='.\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00'}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) r5 = syz_pidfd_open(0x0, 0x0) r6 = pidfd_getfd(r5, r5, 0x0) setns(r6, 0x66020000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x2, 0x83ff, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0x4045b725}}, './file0/file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4000005, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r8, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r10, 0x29, 0x8, &(0x7f0000000080), 0x4) executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) [ 319.901830][T16061] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 319.954838][T16068] loop4: detected capacity change from 0 to 512 [ 319.975586][T16068] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0x6}]}, &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$eJzs3EtsG0UfAPD/rp2kzy/5Snm0tBAoiIpH0qQPeuACAokDSEhwKOIUkrQqdRvUBIlWFRQO5YgqcUcckbgjcYILAk5IXOGOKlWolxZORmvvto5r52UnTvHvJ2074x1r5u/Zsccz6wTQt0azf5KIHRHxe0QM17OLC4zW/7t149L03zcuTSdRrb75V1Ird/PGpemiaPG87fVMtRoxlCWHWtR75Z2IqUpl9nyeH184+/74/IWLz50+O3Vq9tTsucnjx48c3j94bPJopyGWI4/r5t6P5vbtefXtq69Pn7j67s/fZO3dkRdqjGNNsmibjNZf3Zae7KiyzWdnQzopty83thGNYcVK+QAZqI3/4SjF1tvnhuOVT3vaOGBdVavVaqvP59zlKvAflkSvWwD0RvFBn33/LY4NmnpsCtdfrH8ByuK+lR/1M+VI8zIDTd9vu2k0Ik5c/ufL7IhurEMAACzj+2z+82yr+V8aDzSU+1++hzISEf+PiF0RcV9E7I6I+yNqZR+MiIdWWX/zDsnd85/02poCW6Fs/vdCvre1eP5XzP5ipJTndtbiH0hOnq7MHspfk4MxMJTlJ5ao44eXf/u8SG9pOtc4/8uOrP5iLpi341q5aYFuZmphqtO4C9c/idhbbhV/EsU2ThIReyJi7xrrOP301/vanVs+/iUssc+0UtWvIp6q9//lWBT/na5K2u5PTjx/bPLo+JaozB4aL66Ku/3y65U32tXfUfxdkPX/tpbX/+1d4JFkS8T8hYtnavu186uv48ofnzWM6UW7y1n86bcRq77+B5O3aunB/LEPpxYWzk9EDCav3f345J3nFvmifBb/wQOtx/+uhhY/HBHZRbw/Ih6JiEfzvnssIh6PiANLxP/TS0+81+5c+/5fYlW+i7L4Z5br/2js/9UnSmd+/G718Rey/j9SSx3MH1nJ+99KG9jJawcAAAD3irR2D3ySjt1Op+nYWP0e/t2xLa3MzS88c3Lug3Mz9XvlR2IgLVa6hhvWQyfyteEiP9mUP5yvG39R2lrLj03PVWZ6HTz0ue1txn/mz1KvWwesuy7sowH3KOMf+pfxD/3L+If+ZfxD/2o1/j/uQTuAjefzH/qX8Q/9y/iH/mX8Q19q+9v4tKOf/Pc4UfzthM3Snh4ltq5nFZH2PsC+SJTX+zIeanmqx29MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXfJvAAAA///S5eHe") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) [ 319.994090][T16068] EXT4-fs error (device loop4): ext4_get_journal_inode:5775: comm syz-executor.4: inode #67108864: comm syz-executor.4: iget: illegal inode # [ 320.011554][T16068] EXT4-fs (loop4): no journal found [ 320.017043][T16068] EXT4-fs (loop4): can't get journal size [ 320.027689][T16068] EXT4-fs (loop4): failed to initialize system zone (-22) [ 320.040354][T16068] EXT4-fs (loop4): mount failed executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$eJzs3EtsG0UfAPD/rp2kzy/5Snm0tBAoiIpH0qQPeuACAokDSEhwKOIUkrQqdRvUBIlWFRQO5YgqcUcckbgjcYILAk5IXOGOKlWolxZORmvvto5r52UnTvHvJ2074x1r5u/Zsccz6wTQt0azf5KIHRHxe0QM17OLC4zW/7t149L03zcuTSdRrb75V1Ird/PGpemiaPG87fVMtRoxlCWHWtR75Z2IqUpl9nyeH184+/74/IWLz50+O3Vq9tTsucnjx48c3j94bPJopyGWI4/r5t6P5vbtefXtq69Pn7j67s/fZO3dkRdqjGNNsmibjNZf3Zae7KiyzWdnQzopty83thGNYcVK+QAZqI3/4SjF1tvnhuOVT3vaOGBdVavVaqvP59zlKvAflkSvWwD0RvFBn33/LY4NmnpsCtdfrH8ByuK+lR/1M+VI8zIDTd9vu2k0Ik5c/ufL7IhurEMAACzj+2z+82yr+V8aDzSU+1++hzISEf+PiF0RcV9E7I6I+yNqZR+MiIdWWX/zDsnd85/02poCW6Fs/vdCvre1eP5XzP5ipJTndtbiH0hOnq7MHspfk4MxMJTlJ5ao44eXf/u8SG9pOtc4/8uOrP5iLpi341q5aYFuZmphqtO4C9c/idhbbhV/EsU2ThIReyJi7xrrOP301/vanVs+/iUssc+0UtWvIp6q9//lWBT/na5K2u5PTjx/bPLo+JaozB4aL66Ku/3y65U32tXfUfxdkPX/tpbX/+1d4JFkS8T8hYtnavu186uv48ofnzWM6UW7y1n86bcRq77+B5O3aunB/LEPpxYWzk9EDCav3f345J3nFvmifBb/wQOtx/+uhhY/HBHZRbw/Ih6JiEfzvnssIh6PiANLxP/TS0+81+5c+/5fYlW+i7L4Z5br/2js/9UnSmd+/G718Rey/j9SSx3MH1nJ+99KG9jJawcAAAD3irR2D3ySjt1Op+nYWP0e/t2xLa3MzS88c3Lug3Mz9XvlR2IgLVa6hhvWQyfyteEiP9mUP5yvG39R2lrLj03PVWZ6HTz0ue1txn/mz1KvWwesuy7sowH3KOMf+pfxD/3L+If+ZfxD/2o1/j/uQTuAjefzH/qX8Q/9y/iH/mX8Q19q+9v4tKOf/Pc4UfzthM3Snh4ltq5nFZH2PsC+SJTX+zIeanmqx29MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXfJvAAAA///S5eHe") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) [ 320.102586][T16075] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 320.111957][T16075] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 320.141978][T16068] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000380)={0x18, 0x2, {0xffff, @dev}}, 0x1e) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000900)={0x18, 0x2, {0x0, @loopback}}, 0x1e) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000000700000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x800008ec0, 0x0) dup3(r4, r5, 0x0) dup2(r5, r6) write$binfmt_elf64(r6, &(0x7f0000003a00)=ANY=[], 0xfffffe14) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r2, r1, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) write(r0, &(0x7f0000000480)='M', 0xffffff1f) [ 320.151531][T16068] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 320.191611][T16078] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xa, &(0x7f0000000500)={0x0, 0x18, "3f5a78252310798a61405205e7db9df37ddde591d3e8f4a1"}, &(0x7f0000000140)=0x20) executing program 1: r0 = socket(0x840000000002, 0x3, 0xff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) sendmmsg$inet(r0, &(0x7f0000001c40)=[{{&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000600)="a90900000000746400006277000000003552bde5", 0x14}], 0x1}}], 0x1, 0x0) [ 320.201098][T16078] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 320.225208][T16080] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 320.234555][T16080] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xd8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x40186366, 0x20000000) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000300000000000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a00910c07a551559a257aac8180"], 0xfe33) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={0x0, 0x0}, 0x20) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="7000000000010104000000000000000002000000240001"], 0x70}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@generic={0x3, 0x2}, @mptcp=@ack={0x1e, 0x4}]}}}}}}}}, 0x0) executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x8}, 0x20) executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x20}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000040), 0x4) recvmsg$unix(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_fc_track_inode\x00', r0}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000000)=""/119, 0x77}, {&(0x7f0000000340)=""/202, 0xca}], 0x3, &(0x7f00000001c0)=""/61, 0x3d}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB="61156800000000006113380000000000bfa000000000000007000000080000002d0301000000000095006900000000006916000000000000bf67000000000000350607000fff07206706000002000000150300000ee60060bf050000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562eff4ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916df0a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c29dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d57c4e9b2ad9bc1142ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57d20000009f0f53acbb40b4f8e2738270b31562ed838b9df97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bda7afaab43176e65ec1118d50d1f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000020000000000000000000000c1eb2d91fb79ea00000000000000000000000000e4007be511fe32fbc90e2364a55e9bb66ad2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7a43c8da0c44d2ebf2f3f2b87be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747086312e9815a21cb3f1f8150d999d78854ca4d3116dbc7e2bf2402a75fd7a5573336004084d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b527c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae93234c2cc17dc4a5dfacba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b3bc87b0da80000d9ef418cf19e7a8cf8ffffffce91798adc2dca87ddd9d064e081383409ed2912c811c600f03212a5331c2a4ead000000000000000000008d4496dc862fcdb0ee67fdd006d4e466e8b32b3afdaecee9862edf61cd0dd24ff2dba562c5ae5c053355abb762ef2a5ee5f285e333b522ca09af626c6e4ad1c685165388000015de7f2077cd6d96a8a687c97e7d1d5cc25ffebc53b2ef9d57cf5d995bad3de6f555e9616d0e7c258205668dcfb35c3550ef80e0a704a7d9dc23e1742dc9e7d7d8c3b3cba2229cd1c0d8046981789493b26c611c40b86157d7c383144bff7115f440e059bdfb739d7c285d6c2048c229d1fd67791bff7fa758b953b41cf077028716a411afef49f51d490f09ce0781f2d1769551bb8f882dfe8d1491142666de72b230356376b60abc0b7494a683ecf96463e89744ea228ac17f7ac5a06b103ea8c78d82d48d7700b661357224b847a6adced04d87e0f4019cae065b48be01956d7c279e8232e7f7e7b4b0c7c740cb7920823c26ad3ec97db1e09c347db220851d1e280ea6bce40c16193a89719b74be9456afef6b6b56ee88b878404a308b4e9471e11bc250c36c154c20c8533376e347c89020b7ef9599ea49ee6d3b9b355ad9fbda34625d243168d788bf9a681b09aa85e0da7d76f2cd029ee3df390cba760cd9c9b5fe625827edae4e7c19dc6c2fe701797df47324cad92d8ea62270f89d04141e89bee3c3611a996d9d9db00508adc93d7bb21dfe1174ab2f31d075e30ee07e16d28aaa70a35c55370a3af315cf25a6cce2cae3d6c75906290d55a2a2447bb571d6991522136ed013b8f6f4cf0a91931f0a7d88d4e69729a77a6e76433c1a0668677f8c7683f779d3301db1f43bd7dd0b301098f522437ec5ff0c358900000000000000000000000000007f91ee647a956ca982a84a97f9231a107466f2f9d62994907a93b9d183c0c6187d0a9ea8ccb3ba859b05"], &(0x7f0000000100)='GPL\x00'}, 