85a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 51.435933][ T4375] bond_slave_1: left promiscuous mode [ 51.441409][ T4384] bond0: left promiscuous mode [ 51.448280][ T4384] bond_slave_0: left promiscuous mode [ 51.454808][ T4384] bond_slave_1: left promiscuous mode 09:26:51 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 51.491640][ T4395] bond0: entered promiscuous mode [ 51.496826][ T4395] bond_slave_0: entered promiscuous mode [ 51.502845][ T4395] bond_slave_1: entered promiscuous mode [ 51.508886][ T4396] bond0: entered promiscuous mode [ 51.513955][ T4396] bond_slave_0: entered promiscuous mode [ 51.519766][ T4396] bond_slave_1: entered promiscuous mode [ 51.527043][ T4401] bond0: entered promiscuous mode [ 51.532105][ T4401] bond_slave_0: entered promiscuous mode 09:26:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffd000), &(0x7f0000ffd000)) [ 51.537889][ T4401] bond_slave_1: entered promiscuous mode [ 51.544014][ T4403] bond0: entered promiscuous mode [ 51.549150][ T4403] bond_slave_0: entered promiscuous mode [ 51.554889][ T4403] bond_slave_1: entered promiscuous mode [ 51.561018][ T4404] bond0: entered promiscuous mode [ 51.566073][ T4404] bond_slave_0: entered promiscuous mode [ 51.571825][ T4404] bond_slave_1: entered promiscuous mode 09:26:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 51.748526][ T4408] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 51.807426][ T4401] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 51.877224][ T4405] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 51.901866][ T4411] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:52 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 51.921492][ T4412] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 51.942260][ T4414] bond0: entered promiscuous mode [ 51.947375][ T4414] bond_slave_0: entered promiscuous mode [ 51.953090][ T4414] bond_slave_1: entered promiscuous mode [ 51.959228][ T4392] bond0: left promiscuous mode [ 51.964031][ T4392] bond_slave_0: left promiscuous mode [ 51.969557][ T4392] bond_slave_1: left promiscuous mode 09:26:52 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.030726][ T4400] bond0: left promiscuous mode [ 52.035607][ T4400] bond_slave_0: left promiscuous mode [ 52.041210][ T4400] bond_slave_1: left promiscuous mode [ 52.053188][ T4417] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:52 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.078633][ T4393] bond0: left promiscuous mode [ 52.083450][ T4393] bond_slave_0: left promiscuous mode [ 52.092130][ T4393] bond_slave_1: left promiscuous mode [ 52.098908][ T4399] bond0: left promiscuous mode [ 52.103679][ T4399] bond_slave_0: left promiscuous mode [ 52.109301][ T4399] bond_slave_1: left promiscuous mode [ 52.169749][ T4419] bond0: entered promiscuous mode [ 52.174831][ T4419] bond_slave_0: entered promiscuous mode [ 52.180699][ T4419] bond_slave_1: entered promiscuous mode [ 52.186536][ T4402] bond0: left promiscuous mode [ 52.191369][ T4402] bond_slave_0: left promiscuous mode [ 52.196850][ T4402] bond_slave_1: left promiscuous mode [ 52.202720][ T4422] bond0: entered promiscuous mode [ 52.207771][ T4422] bond_slave_0: entered promiscuous mode [ 52.213607][ T4422] bond_slave_1: entered promiscuous mode 09:26:52 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.219898][ T4413] bond0: left promiscuous mode [ 52.224678][ T4413] bond_slave_0: left promiscuous mode [ 52.230219][ T4413] bond_slave_1: left promiscuous mode [ 52.235838][ T4428] bond0: entered promiscuous mode [ 52.240906][ T4428] bond_slave_0: entered promiscuous mode [ 52.246838][ T4428] bond_slave_1: entered promiscuous mode [ 52.253824][ T4427] bond0: entered promiscuous mode [ 52.258945][ T4427] bond_slave_0: entered promiscuous mode [ 52.264643][ T4427] bond_slave_1: entered promiscuous mode 09:26:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.274137][ T4429] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.332459][ T4422] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.418507][ T4436] bond0: entered promiscuous mode [ 52.423601][ T4436] bond_slave_0: entered promiscuous mode [ 52.429524][ T4436] bond_slave_1: entered promiscuous mode [ 52.440233][ T4444] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.454115][ T4438] bond0: entered promiscuous mode [ 52.459201][ T4438] bond_slave_0: entered promiscuous mode [ 52.464948][ T4438] bond_slave_1: entered promiscuous mode [ 52.477321][ T4427] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.498446][ T4440] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.511066][ T4418] bond0: left promiscuous mode 09:26:53 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.515996][ T4418] bond_slave_0: left promiscuous mode [ 52.521404][ T4418] bond_slave_1: left promiscuous mode 09:26:53 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.607652][ T4421] bond0: left promiscuous mode [ 52.612438][ T4421] bond_slave_0: left promiscuous mode [ 52.618024][ T4421] bond_slave_1: left promiscuous mode [ 52.629432][ T4445] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.654406][ T4425] bond0: left promiscuous mode [ 52.659290][ T4425] bond_slave_0: left promiscuous mode [ 52.664868][ T4425] bond_slave_1: left promiscuous mode [ 52.671042][ T4447] bond0: entered promiscuous mode [ 52.676179][ T4447] bond_slave_0: entered promiscuous mode [ 52.681976][ T4447] bond_slave_1: entered promiscuous mode [ 52.688404][ T4426] bond0: left promiscuous mode [ 52.693241][ T4426] bond_slave_0: left promiscuous mode [ 52.698761][ T4426] bond_slave_1: left promiscuous mode 09:26:53 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:53 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.704427][ T4434] bond0: left promiscuous mode [ 52.709374][ T4434] bond_slave_0: left promiscuous mode [ 52.714784][ T4434] bond_slave_1: left promiscuous mode [ 52.741311][ T4447] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 52.787457][ T4450] bond0: entered promiscuous mode [ 52.792589][ T4450] bond_slave_0: entered promiscuous mode [ 52.798342][ T4450] bond_slave_1: entered promiscuous mode 09:26:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 52.840070][ T4437] bond0: left promiscuous mode [ 52.844916][ T4437] bond_slave_0: left promiscuous mode [ 52.850425][ T4437] bond_slave_1: left promiscuous mode [ 52.897684][ T4454] bond0: entered promiscuous mode [ 52.902800][ T4454] bond_slave_0: entered promiscuous mode [ 52.908731][ T4454] bond_slave_1: entered promiscuous mode [ 52.948260][ T4458] bond0: entered promiscuous mode [ 52.953330][ T4458] bond_slave_0: entered promiscuous mode [ 52.959438][ T4458] bond_slave_1: entered promiscuous mode [ 52.968025][ T4459] bond0: entered promiscuous mode [ 52.973063][ T4459] bond_slave_0: entered promiscuous mode [ 52.978803][ T4459] bond_slave_1: entered promiscuous mode [ 52.989460][ T4450] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:53 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.005606][ T4446] bond0: left promiscuous mode [ 53.010393][ T4446] bond_slave_0: left promiscuous mode [ 53.015862][ T4446] bond_slave_1: left promiscuous mode [ 53.100563][ T4467] bond0: entered promiscuous mode [ 53.105723][ T4467] bond_slave_0: entered promiscuous mode [ 53.111451][ T4467] bond_slave_1: entered promiscuous mode [ 53.121796][ T4463] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.139897][ T4468] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.158990][ T4469] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.214208][ T4456] bond0: left promiscuous mode [ 53.219106][ T4456] bond_slave_0: left promiscuous mode [ 53.224614][ T4456] bond_slave_1: left promiscuous mode [ 53.233908][ T4472] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:53 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.260091][ T4474] bond0: entered promiscuous mode [ 53.265293][ T4474] bond_slave_0: entered promiscuous mode [ 53.271044][ T4474] bond_slave_1: entered promiscuous mode [ 53.277471][ T4449] bond0: left promiscuous mode [ 53.282273][ T4449] bond_slave_0: left promiscuous mode [ 53.287832][ T4449] bond_slave_1: left promiscuous mode 09:26:53 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.337889][ T4453] bond0: left promiscuous mode [ 53.342715][ T4453] bond_slave_0: left promiscuous mode [ 53.348172][ T4453] bond_slave_1: left promiscuous mode [ 53.358747][ T4477] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.391832][ T4486] bond0: entered promiscuous mode [ 53.396951][ T4486] bond_slave_0: entered promiscuous