0x48) executing program 1: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec2700000000000000660000000f0000f495"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='rxrpc_local\x00', r0}, 0x10) r1 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) dup3(r0, r1, 0x0) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x3, 0x4) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bind$unix(r3, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x80047441, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xaf, "c8e88e99b06f0973962221885b336b8e48aaef197f4ee6d4a717e8af5e429214c0a8e5bcfe28d059fe7b2ac5856f4ffe2738c93d2b44e2910f761edd6ae091fc19ac0b9393c6df5263d8c3b4ce4b04d8f6667c6f2e805accb35e1819e0dd5cf7300d4bd7a3f2b245a4f21c14132fc6cf70dfc1fe1f462ae6ea6ec3021d55069fb198e933073f2fc76064d4e7aca11c2c2280cc8d35cab610b6bc8fdc951fb17100fa598d7a95e068562371cbada95c"}, &(0x7f0000000580)=0xb7) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = epoll_create1(0x0) socket(0x1, 0x80802, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)) [ 320.347353][T16097] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$eJzs3EtsG0UfAPD/rp2kzy/5Snm0tBAoiIpH0qQPeuACAokDSEhwKOIUkrQqdRvUBIlWFRQO5YgqcUcckbgjcYILAk5IXOGOKlWolxZORmvvto5r52UnTvHvJ2074x1r5u/Zsccz6wTQt0azf5KIHRHxe0QM17OLC4zW/7t149L03zcuTSdRrb75V1Ird/PGpemiaPG87fVMtRoxlCWHWtR75Z2IqUpl9nyeH184+/74/IWLz50+O3Vq9tTsucnjx48c3j94bPJopyGWI4/r5t6P5vbtefXtq69Pn7j67s/fZO3dkRdqjGNNsmibjNZf3Zae7KiyzWdnQzopty83thGNYcVK+QAZqI3/4SjF1tvnhuOVT3vaOGBdVavVaqvP59zlKvAflkSvWwD0RvFBn33/LY4NmnpsCtdfrH8ByuK+lR/1M+VI8zIDTd9vu2k0Ik5c/ufL7IhurEMAACzj+2z+82yr+V8aDzSU+1++hzISEf+PiF0RcV9E7I6I+yNqZR+MiIdWWX/zDsnd85/02poCW6Fs/vdCvre1eP5XzP5ipJTndtbiH0hOnq7MHspfk4MxMJTlJ5ao44eXf/u8SG9pOtc4/8uOrP5iLpi341q5aYFuZmphqtO4C9c/idhbbhV/EsU2ThIReyJi7xrrOP301/vanVs+/iUssc+0UtWvIp6q9//lWBT/na5K2u5PTjx/bPLo+JaozB4aL66Ku/3y65U32tXfUfxdkPX/tpbX/+1d4JFkS8T8hYtnavu186uv48ofnzWM6UW7y1n86bcRq77+B5O3aunB/LEPpxYWzk9EDCav3f345J3nFvmifBb/wQOtx/+uhhY/HBHZRbw/Ih6JiEfzvnssIh6PiANLxP/TS0+81+5c+/5fYlW+i7L4Z5br/2js/9UnSmd+/G718Rey/j9SSx3MH1nJ+99KG9jJawcAAAD3irR2D3ySjt1Op+nYWP0e/t2xLa3MzS88c3Lug3Mz9XvlR2IgLVa6hhvWQyfyteEiP9mUP5yvG39R2lrLj03PVWZ6HTz0ue1txn/mz1KvWwesuy7sowH3KOMf+pfxD/3L+If+ZfxD/2o1/j/uQTuAjefzH/qX8Q/9y/iH/mX8Q19q+9v4tKOf/Pc4UfzthM3Snh4ltq5nFZH2PsC+SJTX+zIeanmqx29MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXfJvAAAA///S5eHe") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) [ 320.526899][T16111] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 320.536345][T16111] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xb, &(0x7f0000000280), 0xf) executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xd8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x40186366, 0x20000000) executing program 1: r0 = socket(0x840000000002, 0x3, 0xff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) sendmmsg$inet(r0, &(0x7f0000001c40)=[{{&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000600)="a90900000000746400006277000000003552bde5", 0x14}], 0x1}}], 0x1, 0x0) executing program 0: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$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") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) ftruncate(r0, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="7e13ba02d2bb0492f6984bbd71a6134955722e8d7bdb1641a279fc8894f09c4eccf9b012b29a8dcd58ed7e903f4a8a8cae164c1c58acbd31f7aab6f2905bac6a0108522c1543e74895076a4d7f13bc5e2e49b5cc41a4e982a877774cb2b64d273d065fe60590a7585ff154004002719e8704ae26b8cdb701d574b059623710fd2360a763e0d648d2f31d45d03ff4de65dc3283450fe2d7844a66c0f9b38fee57c29fcb881ac2f345a214f89d7356cdf5e5eddc524a565618426238666c53fcc3d6a3e86b826ad714effbb0b4c9e0c3ee3147cd62d4615d1dd610c58aff1bae985b86d042a424456749", 0xe9, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x33, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'lblc\x00', 0x2, 0x2, 0x69}, 0x2c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000340)={r1, r4}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000380)={@dev, @multicast2, @remote}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000440)={0x87, @multicast1, 0x4e20, 0x3, 'wlc\x00', 0xc, 0x9, 0x41}, 0x2c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f0000000480)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) connect$vsock_stream(r4, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000500)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000540)=0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000005c0)={r6, r7/1000+10000}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x658, 0x140, 0x140, 0x0, 0x4b8, 0x258, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, &(0x7f0000000600), {[{{@ipv6={@remote, @private2, [0xff, 0xffffff00, 0xffffff00], [0xff, 0x0, 0xff000000], 'wlan1\x00', 'ip6_vti0\x00', {}, {}, 0x1c, 0x80, 0x5}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}, @inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast2, 0x13, 0x25, 0x4}}}, {{@ipv6={@loopback, @empty, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'sit0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x32, 0x4, 0x6}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x24, 0x22, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x4, 0x3, 0x2}, {0x0, 0x6}, {0x20, 0x10001}, 0x2}}, @common=@mh={{0x28}, {"d935", 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0xec}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@local, 0x10, 0x8, 0x1ff}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, @private0={0xfc, 0x0, '\x00', 0x1}, [0xffffff00, 0xff000000, 0xffffff00, 0xffffff00], [0xff, 0xffffffff, 0xff, 0xff000000], 'pimreg0\x00', 'pim6reg\x00', {}, {0xff}, 0x3c, 0x7, 0x1, 0x40}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000d40)={0x0, 0x7}, &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000dc0)={r8, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000e80)=0x84) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000fc0)=0x8, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001080)={'syztnl0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x29, 0x70, 0x8, 0x8, 0x76, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x80, 0x1, 0x3, 0x2400000}}) executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) ftruncate(r0, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="7e13ba02d2bb0492f6984bbd71a6134955722e8d7bdb1641a279fc8894f09c4eccf9b012b29a8dcd58ed7e903f4a8a8cae164c1c58acbd31f7aab6f2905bac6a0108522c1543e74895076a4d7f13bc5e2e49b5cc41a4e982a877774cb2b64d273d065fe60590a7585ff154004002719e8704ae26b8cdb701d574b059623710fd2360a763e0d648d2f31d45d03ff4de65dc3283450fe2d7844a66c0f9b38fee57c29fcb881ac2f345a214f89d7356cdf5e5eddc524a565618426238666c53fcc3d6a3e86b826ad714effbb0b4c9e0c3ee3147cd62d4615d1dd610c58aff1bae985b86d042a424456749", 0xe9, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x33, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'lblc\x00', 0x2, 0x2, 0x69}, 0x2c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000340)={r1, r4}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000380)={@dev, @multicast2, @remote}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000440)={0x87, @multicast1, 0x4e20, 0x3, 'wlc\x00', 0xc, 0x9, 0x41}, 0x2c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f0000000480)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) connect$vsock_stream(r4, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000500)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000540)=0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000005c0)={r6, r7/1000+10000}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x658, 0x140, 0x140, 0x0, 0x4b8, 0x258, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, &(0x7f0000000600), {[{{@ipv6={@remote, @private2, [0xff, 0xffffff00, 0xffffff00], [0xff, 0x0, 0xff000000], 'wlan1\x00', 'ip6_vti0\x00', {}, {}, 0x1c, 0x80, 0x5}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}, @inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast2, 0x13, 0x25, 0x4}}}, {{@ipv6={@loopback, @empty, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'sit0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x32, 0x4, 0x6}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x24, 0x22, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x4, 0x3, 0x2}, {0x0, 0x6}, {0x20, 0x10001}, 0x2}}, @common=@mh={{0x28}, {"d935", 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0xec}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@local, 0x10, 0x8, 0x1ff}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, @private0={0xfc, 0x0, '\x00', 0x1}, [0xffffff00, 0xff000000, 0xffffff00, 0xffffff00], [0xff, 0xffffffff, 0xff, 0xff000000], 'pimreg0\x00', 'pim6reg\x00', {}, {0xff}, 0x3c, 0x7, 0x1, 0x40}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000d40)={0x0, 0x7}, &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000dc0)={r8, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000e80)=0x84) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000fc0)=0x8, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001080)={'syztnl0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x29, 0x70, 0x8, 0x8, 0x76, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x80, 0x1, 0x3, 0x2400000}}) executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) ftruncate(r0, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="7e13ba02d2bb0492f6984bbd71a6134955722e8d7bdb1641a279fc8894f09c4eccf9b012b29a8dcd58ed7e903f4a8a8cae164c1c58acbd31f7aab6f2905bac6a0108522c1543e74895076a4d7f13bc5e2e49b5cc41a4e982a877774cb2b64d273d065fe60590a7585ff154004002719e8704ae26b8cdb701d574b059623710fd2360a763e0d648d2f31d45d03ff4de65dc3283450fe2d7844a66c0f9b38fee57c29fcb881ac2f345a214f89d7356cdf5e5eddc524a565618426238666c53fcc3d6a3e86b826ad714effbb0b4c9e0c3ee3147cd62d4615d1dd610c58aff1bae985b86d042a424456749", 0xe9, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x33, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'lblc\x00', 0x2, 0x2, 0x69}, 0x2c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000340)={r1, r4}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000380)={@dev, @multicast2, @remote}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000440)={0x87, @multicast1, 0x4e20, 0x3, 'wlc\x00', 0xc, 0x9, 0x41}, 0x2c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f0000000480)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) connect$vsock_stream(r4, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000500)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000540)=0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000005c0)={r6, r7/1000+10000}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x658, 0x140, 0x140, 0x0, 0x4b8, 0x258, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, &(0x7f0000000600), {[{{@ipv6={@remote, @private2, [0xff, 0xffffff00, 0xffffff00], [0xff, 0x0, 0xff000000], 'wlan1\x00', 'ip6_vti0\x00', {}, {}, 0x1c, 0x80, 0x5}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}, @inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast2, 0x13, 0x25, 0x4}}}, {{@ipv6={@loopback, @empty, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'sit0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x32, 0x4, 0x6}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x24, 0x22, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x4, 0x3, 0x2}, {0x0, 0x6}, {0x20, 0x10001}, 0x2}}, @common=@mh={{0x28}, {"d935", 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0xec}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@local, 0x10, 0x8, 0x1ff}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, @private0={0xfc, 0x0, '\x00', 0x1}, [0xffffff00, 0xff000000, 0xffffff00, 0xffffff00], [0xff, 0xffffffff, 0xff, 0xff000000], 'pimreg0\x00', 'pim6reg\x00', {}, {0xff}, 0x3c, 0x7, 0x1, 0x40}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000d40)={0x0, 0x7}, &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000dc0)={r8, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000e80)=0x84) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000fc0)=0x8, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001080)={'syztnl0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x29, 0x70, 0x8, 0x8, 0x76, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x80, 0x1, 0x3, 0x2400000}}) [ 320.808174][T16129] IPVS: set_ctl: invalid protocol: 135 224.0.0.1:20000 executing program 1: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x4000000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x80000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) futex(&(0x7f0000000080)=0x2, 0x8, 0x0, &(0x7f0000000180), &(0x7f0000000300)=0x1, 0x2) executing program 0: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x4000000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x80000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) futex(&(0x7f0000000080)=0x2, 0x8, 0x0, &(0x7f0000000180), &(0x7f0000000300)=0x1, 0x2) [ 320.859289][T16136] IPVS: set_ctl: invalid protocol: 135 224.0.0.1:20000 [ 320.869415][T16134] IPVS: set_ctl: invalid protocol: 135 224.0.0.1:20000 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$eJzs3EtsG0UfAPD/rp2kzy/5Snm0tBAoiIpH0qQPeuACAokDSEhwKOIUkrQqdRvUBIlWFRQO5YgqcUcckbgjcYILAk5IXOGOKlWolxZORmvvto5r52UnTvHvJ2074x1r5u/Zsccz6wTQt0azf5KIHRHxe0QM17OLC4zW/7t149L03zcuTSdRrb75V1Ird/PGpemiaPG87fVMtRoxlCWHWtR75Z2IqUpl9nyeH184+/74/IWLz50+O3Vq9tTsucnjx48c3j94bPJopyGWI4/r5t6P5vbtefXtq69Pn7j67s/fZO3dkRdqjGNNsmibjNZf3Zae7KiyzWdnQzopty83thGNYcVK+QAZqI3/4SjF1tvnhuOVT3vaOGBdVavVaqvP59zlKvAflkSvWwD0RvFBn33/LY4NmnpsCtdfrH8ByuK+lR/1M+VI8zIDTd9vu2k0Ik5c/ufL7IhurEMAACzj+2z+82yr+V8aDzSU+1++hzISEf+PiF0RcV9E7I6I+yNqZR+MiIdWWX/zDsnd85/02poCW6Fs/vdCvre1eP5XzP5ipJTndtbiH0hOnq7MHspfk4MxMJTlJ5ao44eXf/u8SG9pOtc4/8uOrP5iLpi341q5aYFuZmphqtO4C9c/idhbbhV/EsU2ThIReyJi7xrrOP301/vanVs+/iUssc+0UtWvIp6q9//lWBT/na5K2u5PTjx/bPLo+JaozB4aL66Ku/3y65U32tXfUfxdkPX/tpbX/+1d4JFkS8T8hYtnavu186uv48ofnzWM6UW7y1n86bcRq77+B5O3aunB/LEPpxYWzk9EDCav3f345J3nFvmifBb/wQOtx/+uhhY/HBHZRbw/Ih6JiEfzvnssIh6PiANLxP/TS0+81+5c+/5fYlW+i7L4Z5br/2js/9UnSmd+/G718Rey/j9SSx3MH1nJ+99KG9jJawcAAAD3irR2D3ySjt1Op+nYWP0e/t2xLa3MzS88c3Lug3Mz9XvlR2IgLVa6hhvWQyfyteEiP9mUP5yvG39R2lrLj03PVWZ6HTz0ue1txn/mz1KvWwesuy7sowH3KOMf+pfxD/3L+If+ZfxD/2o1/j/uQTuAjefzH/qX8Q/9y/iH/mX8Q19q+9v4tKOf/Pc4UfzthM3Snh4ltq5nFZH2PsC+SJTX+zIeanmqx29MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXfJvAAAA///S5eHe") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 0: mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0), 0x6db6e559) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x18, 0x0, &(0x7f0000000280)) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000100001000000000000007f000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f740000000c0a01080000000000000000010000000900020073797a32000000004800038044000080080003400000000238000b80340001800a0001006c696d6974000000240002800c00014000000000000000010c00024000000000efffffff0eeb0340000005f50900010073797a30"], 0xf8}}, 0x0) executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xd8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x40186366, 0x20000000) executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) executing program 2: syz_emit_ethernet(0x50, &(0x7f0000002480)={@local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x1a, 0x3a, 0xff, @remote, @local, {[], @ndisc_ns={0x87, 0x0, 0x0, @dev, [{0x0, 0x0, "b031f279"}]}}}}}}, 0x0) executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x7) listen(r1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x3) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) executing program 2: rmdir(&(0x7f0000000180)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xed, 0x0, &(0x7f0000000080)) executing program 2: rmdir(&(0x7f0000000180)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xed, 