mode [ 53.402614][ T4486] bond_slave_1: entered promiscuous mode [ 53.409964][ T4457] bond0: left promiscuous mode [ 53.414725][ T4457] bond_slave_0: left promiscuous mode [ 53.420235][ T4457] bond_slave_1: left promiscuous mode [ 53.426565][ T4479] bond0: entered promiscuous mode [ 53.431646][ T4479] bond_slave_0: entered promiscuous mode 09:26:53 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.437414][ T4479] bond_slave_1: entered promiscuous mode [ 53.460478][ T4480] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.476515][ T4465] bond0: left promiscuous mode [ 53.481304][ T4465] bond_slave_0: left promiscuous mode [ 53.486819][ T4465] bond_slave_1: left promiscuous mode 09:26:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.492695][ T4482] bond0: entered promiscuous mode [ 53.497821][ T4482] bond_slave_0: entered promiscuous mode [ 53.503539][ T4482] bond_slave_1: entered promiscuous mode 09:26:54 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.599077][ T4473] bond0: left promiscuous mode [ 53.603874][ T4473] bond_slave_0: left promiscuous mode [ 53.609370][ T4473] bond_slave_1: left promiscuous mode [ 53.615345][ T4491] bond0: entered promiscuous mode [ 53.620391][ T4491] bond_slave_0: entered promiscuous mode [ 53.626259][ T4491] bond_slave_1: entered promiscuous mode [ 53.642473][ T4492] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.691964][ T4495] bond0: entered promiscuous mode [ 53.697114][ T4495] bond_slave_0: entered promiscuous mode [ 53.702887][ T4495] bond_slave_1: entered promiscuous mode [ 53.711982][ T4496] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.758142][ T4478] bond0: left promiscuous mode [ 53.762937][ T4478] bond_slave_0: left promiscuous mode [ 53.768425][ T4478] bond_slave_1: left promiscuous mode [ 53.779887][ T4499] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.837681][ T4502] bond0: entered promiscuous mode [ 53.842893][ T4502] bond_slave_0: entered promiscuous mode [ 53.848780][ T4502] bond_slave_1: entered promiscuous mode [ 53.860717][ T4503] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 53.876552][ T4481] bond0: left promiscuous mode [ 53.881324][ T4481] bond_slave_0: left promiscuous mode 09:26:54 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.886856][ T4481] bond_slave_1: left promiscuous mode 09:26:54 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.929544][ T4485] bond0: left promiscuous mode [ 53.934446][ T4485] bond_slave_0: left promiscuous mode [ 53.939954][ T4485] bond_slave_1: left promiscuous mode [ 53.945671][ T4507] bond0: entered promiscuous mode [ 53.950747][ T4507] bond_slave_0: entered promiscuous mode [ 53.956566][ T4507] bond_slave_1: entered promiscuous mode [ 53.966341][ T4508] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:54 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 53.986283][ T4490] bond0: left promiscuous mode [ 53.991143][ T4490] bond_slave_0: left promiscuous mode [ 53.996624][ T4490] bond_slave_1: left promiscuous mode 09:26:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.041582][ T4494] bond0: left promiscuous mode [ 54.046482][ T4494] bond_slave_0: left promiscuous mode [ 54.051985][ T4494] bond_slave_1: left promiscuous mode [ 54.059281][ T4512] bond0: entered promiscuous mode [ 54.064330][ T4512] bond_slave_0: entered promiscuous mode [ 54.070084][ T4512] bond_slave_1: entered promiscuous mode [ 54.080455][ T4507] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 54.107768][ T4515] bond0: entered promiscuous mode [ 54.112813][ T4515] bond_slave_0: entered promiscuous mode [ 54.118603][ T4515] bond_slave_1: entered promiscuous mode 09:26:54 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.157896][ T4501] bond0: left promiscuous mode [ 54.162693][ T4501] bond_slave_0: left promiscuous mode [ 54.168187][ T4501] bond_slave_1: left promiscuous mode [ 54.174004][ T4519] bond0: entered promiscuous mode [ 54.179132][ T4519] bond_slave_0: entered promiscuous mode [ 54.184873][ T4519] bond_slave_1: entered promiscuous mode [ 54.208688][ T4512] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 54.253617][ T4523] bond0: entered promiscuous mode [ 54.258799][ T4523] bond_slave_0: entered promiscuous mode [ 54.264515][ T4523] bond_slave_1: entered promiscuous