0x0, &(0x7f0000000080)) executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) ftruncate(r0, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="7e13ba02d2bb0492f6984bbd71a6134955722e8d7bdb1641a279fc8894f09c4eccf9b012b29a8dcd58ed7e903f4a8a8cae164c1c58acbd31f7aab6f2905bac6a0108522c1543e74895076a4d7f13bc5e2e49b5cc41a4e982a877774cb2b64d273d065fe60590a7585ff154004002719e8704ae26b8cdb701d574b059623710fd2360a763e0d648d2f31d45d03ff4de65dc3283450fe2d7844a66c0f9b38fee57c29fcb881ac2f345a214f89d7356cdf5e5eddc524a565618426238666c53fcc3d6a3e86b826ad714effbb0b4c9e0c3ee3147cd62d4615d1dd610c58aff1bae985b86d042a424456749", 0xe9, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x33, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'lblc\x00', 0x2, 0x2, 0x69}, 0x2c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000340)={r1, r4}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000380)={@dev, @multicast2, @remote}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000440)={0x87, @multicast1, 0x4e20, 0x3, 'wlc\x00', 0xc, 0x9, 0x41}, 0x2c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f0000000480)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) connect$vsock_stream(r4, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000500)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000540)=0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000005c0)={r6, r7/1000+10000}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x658, 0x140, 0x140, 0x0, 0x4b8, 0x258, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, &(0x7f0000000600), {[{{@ipv6={@remote, @private2, [0xff, 0xffffff00, 0xffffff00], [0xff, 0x0, 0xff000000], 'wlan1\x00', 'ip6_vti0\x00', {}, {}, 0x1c, 0x80, 0x5}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}, @inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast2, 0x13, 0x25, 0x4}}}, {{@ipv6={@loopback, @empty, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'sit0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x32, 0x4, 0x6}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x24, 0x22, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x4, 0x3, 0x2}, {0x0, 0x6}, {0x20, 0x10001}, 0x2}}, @common=@mh={{0x28}, {"d935", 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0xec}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@local, 0x10, 0x8, 0x1ff}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, @private0={0xfc, 0x0, '\x00', 0x1}, [0xffffff00, 0xff000000, 0xffffff00, 0xffffff00], [0xff, 0xffffffff, 0xff, 0xff000000], 'pimreg0\x00', 'pim6reg\x00', {}, {0xff}, 0x3c, 0x7, 0x1, 0x40}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000d40)={0x0, 0x7}, &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000dc0)={r8, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000e80)=0x84) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000fc0)=0x8, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001080)={'syztnl0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x29, 0x70, 0x8, 0x8, 0x76, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x80, 0x1, 0x3, 0x2400000}}) executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) ftruncate(r0, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="7e13ba02d2bb0492f6984bbd71a6134955722e8d7bdb1641a279fc8894f09c4eccf9b012b29a8dcd58ed7e903f4a8a8cae164c1c58acbd31f7aab6f2905bac6a0108522c1543e74895076a4d7f13bc5e2e49b5cc41a4e982a877774cb2b64d273d065fe60590a7585ff154004002719e8704ae26b8cdb701d574b059623710fd2360a763e0d648d2f31d45d03ff4de65dc3283450fe2d7844a66c0f9b38fee57c29fcb881ac2f345a214f89d7356cdf5e5eddc524a565618426238666c53fcc3d6a3e86b826ad714effbb0b4c9e0c3ee3147cd62d4615d1dd610c58aff1bae985b86d042a424456749", 0xe9, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x33, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'lblc\x00', 0x2, 0x2, 0x69}, 0x2c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000340)={r1, r4}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000380)={@dev, @multicast2, @remote}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000440)={0x87, @multicast1, 0x4e20, 0x3, 'wlc\x00', 0xc, 0x9, 0x41}, 0x2c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f0000000480)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) connect$vsock_stream(r4, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000500)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000540)=0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000005c0)={r6, r7/1000+10000}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x658, 0x140, 0x140, 0x0, 0x4b8, 0x258, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, &(0x7f0000000600), {[{{@ipv6={@remote, @private2, [0xff, 0xffffff00, 0xffffff00], [0xff, 0x0, 0xff000000], 'wlan1\x00', 'ip6_vti0\x00', {}, {}, 0x1c, 0x80, 0x5}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}, @inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast2, 0x13, 0x25, 0x4}}}, {{@ipv6={@loopback, @empty, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'sit0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x32, 0x4, 0x6}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x24, 0x22, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x4, 0x3, 0x2}, {0x0, 0x6}, {0x20, 0x10001}, 0x2}}, @common=@mh={{0x28}, {"d935", 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0xec}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@local, 0x10, 0x8, 0x1ff}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, @private0={0xfc, 0x0, '\x00', 0x1}, [0xffffff00, 0xff000000, 0xffffff00, 0xffffff00], [0xff, 0xffffffff, 0xff, 0xff000000], 'pimreg0\x00', 'pim6reg\x00', {}, {0xff}, 0x3c, 0x7, 0x1, 0x40}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000d40)={0x0, 0x7}, &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000dc0)={r8, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000e80)=0x84) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000fc0)=0x8, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001080)={'syztnl0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x29, 0x70, 0x8, 0x8, 0x76, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x80, 0x1, 0x3, 0x2400000}}) executing program 2: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x4000000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x80000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) futex(&(0x7f0000000080)=0x2, 0x8, 0x0, &(0x7f0000000180), &(0x7f0000000300)=0x1, 0x2) [ 321.223137][T16165] IPVS: set_ctl: invalid protocol: 135 224.0.0.1:20000 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="b40900000000000006000000000000008510000002000000850000000800000095000000000000009500000000000000fe0d4347477d"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100}, 0x48) executing program 3: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000100001000000000000007f000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f740000000c0a01080000000000000000010000000900020073797a32000000004800038044000080080003400000000238000b80340001800a0001006c696d6974000000240002800c00014000000000000000010c00024000000000efffffff0eeb0340000005f50900010073797a30"], 0xf8}}, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001a0001000000000000000000022020000001"], 0x30}}, 0x0) [ 321.264047][T16169] IPVS: set_ctl: invalid protocol: 135 224.0.0.1:20000 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0xf3a, 0x0) tee(r3, r0, 0x80000001, 0x2) vmsplice(r4, &(0x7f0000000380)=[{&(0x7f0000013580)='\r', 0x1}], 0x1, 0x0) write(r1, 0x0, 0x0) executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) executing program 0: msgctl$IPC_SET(0x0, 0x1, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) dup(0xffffffffffffffff) r2 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r4, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r2, 0xb15, 0x0, 0x0, 0x0, 0x0) executing program 0: syz_emit_ethernet(0x50, &(0x7f0000002480)={@local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x1a, 0x3a, 0xff, @remote, @local, {[], @ndisc_ns={0x87, 0x0, 0x0, @dev, [{0x0, 0x0, "b031f279"}]}}}}}}, 0x0) executing program 0: rmdir(&(0x7f0000000180)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xed, 0x0, &(0x7f0000000080)) executing program 0: rmdir(&(0x7f0000000180)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r3 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r3, 0x10d, 0xed, 