mode [ 54.274309][ T4515] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.323288][ T4506] bond0: left promiscuous mode [ 54.328197][ T4506] bond_slave_0: left promiscuous mode [ 54.333646][ T4506] bond_slave_1: left promiscuous mode [ 54.343397][ T4519] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:54 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.404824][ T4528] bond0: entered promiscuous mode [ 54.410123][ T4528] bond_slave_0: entered promiscuous mode [ 54.415940][ T4528] bond_slave_1: entered promiscuous mode [ 54.424569][ T4516] bond0: left promiscuous mode [ 54.429494][ T4516] bond_slave_0: left promiscuous mode [ 54.434933][ T4516] bond_slave_1: left promiscuous mode [ 54.444397][ T4523] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:54 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.467785][ T4511] bond0: left promiscuous mode [ 54.472596][ T4511] bond_slave_0: left promiscuous mode [ 54.478207][ T4511] bond_slave_1: left promiscuous mode 09:26:55 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.531419][ T4513] bond0: left promiscuous mode [ 54.536248][ T4513] bond_slave_0: left promiscuous mode [ 54.541779][ T4513] bond_slave_1: left promiscuous mode [ 54.547453][ T4533] bond0: entered promiscuous mode [ 54.552578][ T4533] bond_slave_0: entered promiscuous mode [ 54.559900][ T4533] bond_slave_1: entered promiscuous mode [ 54.612062][ T4534] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 54.632949][ T4537] bond0: entered promiscuous mode [ 54.638091][ T4537] bond_slave_0: entered promiscuous mode [ 54.643917][ T4537] bond_slave_1: entered promiscuous mode 09:26:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.683795][ T4540] bond0: entered promiscuous mode [ 54.688902][ T4540] bond_slave_0: entered promiscuous mode [ 54.694634][ T4540] bond_slave_1: entered promiscuous mode [ 54.702372][ T4522] bond0: left promiscuous mode [ 54.707283][ T4522] bond_slave_0: left promiscuous mode [ 54.712691][ T4522] bond_slave_1: left promiscuous mode [ 54.722161][ T4542] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 54.772894][ T4546] bond0: entered promiscuous mode [ 54.778067][ T4546] bond_slave_0: entered promiscuous mode [ 54.783924][ T4546] bond_slave_1: entered promiscuous mode [ 54.828371][ T4547] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 54.849358][ T4543] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:55 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:55 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.898235][ T4536] bond0: left promiscuous mode [ 54.903068][ T4536] bond_slave_0: left promiscuous mode [ 54.908678][ T4536] bond_slave_1: left promiscuous mode [ 54.915019][ T4527] bond0: left promiscuous mode [ 54.919857][ T4527] bond_slave_0: left promiscuous mode [ 54.925381][ T4527] bond_slave_1: left promiscuous mode [ 54.934592][ T4549] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 54.958380][ T4551] bond0: entered promiscuous mode [ 54.963409][ T4551] bond_slave_0: entered promiscuous mode [ 54.969446][ T4551] bond_slave_1: entered promiscuous mode [ 54.976405][ T4532] bond0: left promiscuous mode [ 54.981252][ T4532] bond_slave_0: left promiscuous mode [ 54.986694][ T4532] bond_slave_1: left promiscuous mode [ 55.000859][ T4552] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.024565][ T4539] bond0: left promiscuous mode [ 55.029523][ T4539] bond_slave_0: left promiscuous mode [ 55.034937][ T4539] bond_slave_1: left promiscuous mode [ 55.040529][ T4554] bond0: entered promiscuous mode [ 55.045637][ T4554] bond_slave_0: entered promiscuous mode [ 55.051299][ T4554] bond_slave_1: entered promiscuous mode [ 55.057275][ T4556] bond0: entered promiscuous mode [ 55.062390][ T4556] bond_slave_0: entered promiscuous mode [ 55.068131][ T4556] bond_slave_1: entered promiscuous mode 09:26:55 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 55.073980][ T4558] bond0: entered promiscuous mode [ 55.079198][ T4558] bond_slave_0: entered promiscuous mode [ 55.085016][ T4558] bond_slave_1: entered promiscuous mode [ 55.090887][ T4545] bond0: left promiscuous mode [ 55.095722][ T4545] bond_slave_0: left promiscuous mode [ 55.101347][ T4545] bond_slave_1: left promiscuous mode [ 55.109125][ T4563] bond0: entered promiscuous mode [ 55.114176][ T4563] bond_slave_0: entered promiscuous mode 09:26:55 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 55.120071][ T4563] bond_slave_1: entered promiscuous mode 09:26:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 55.166937][ T4550] bond0: left promiscuous mode [ 55.172131][ T4550] bond_slave_0: left promiscuous mode [ 55.177619][ T4550] bond_slave_1: left promiscuous mode [ 55.279397][ T4559] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.303246][ T4565] bond0: entered promiscuous mode [ 55.308384][ T4565] bond_slave_0: entered promiscuous mode [ 55.314037][ T4565] bond_slave_1: entered promiscuous mode [ 55.322720][ T4560] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.339908][ T4561] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.388758][ T4568] bond0: entered promiscuous mode [ 55.393856][ T4568] bond_slave_0: entered promiscuous mode [ 55.399695][ T4568] bond_slave_1: entered promiscuous mode [ 55.414087][ T4570] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:56 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 55.503332][ T4574] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.524268][ T4553] bond0: left promiscuous mode [ 55.529250][ T4553] bond_slave_0: left promiscuous mode [ 55.534794][ T4553] bond_slave_1: left promiscuous mode [ 55.544517][ T4575] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.566171][ T4555] bond0: left promiscuous mode [ 55.570965][ T4555] bond_slave_0: left promiscuous mode [ 55.576406][ T4555] bond_slave_1: left promiscuous mode [ 55.583358][ T4557] bond0: left promiscuous mode [ 55.588176][ T4557] bond_slave_0: left promiscuous mode [ 55.593592][ T4557] bond_slave_1: left promiscuous mode [ 55.599253][ T4562] bond0: left promiscuous mode [ 55.604051][ T4562] bond_slave_0: left promiscuous mode [ 55.609545][ T4562] bond_slave_1: left promiscuous mode 09:26:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:56 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:56 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c0000002100000225bd70abb503c1aa02d5bcf8295b2fd125db000100000809003400080002007f80000108000200ac1e010108000200ac14142008000b00060000005b8d5fc010b751644226d0c489028dfd6539b8859c0b7ccb74485f226bee6c377871a44e00d19985b8ffccd2339325a43258ff93a0ed7e16e9ff19f6bc4bbb1d8100d0c6be85134796334153ed4b70624d9538d8ffffffffc99ccd4fc58389a5c54909c1f035d2c18cf59b769558a0ec8cc53c4fff001a00accac04c6fc5af92d0cde682915bfc66d630b18cfd7f1ce446179e3726cc9d40ea83e6630b139d431677b0cb0d0b9733fc8b287f64377c21818ffeac80192a2f3f8a609cab321c7918ac05651ecbdf84223d3c2910fe95f6"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:56 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 55.615520][ T4577] bond0: entered promiscuous mode [ 55.620569][ T4577] bond_slave_0: entered promiscuous mode [ 55.626285][ T4577] bond_slave_1: entered promiscuous mode [ 55.632508][ T4564] bond0: left promiscuous mode [ 55.637445][ T4564] bond_slave_0: left promiscuous mode [ 55.642854][ T4564] bond_slave_1: left promiscuous mode [ 55.714886][ T4567] bond0: left promiscuous mode [ 55.719709][ T4567] bond_slave_0: left promiscuous mode [ 55.725290][ T4567] bond_slave_1: left promiscuous mode [ 55.733656][ T4581] bond0: entered promiscuous mode [ 55.738746][ T4581] bond_slave_0: entered promiscuous mode [ 55.744440][ T4581] bond_slave_1: entered promiscuous mode [ 55.750581][ T4582] bond0: entered promiscuous mode [ 55.755644][ T4582] bond_slave_0: entered promiscuous mode 09:26:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="32030000000000000100c20410e1ff1fc2040000000400010000001479a0de49515c8f84ad86e418b97c59467ab04057f0b74e1774d33e4806592418cc72dc87797fcd8362325d6b39020000000000000000000000006cc536b2f8f5a67d86a500136efe56ec824f9a23089cce2a235a92e6fdd313637e6aa476274795da131bc7da8880ca7fcd74cc7196e076434e5700399ad0797ec02e4000579c89d101e17bc186851aa97173a07d5505f905ae9659810d268bd700800000a6e405d51e4a65dca5455ec175581c786d2b1f9b554f9676b48ca6eb1d2d2db1cc27965b827dafff54e9fec73631fdd8406a8343889472068200d24e0000d6673857d0a98d76"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 55.761366][ T4582] bond_slave_1: entered promiscuous mode [ 55.767812][ T4584] bond0: entered promiscuous mode [ 55.772840][ T4584] bond_slave_0: entered promiscuous