0x0, &(0x7f0000000080)) executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) ftruncate(r0, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="7e13ba02d2bb0492f6984bbd71a6134955722e8d7bdb1641a279fc8894f09c4eccf9b012b29a8dcd58ed7e903f4a8a8cae164c1c58acbd31f7aab6f2905bac6a0108522c1543e74895076a4d7f13bc5e2e49b5cc41a4e982a877774cb2b64d273d065fe60590a7585ff154004002719e8704ae26b8cdb701d574b059623710fd2360a763e0d648d2f31d45d03ff4de65dc3283450fe2d7844a66c0f9b38fee57c29fcb881ac2f345a214f89d7356cdf5e5eddc524a565618426238666c53fcc3d6a3e86b826ad714effbb0b4c9e0c3ee3147cd62d4615d1dd610c58aff1bae985b86d042a424456749", 0xe9, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000280)={0x33, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x3, 'lblc\x00', 0x2, 0x2, 0x69}, 0x2c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000340)={r1, r4}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000380)={@dev, @multicast2, @remote}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000440)={0x87, @multicast1, 0x4e20, 0x3, 'wlc\x00', 0xc, 0x9, 0x41}, 0x2c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f0000000480)) r5 = socket$inet_sctp(0x2, 0x5, 0x84) connect$vsock_stream(r4, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000500)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000540)=0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000005c0)={r6, r7/1000+10000}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x658, 0x140, 0x140, 0x0, 0x4b8, 0x258, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, &(0x7f0000000600), {[{{@ipv6={@remote, @private2, [0xff, 0xffffff00, 0xffffff00], [0xff, 0x0, 0xff000000], 'wlan1\x00', 'ip6_vti0\x00', {}, {}, 0x1c, 0x80, 0x5}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}, @inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast2, 0x13, 0x25, 0x4}}}, {{@ipv6={@loopback, @empty, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'sit0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x32, 0x4, 0x6}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv4=@multicast2, 0x24, 0x22, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x4, 0x3, 0x2}, {0x0, 0x6}, {0x20, 0x10001}, 0x2}}, @common=@mh={{0x28}, {"d935", 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0xec}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@local, 0x10, 0x8, 0x1ff}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, @private0={0xfc, 0x0, '\x00', 0x1}, [0xffffff00, 0xff000000, 0xffffff00, 0xffffff00], [0xff, 0xffffffff, 0xff, 0xff000000], 'pimreg0\x00', 'pim6reg\x00', {}, {0xff}, 0x3c, 0x7, 0x1, 0x40}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000d40)={0x0, 0x7}, &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000dc0)={r8, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000e80)=0x84) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000fc0)=0x8, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001080)={'syztnl0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x29, 0x70, 0x8, 0x8, 0x76, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x80, 0x1, 0x3, 0x2400000}}) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000007200000000000000000000000a58000000060a0b040000000000000000020000000900010073797a3000b800000900020073797a32000000002c00048028000180080001006e6174001c00028008000240000000020800014000080000080005"], 0x80}}, 0x0) executing program 2: mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0), 0x6db6e559) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x18, 0x0, &(0x7f0000000280)) executing program 0: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x4000000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x80000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) futex(&(0x7f0000000080)=0x2, 0x8, 0x0, &(0x7f0000000180), &(0x7f0000000300)=0x1, 0x2) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="b40900000000000006000000000000008510000002000000850000000800000095000000000000009500000000000000fe0d4347477d"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100}, 0x48) executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000100001000000000000007f000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f740000000c0a01080000000000000000010000000900020073797a32000000004800038044000080080003400000000238000b80340001800a0001006c696d6974000000240002800c00014000000000000000010c00024000000000efffffff0eeb0340000005f50900010073797a30"], 0xf8}}, 0x0) [ 321.656829][T16204] IPVS: set_ctl: invalid protocol: 135 224.0.0.1:20000 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001a0001000000000000000000022020000001"], 0x30}}, 0x0) executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) executing program 4: msgctl$IPC_SET(0x0, 0x1, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) dup(0xffffffffffffffff) r2 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r4, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r2, 0xb15, 0x0, 0x0, 0x0, 0x0) executing program 4: syz_emit_ethernet(0x50, &(0x7f0000002480)={@local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x1a, 0x3a, 0xff, @remote, @local, {[], @ndisc_ns={0x87, 0x0, 0x0, @dev, [{0x0, 0x0, "b031f279"}]}}}}}}, 0x0) executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89eb, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f0000000380)="30803f86", 0x4, r0) executing program 4: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}}, 0x0) executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000008200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000440)={0x10, 0x10}, 0x10}], 0x1}, 0x0) executing program 2: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xb, &(0x7f0000000280), 0xf) executing program 0: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xb, &(0x7f0000000280), 0xf) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940001000000fcffc50000000f00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="5c0000006c006bcc9e3be35c6e17aa31086b876c1d0000007ea60864160af365100036000c000300300017d34460bc0100b556a705251e6182fffffffdf60a84c9c5bb5b64f69853000000000000000000004887605ebdaad4690000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x28}}], 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x3e1, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015400500142603600e120800060000000401a80016004000014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) executing program 1: setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x104, 0x4, 0x3e8, 0x200, 0x200, 0x100, 0x300, 0x318, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r1, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='dd:cb2e') executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf03f) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x4004743b, &(0x7f0000000040)) [ 322.088173][T16242] netlink: 'syz-executor.1': attribute type 21 has an invalid length. executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) executing program 3: open$dir(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x400000}}, 0xb8}}, 0x4000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0xee01}}}, 0xb8}}, 0x0) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "2f01c4fd8eabb5611b655e5f65991c3e1e6f89550928b713582f37d43e4b35a9f7a5b12d01438c9c419900b0e3001000"}, 0x48, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000640)='asymmetric\x00', &(0x7f0000000600)) keyctl$link(0x8, r2, r1) executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35, 0x0, 0x0, 0x3}, {0x15, 0x0, 0x0, 0xfff}, {0x6, 0x0, 0x0, 0x7ffffcb9}]}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) r3 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4300, 0x0, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x27da}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000880)=@newtaction={0x70, 0x30, 0x53b, 0x0, 0x0, {0x9}, [{0x5c, 0x1, [@m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_PARMS={0x18}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x20}]}, {0x4}, {0xc}, {0xc, 0x4}}}]}]}, 0x70}}, 0x0) r6 = socket$inet(0x2, 0x3, 0x102) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r7}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000002c0)={'veth1_to_batadv\x00', 0x0}) setsockopt$packet_int(r9, 0x107, 0x14, &(0x7f0000000200)=0x5, 0x4) setsockopt$packet_int(r9, 0x107, 0xf, &(0x7f0000000040)=0x200, 0x4) sendto$packet(r9, &(0x7f00000000c0)="3f040e03f007120006001e0089e9aaa911d7c2290f0086dd1327c9167c64114a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xb318, 