mode [ 55.778611][ T4584] bond_slave_1: entered promiscuous mode [ 55.789950][ T4586] bond0: entered promiscuous mode [ 55.795038][ T4586] bond_slave_0: entered promiscuous mode [ 55.800827][ T4586] bond_slave_1: entered promiscuous mode [ 55.843632][ T4578] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 55.893791][ T4592] bond0: entered promiscuous mode [ 55.898899][ T4592] bond_slave_0: entered promiscuous mode [ 55.904642][ T4592] bond_slave_1: entered promiscuous mode [ 55.981449][ T4582] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 56.007811][ T4593] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:56 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 56.027273][ T4590] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 56.044559][ T4589] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 56.059859][ T4576] bond0: left promiscuous mode [ 56.064700][ T4576] bond_slave_0: left promiscuous mode [ 56.070297][ T4576] bond_slave_1: left promiscuous mode [ 56.143159][ T4595] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 56.159205][ T4580] bond0: left promiscuous mode [ 56.164008][ T4580] bond_slave_0: left promiscuous mode [ 56.169558][ T4580] bond_slave_1: left promiscuous mode [ 56.177470][ T4597] bond0: entered promiscuous mode [ 56.182545][ T4597] bond_slave_0: entered promiscuous mode 09:26:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffd000), &(0x7f0000ffd000)) 09:26:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150700000fff07003506000002000000170600000ee50000bf250000000000001f650000000000006507000002000000070700004c0001000f75000000000000bf54000000000000070400000400f9ff2d3501000000000095000000000000000500000000000000950007000000000001722fabb733a0c857c7c45402000000a2d23da04d1ffc187fa1a2ba7ba030c7267c2de00435fd233cc0f0d9b2c3127c46b0f408398d09ee4dc258d726eae098804de25df627a64ac7efde50fd7f1dd5b17ed764c33b06598bae66ea38541a7cd29032de94983dfab0e5043daf1b46bef5135c65377bdbe65d525743d88ef4b2ee62652b07f8a4b6e6155cecc13a5ddfab726eca91bd5fecb254ab358488c400330171128be291297947d474c570a385a459db8e7ada8ee987cc0000f6"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0200699cca08eec82cd43972490f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 56.188295][ T4597] bond_slave_1: entered promiscuous mode [ 56.194313][ T4585] bond0: left promiscuous mode [ 56.199109][ T4585] bond_slave_0: left promiscuous mode [ 56.204597][ T4585] bond_slave_1: left promiscuous mode [ 56.210105][ T4579] bond0: left promiscuous mode [ 56.214875][ T4579] bond_slave_0: left promiscuous mode [ 56.220645][ T4579] bond_slave_1: left promiscuous mode [ 56.226347][ T4583] bond0: left promiscuous mode [ 56.231132][ T4583] bond_slave_0: left promiscuous mode [ 56.236602][ T4583] bond_slave_1: left promiscuous mode 09:26:56 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8916, 0x0) 09:26:56 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 09:26:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0200699cca08eec82cd43972490f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 09:26:56 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8916, 0x0) 09:26:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150700000fff07003506000002000000170600000ee50000bf250000000000001f650000000000006507000002000000070700004c0001000f75000000000000bf54000000000000070400000400f9ff2d3501000000000095000000000000000500000000000000950007000000000001722fabb733a0c857c7c45402000000a2d23da04d1ffc187fa1a2ba7ba030c7267c2de00435fd233cc0f0d9b2c3127c46b0f408398d09ee4dc258d726eae098804de25df627a64ac7efde50fd7f1dd5b17ed764c33b06598bae66ea38541a7cd29032de94983dfab0e5043daf1b46bef5135c65377bdbe65d525743d88ef4b2ee62652b07f8a4b6e6155cecc13a5ddfab726eca91bd5fecb254ab358488c400330171128be291297947d474c570a385a459db8e7ada8ee987cc0000f6"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0200699cca08eec82cd43972490f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 09:26:56 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8916, 0x0) 09:26:56 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xc, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xc8, &(0x7f00000003c0)=""/200, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:26:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffd000), &(0x7f0000ffd000)) [ 