0x0, &(0x7f0000000540)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$can_j1939(r1, &(0x7f0000000080)={&(0x7f00000000c0)={0x1d, 0x0, 0x0, {0x0, 0x1ec}}, 0x18, &(0x7f0000000000)={&(0x7f0000000140)='\x00', 0x1}}, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0xffffffffffffffff) r11 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x10000, 0xf74, 0x6}, &(0x7f00000001c0)=0x10) setsockopt$packet_fanout(r11, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r11, 0x107, 0x16, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x2}, {0x6}]}, 0x10) r12 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r12, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r12, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20040046) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000009c0)=@raw={'raw\x00', 0x41, 0x3, 0x3d0, 0x0, 0x0, 0x0, 0x210, 0x0, 0x338, 0x1f0, 0x1f0, 0x338, 0x1f0, 0x3, 0x0, {[{{@ip={@dev, @broadcast, 0x0, 0x0, 'team_slave_0\x00', 'wg1\x00'}, 0x0, 0x1e8, 0x210, 0x0, {0x0, 0xffffffffa0028000}, [@inet=@rpfilter={{0x28}}, @common=@inet=@hashlimit2={{0x150}, {'nr0\x00', {0x200, 0x8000000000000000, 0x0, 0x0, 0x0, 0xce9c, 0x80000000}}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@multicast1, @remote, 0x0, 0x0, 'veth1_vlan\x00', 'geneve0\x00'}, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x430) executing program 1: mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0), 0x6db6e559) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x18, 0x0, &(0x7f0000000280)) executing program 3: syz_mount_image$msdos(&(0x7f0000002280), &(0x7f0000000200)='./file0\x00', 0x8, &(0x7f00000022c0)=ANY=[], 0x1, 0x206, &(0x7f0000002040)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) [ 322.327568][T16254] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 322.367404][T16254] xt_hashlimit: overflow, try lower: 512/9223372036854775808 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x1401, 0x501}, 0x10}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000000700000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x800008ec0, 0x0) dup3(r4, r5, 0x0) dup2(r5, r6) write$binfmt_elf64(r6, &(0x7f0000003a00)=ANY=[], 0xfffffe14) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r2, r1, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) write(r0, &(0x7f0000000480)='M', 0xffffff1f) executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x28}}], 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x462, &(0x7f0000000940)="$eJzs3EtsG0UfAPD/rp2kzy/5Snm0tBAoiIpH0qQPeuACAokDSEhwKOIUkrQqdRvUBIlWFRQO5YgqcUcckbgjcYILAk5IXOGOKlWolxZORmvvto5r52UnTvHvJ2074x1r5u/Zsccz6wTQt0azf5KIHRHxe0QM17OLC4zW/7t149L03zcuTSdRrb75V1Ird/PGpemiaPG87fVMtRoxlCWHWtR75Z2IqUpl9nyeH184+/74/IWLz50+O3Vq9tTsucnjx48c3j94bPJopyGWI4/r5t6P5vbtefXtq69Pn7j67s/fZO3dkRdqjGNNsmibjNZf3Zae7KiyzWdnQzopty83thGNYcVK+QAZqI3/4SjF1tvnhuOVT3vaOGBdVavVaqvP59zlKvAflkSvWwD0RvFBn33/LY4NmnpsCtdfrH8ByuK+lR/1M+VI8zIDTd9vu2k0Ik5c/ufL7IhurEMAACzj+2z+82yr+V8aDzSU+1++hzISEf+PiF0RcV9E7I6I+yNqZR+MiIdWWX/zDsnd85/02poCW6Fs/vdCvre1eP5XzP5ipJTndtbiH0hOnq7MHspfk4MxMJTlJ5ao44eXf/u8SG9pOtc4/8uOrP5iLpi341q5aYFuZmphqtO4C9c/idhbbhV/EsU2ThIReyJi7xrrOP301/vanVs+/iUssc+0UtWvIp6q9//lWBT/na5K2u5PTjx/bPLo+JaozB4aL66Ku/3y65U32tXfUfxdkPX/tpbX/+1d4JFkS8T8hYtnavu186uv48ofnzWM6UW7y1n86bcRq77+B5O3aunB/LEPpxYWzk9EDCav3f345J3nFvmifBb/wQOtx/+uhhY/HBHZRbw/Ih6JiEfzvnssIh6PiANLxP/TS0+81+5c+/5fYlW+i7L4Z5br/2js/9UnSmd+/G718Rey/j9SSx3MH1nJ+99KG9jJawcAAAD3irR2D3ySjt1Op+nYWP0e/t2xLa3MzS88c3Lug3Mz9XvlR2IgLVa6hhvWQyfyteEiP9mUP5yvG39R2lrLj03PVWZ6HTz0ue1txn/mz1KvWwesuy7sowH3KOMf+pfxD/3L+If+ZfxD/2o1/j/uQTuAjefzH/qX8Q/9y/iH/mX8Q19q+9v4tKOf/Pc4UfzthM3Snh4ltq5nFZH2PsC+SJTX+zIeanmqx29MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXfJvAAAA///S5eHe") perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x28080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x6, [@datasec={0x4, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2}], '\n\x00'}, @datasec={0x300, 0x0, 0x0, 0xf, 0x1, [], 'g'}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c40)=""/4096, 0x46, 0x1000, 0x1}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) rmdir(&(0x7f0000000100)='./control\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r5, @multicast1}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000008004500004e04000890c36f77a84a597801000f00"/52], 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000540)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000008100)={0x0, 0x0, &(0x7f00000080c0)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x37}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r1, 0x20, &(0x7f0000000b40)={&(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) executing program 1: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x4000000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x80000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) futex(&(0x7f0000000080)=0x2, 0x8, 0x0, &(0x7f0000000180), &(0x7f0000000300)=0x1, 0x2) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) statx(r1, &(0x7f0000000300)='./file0/file0\x00', 0x1000, 0x0, 0xffffffffffffffff) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000300000000000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a00910c07a551559a257aac8180"], 0xfe33) executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf03f) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x4004743b, &(0x7f0000000040)) executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000c000000638af8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018240000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000008000020850000009400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmmsg(r0, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)=""/6, 0x6}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="01000000270000000200000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001"], 0x48}}, 0x0) executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x20) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4$unix(r2, 0xfffffffffffffffe, &(0x7f0000000000)=0xa00021f8, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect$unix(r3, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x39, 0x1, &(0x7f0000000080)=@raw=[@generic={0x3f, 0x2, 0x3, 0x7, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x69, &(0x7f0000000100)=""/105, 0x41000, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000180)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0xd, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1}, 0x90) creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setuid(0x0) executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x409c884, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='I', 0x1, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000001a80)=""/4096, 0x1000, 0x0, 0x0, 0x0) executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x1401, 0x501}, 0x10}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x328, 0x140, 0x0, 0xfeffffff, 0xa8, 0xa8, 0x290, 0x290, 0xffffffff, 0x290, 0xa8, 0x5, 0x0, {[{{@ip={@broadcast, @remote, 0x0, 0x0, 'geneve1\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0x98, 0x0, {0x0, 0x7}}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x1e8}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @local, @local, @gre_key, @gre_key}}}}, {{@ip={@private, @local, 0x0, 0x0, 'veth1_virt_wifi\x00', 'pim6reg0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @loopback, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) executing program 0: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x28}}], 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) executing program 2: r0 = fsopen(&(0x7f0000000400)='pipefs\x00', 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000a000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0250000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\x00\xee', &(0x7f00000002c0)="e3", 0x1) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000680)='\xf8@\x00', 0x0, r0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000380)='\x81\a\xd5', 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000004c0)='(&\x00', &(0x7f00000001c0)='\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f00000003c0)='(\x9d$(${\x00', &(0x7f0000000280)="8a", 0x1) close(r0) executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) executing program 0: socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x4000000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x80000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) futex(&(0x7f0000000080)=0x2, 0x8, 0x0, &(0x7f0000000180), &(0x7f0000000300)=0x1, 0x2) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) statx(r1, &(0x7f0000000300)='./file0/file0\x00', 0x1000, 0x0, 0xffffffffffffffff) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delroute={0x2c, 0x19, 0x901, 0x0, 0x0, {0x2, 0x18, 0x0, 0x0, 0x0, 0x3, 0xff}, [@RTA_DST={0x8, 0x1, @dev}, @RTA_PREFSRC={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x20}}]}, 0x2c}}, 0x0) executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xb, &(0x7f0000000280), 0xf) executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)) r3 = memfd_secret(0x0) ftruncate(r3, 0x5) finit_module(r3, 0x0, 0x0) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0xff}, &(0x7f0000000040), 0x0) executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)) r3 = memfd_secret(0x0) ftruncate(r3, 0x5) finit_module(r3, 0x0, 0x0) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0xff}, &(0x7f0000000040), 0x0) executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)) r3 = memfd_secret(0x0) ftruncate(r3, 0x5) finit_module(r3, 0x0, 0x0) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0xff}, &(0x7f0000000040), 0x0) executing program 1: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}}, 0x0) executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000c000000638af8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018240000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000008000020850000009400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000c000000638af8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018240000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000008000020850000009400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e00000010008108040f9becdb4cb92e0a28b137140000004abd6efb2503eaff0d00010002ff71bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e00000010008108040f9becdb4cb92e0a28b137140000004abd6efb2503eaff0d00010002ff71bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) [ 323.220122][T16323] batadv0: entered promiscuous mode [ 323.249352][T16324] batadv0: entered promiscuous mode executing program 0: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x28}}], 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) [ 323.273385][T16323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.296838][T16324] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940001000000fcffc50000000f00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="5c0000006c006bcc9e3be35c6e17aa31086b876c1d0000007ea60864160af365100036000c000300300017d34460bc0100b556a705251e6182fffffffdf60a84c9c5bb5b64f69853000000000000000000004887605ebdaad4690000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x328, 0x140, 0x0, 0xfeffffff, 0xa8, 0xa8, 0x290, 0x290, 0xffffffff, 0x290, 0xa8, 0x5, 0x0, {[{{@ip={@broadcast, @remote, 0x0, 0x0, 'geneve1\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0x98, 0x0, {0x0, 0x7}}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x1e8}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @local, @local, @gre_key, @gre_key}}}}, {{@ip={@private, @local, 0x0, 0x0, 'veth1_virt_wifi\x00', 'pim6reg0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @loopback, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) statx(r1, &(0x7f0000000300)='./file0/file0\x00', 0x1000, 0x0, 0xffffffffffffffff) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000000700000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x800008ec0, 0x0) dup3(r4, r5, 0x0) dup2(r5, r6) write$binfmt_elf64(r6, &(0x7f0000003a00)=ANY=[], 0xfffffe14) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r2, r1, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) write(r0, &(0x7f0000000480)='M', 0xffffff1f) executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)) r3 = memfd_secret(0x0) ftruncate(r3, 0x5) finit_module(r3, 0x0, 0x0) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0xff}, &(0x7f0000000040), 0x0) executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)) r3 = memfd_secret(0x0) ftruncate(r3, 0x5) finit_module(r3, 0x0, 0x0) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0xff}, &(0x7f0000000040), 0x0) executing program 2: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0xd, 0x0) r0 = semget(0x2, 0x1, 0x2a6) semop(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3}, {0x2, 0x6, 0x1800}], 0x2) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000100)=[{0x2, 0xd5db}], 0x1) semop(r2, &(0x7f0000001480)=[{0x0, 0xfffb}, {0x0, 0x7f}], 0x2) clock_gettime(0x0, &(0x7f00000001c0)) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0xd0db}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x6, 0x1, 0x1000}, {0x1, 0x6, 0x1000}, {0x3, 0x2de, 0x1000}], 0x3, &(0x7f0000000340)={0x0, 0x989680}) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x200) semctl$IPC_RMID(r3, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000b363d28f3e570000000f00000295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='netlink_extack\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000080)="330000001e001f000307f4f9002304000a04f55f0800010002010002080003800500000099db973b91aa057972513500b04067", 0x33) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240), 0xa8}}, 0x0) executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x1401, 0x501}, 0x10}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e00000010008108040f9becdb4cb92e0a28b137140000004abd6efb2503eaff0d00010002ff71bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000000700000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x800008ec0, 0x0) dup3(r4, r5, 0x0) dup2(r5, r6) write$binfmt_elf64(r6, &(0x7f0000003a00)=ANY=[], 0xfffffe14) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r2, r1, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) write(r0, &(0x7f0000000480)='M', 0xffffff1f) [ 323.685457][T16352] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/16, 0xffffffffffffffb3, 0x0) executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e00000010008108040f9becdb4cb92e0a28b137140000004abd6efb2503eaff0d00010002ff71bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) [ 323.972223][T16362] batadv0: entered promiscuous mode executing program 4: r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x94}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000002900000008"], 0x30}}], 0x1, 0x0) [ 324.007312][T16362] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x7) listen(r1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x3) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 324.050471][T16314] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 324.061931][T16314] CPU: 0 PID: 16314 Comm: syz-executor.1 Not tainted 6.9.0-rc6-syzkaller-00232-gddb4c3f25b7b #0 [ 324.072419][T16314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 324.082736][T16314] Call Trace: [ 324.086039][T16314] [ 324.089035][T16314] dump_stack_lvl+0xf2/0x150 [ 324.093762][T16314] dump_stack+0x15/0x20 [ 324.097984][T16314] dump_header+0x83/0x2d0 [ 324.102328][T16314] oom_kill_process+0x33e/0x4c0 [ 324.107188][T16314] out_of_memory+0x9cb/0xc00 [ 324.111809][T16314] ? try_to_free_mem_cgroup_pages+0x22b/0x4e0 [ 324.118148][T16314] mem_cgroup_out_of_memory+0x13e/0x190 [ 324.123724][T16314] try_charge_memcg+0x752/0xd10 [ 324.128678][T16314] ? _raw_spin_unlock+0x26/0x50 [ 324.133621][T16314] ? radix_tree_lookup+0xf9/0x150 [ 324.138732][T16314] mem_cgroup_swapin_charge_folio+0x107/0x1a0 [ 324.144812][T16314] __read_swap_cache_async+0x2b9/0x520 [ 324.150367][T16314] swap_cluster_readahead+0x276/0x3f0 [ 324.155751][T16314] swapin_readahead+0xe2/0x7a0 [ 324.160548][T16314] ? __filemap_get_folio+0x420/0x5b0 [ 324.165849][T16314] ? swap_cache_get_folio+0x6e/0x210 [ 324.171149][T16314] do_swap_page+0x3bb/0x15f0 [ 324.175816][T16314] ? exc_page_fault+0x392/0x6d0 [ 324.180709][T16314] ? __rcu_read_lock+0x36/0x50 [ 324.185493][T16314] ? pte_offset_map_nolock+0x124/0x1d0 [ 324.191036][T16314] handle_mm_fault+0x7fa/0x27e0 [ 324.195911][T16314] ? mas_walk+0x204/0x320 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fchown(r0, 0x0, 0xee01) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xfffffffb) openat(0xffffffffffffff9c, &(0x7f0000001740)='.\x00', 0x515001, 0x408) [ 324.200255][T16314] exc_page_fault+0x3eb/0x6d0 [ 324.205022][T16314] asm_exc_page_fault+0x26/0x30 [ 324.209886][T16314] RIP: 0033:0x7fe5c165cb00 [ 324.214299][T16314] Code: 1f 00 48 8b 70 08 48 39 72 f8 74 6e 48 89 d0 48 8d 52 08 48 39 d3 75 ea 48 29 eb 48 c1 fb 03 89 d8 4c 8d 6c c5 00 85 db 74 15 <49> 8b 7f 28 48 83 c5 08 03 7d f8 e8 30 e7 fe ff 49 39 ed 75 eb 41 [ 324.234076][T16314] RSP: 002b:00007ffd318da660 EFLAGS: 00010206 [ 324.240202][T16314] RAX: 000000000000069f RBX: 000000000000069f RCX: ffffffff84f50784 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) [ 324.248317][T16314] RDX: 00007fe5c1222000 RSI: ffffffff81078ced RDI: 00007fe5c1022008 [ 324.256338][T16314] RBP: 00007fe5c1022008 R08: 00007fe5c10220c8 R09: 0000000000000839 [ 324.264346][T16314] R10: 00000000814ada52 R11: 000000000000f1a0 R12: 0000001b33224468 [ 324.272410][T16314] R13: 00007fe5c1025500 R14: 00007fe5c17c3000 R15: 00007fe5c17cf018 [ 324.280406][T16314] ? xa_load+0xb4/0xe0 [ 324.284522][T16314] ? sched_clock+0xd/0x70 [ 324.288856][T16314] [ 324.292269][T16314] memory: usage 307200kB, limit 307200kB, failcnt 160 [ 324.299080][T16314] memory+swap: usage 307568kB, limit 9007199254740988kB, failcnt 0 [ 324.307015][T16314] kmem: usage 307100kB, limit 9007199254740988kB, failcnt 0 [ 324.314307][T16314] Memory cgroup stats for /syz1: [ 324.315166][T16314] cache 90112 [ 324.323469][T16314] rss 8192 [ 324.326668][T16314] shmem 0 [ 324.329640][T16314] mapped_file 0 [ 324.333157][T16314] dirty 86016 [ 324.336567][T16314] writeback 4096 [ 324.340132][T16314] workingset_refault_anon 55 [ 324.344789][T16314] workingset_refault_file 1 [ 324.349342][T16314] swap 376832 [ 324.352685][T16314] swapcached 12288 [ 324.356454][T16314] pgpgin 129554 [ 324.359931][T16314] pgpgout 129529 [ 324.363539][T16314] pgfault 192764 [ 324.367121][T16314] pgmajfault 84 [ 324.370630][T16314] inactive_anon 0 [ 324.374286][T16314] active_anon 0 [ 324.377980][T16314] inactive_file 53248 [ 324.381988][T16314] active_file 36864 [ 324.385906][T16314] unevictable 0 [ 324.389423][T16314] hierarchical_memory_limit 314572800 [ 324.394802][T16314] hierarchical_memsw_limit 9223372036854771712 [ 324.401128][T16314] total_cache 90112 [ 324.405068][T16314] total_rss 8192 [ 324.408619][T16314] total_shmem 0 [ 324.412111][T16314] total_mapped_file 0 [ 324.416142][T16314] total_dirty 86016 [ 324.419956][T16314] total_writeback 4096 [ 324.424124][T16314] total_workingset_refault_anon 55 [ 324.429339][T16314] total_workingset_refault_file 1 [ 324.434379][T16314] total_swap 376832 [ 324.438235][T16314] total_swapcached 12288 [ 324.442482][T16314] total_pgpgin 129554 [ 324.446521][T16314] total_pgpgout 129529 [ 324.450588][T16314] total_pgfault 192764 [ 324.454803][T16314] total_pgmajfault 84 [ 324.458921][T16314] total_inactive_anon 0 [ 324.463082][T16314] total_active_anon 0 [ 324.467084][T16314] total_inactive_file 53248 [ 324.471580][T16314] total_active_file 36864 [ 324.475998][T16314] total_unevictable 0 [ 324.480041][T16314] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=16314,uid=0 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) statx(r1, &(0x7f0000000300)='./file0/file0\x00', 0x1000, 0x0, 0xffffffffffffffff) executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000d00), r1) sendmsg$NFC_CMD_LLC_SET_PARAMS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001000000008000100", @ANYRES32=0x0, @ANYBLOB="060011006a28"], 0x2c}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x3e1, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015400500142603600e120800060000000401a80016004000014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @remote}, @in6={0xa, 0x0, 0x0, @mcast1}, @in6={0xa, 0x0, 0x0, @private0}, @in={0x2, 0x0, @multicast1}, @in6={0xa, 0x0, 0x0, @local}], 0x59) [ 324.495395][T16314] Memory cgroup out of memory: Killed process 16314 (syz-executor.1) total-vm:48388kB, anon-rss:512kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:1000 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x409c884, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='I', 0x1, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000001a80)=""/4096, 0x1000, 0x0, 0x0, 0x0) executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e00000010008108040f9becdb4cb92e0a28b137140000004abd6efb2503eaff0d00010002ff71bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) [ 324.568651][T16376] netlink: 'syz-executor.3': attribute type 21 has an invalid length. executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)) r3 = memfd_secret(0x0) ftruncate(r3, 0x5) finit_module(r3, 0x0, 0x0) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000680)={0xff}, &(0x7f0000000040), 0x0) [ 324.613466][T16382] batadv0: entered promiscuous mode [ 324.641356][T16382] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 324.780093][T16315] ================================================================== [ 324.788329][T16315] BUG: KCSAN: data-race in __mod_memcg_state / mem_cgroup_css_rstat_flush [ 324.796892][T16315] [ 324.799235][T16315] write to 0xffffe8ffffc42c40 of 4 bytes by task 16314 on cpu 1: [ 324.807082][T16315] mem_cgroup_css_rstat_flush+0x4ea/0x540 [ 324.812821][T16315] cgroup_rstat_flush_locked+0x848/0x980 [ 324.818488][T16315] cgroup_rstat_flush+0x26/0x40 [ 324.823382][T16315] mem_cgroup_flush_stats+0xb2/0xc0 [ 324.828634][T16315] shrink_node+0x2f2/0x15a0 [ 324.833181][T16315] do_try_to_free_pages+0x3cc/0xca0 [ 324.838431][T16315] try_to_free_mem_cgroup_pages+0x1eb/0x4e0 [ 324.844377][T16315] try_charge_memcg+0x279/0xd10 [ 324.849266][T16315] mem_cgroup_swapin_charge_folio+0x107/0x1a0 [ 324.855379][T16315] __read_swap_cache_async+0x2b9/0x520 [ 324.860871][T16315] swap_cluster_readahead+0x380/0x3f0 [ 324.866311][T16315] swapin_readahead+0xe2/0x7a0 [ 324.871143][T16315] do_swap_page+0x3bb/0x15f0 [ 324.875803][T16315] handle_mm_fault+0x7fa/0x27e0 [ 324.880689][T16315] exc_page_fault+0x3eb/0x6d0 [ 324.885415][T16315] asm_exc_page_fault+0x26/0x30 [ 324.890278][T16315] [ 324.892609][T16315] read-write to 0xffffe8ffffc42c40 of 4 bytes by task 16315 on cpu 0: [ 324.900767][T16315] __mod_memcg_state+0x10c/0x170 [ 324.905741][T16315] __vmalloc_node_range+0xa98/0xee0 [ 324.910975][T16315] kvmalloc_node+0x121/0x170 [ 324.915590][T16315] ip_set_alloc+0x1f/0x30 [ 324.919947][T16315] hash_netiface_create+0x277/0x740 [ 324.925166][T16315] ip_set_create+0x359/0x8a0 [ 324.929775][T16315] nfnetlink_rcv_msg+0x4a9/0x570 [ 324.934740][T16315] netlink_rcv_skb+0x12c/0x230 [ 324.939532][T16315] nfnetlink_rcv+0x170/0x13e0 [ 324.944234][T16315] netlink_unicast+0x58d/0x660 [ 324.949026][T16315] netlink_sendmsg+0x5d3/0x6e0 [ 324.953822][T16315] __sock_sendmsg+0x140/0x180 [ 324.958514][T16315] ____sys_sendmsg+0x312/0x410 [ 324.963292][T16315] __sys_sendmsg+0x1e9/0x280 [ 324.967911][T16315] __x64_sys_sendmsg+0x46/0x50 [ 324.972705][T16315] x64_sys_call+0xae9/0x2d30 [ 324.977320][T16315] do_syscall_64+0xcd/0x1d0 [ 324.981854][T16315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.987786][T16315] [ 324.990117][T16315] value changed: 0x00000004 -> 0x00000000 [ 324.995910][T16315] [ 324.998245][T16315] Reported by Kernel Concurrency Sanitizer on: [ 325.004501][T16315] CPU: 0 PID: 16315 Comm: syz-executor.1 Not tainted 6.9.0-rc6-syzkaller-00232-gddb4c3f25b7b #0 [ 325.014941][T16315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 325.025103][T16315] ================================================================== [ 325.303886][T16399] __nla_validate_parse: 16 callbacks suppressed [ 325.303903][T16399] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.342188][T16405] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 325.346446][T16407] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 325.350541][ T28] kauditd_printk_skb: 88 callbacks suppressed [ 325.350558][ T28] audit: type=1400 audit(1714783480.752:2485): avc: denied { append } for pid=16406 comm="syz-executor.2" name="sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 325.366403][T16405] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.1'. [ 327.792312][ T28] audit: type=1400 audit(1714783483.192:2486): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=39698 daddr=10.128.0.38 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1