56.353042][ T4597] 8021q: adding VLAN 0 to HW filter on device macvlan2 09:26:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x9, 0xc}, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x9, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x976, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xa, 0x141800, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[r0, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x10880) r5 = socket(0x1, 0x803, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r3}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x28) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x821, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01001800000000000000c3000000c300000005000000040000000500000f0300000005000000050000002800000005000000ab050000018000000300000001000000d3fa000004000000080000000000000004000000030000008e0e0000c8a1100400000005000085a70700000100000005000000000000000200000003000000040000000600000004000000e10e23390100000000000000020000201000000004000000000800000700000002000000000000000200000004000000010000000000000000000003000000000200000003005b0de0b7000000002e5f5f00"], &(0x7f0000000b80)=""/122, 0xe1, 0x7a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x10, 0x6, 0x101, 0xfffffffa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r8, 0x2, 0x0, 0x4}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000c80) sendmsg$nl_route(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400"/20], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x32822}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_WEIGHT={0x8, 0xf, 0xfdfffffc}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x7994}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 56.409813][ T4591] bond0: left promiscuous mode [ 56.414692][ T4591] bond_slave_0: left promiscuous mode [ 56.420230][ T4591] bond_slave_1: left promiscuous mode [ 56.425836][ T4603] bond0: entered promiscuous mode [ 56.430935][ T4603] bond_slave_0: entered promiscuous mode [ 56.436775][ T4603] bond_slave_1: entered promiscuous mode 09:26:57 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xc, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xc8, &(0x7f00000003c0)=""/200, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:26:57 executing program 3: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffd000), &(0x7f0000ffd000)) [ 56.471048][ T4623] bond0: entered promiscuous mode [ 56.476283][ T4623] bond_slave_0: entered promiscuous mode [ 56.482089][ T4623] bond_slave_1: entered promiscuous mode [ 56.488144][ T4596] bond0: left promiscuous mode [ 56.492950][ T4596] bond_slave_0: left promiscuous mode [ 56.498514][ T4596] bond_slave_1: left promiscuous mode [ 56.556307][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 56.556318][ T26] audit: type=1400 audit(1693214817.044:162): avc: denied { create } for pid=4628 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.579678][ T4612] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 56.609128][ T26] audit: type=1400 audit(1693214817.074:163): avc: denied { connect } for pid=4628 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.629086][ T26] audit: type=1400 audit(1693214817.074:164): avc: denied { ioctl } for pid=4628 comm="syz-executor.5" path="socket:[22314]" dev="sockfs" ino=22314 ioctlcmd=0x7453 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 09:26:57 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xc, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xc8, &(0x7f00000003c0)=""/200, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:26:57 executing program 3: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) [ 56.720428][ T4630] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 56.738107][ T4602] bond0: left promiscuous mode [ 56.742938][ T4602] bond_slave_0: left promiscuous mode [ 56.748496][ T4602] bond_slave_1: left promiscuous mode 09:26:57 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xc, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xc8, &(0x7f00000003c0)=""/200, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:26:57 executing program 3: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) [ 56.804758][ T4622] bond0: left promiscuous mode [ 56.809671][ T4622] bond_slave_0: left promiscuous mode [ 56.815148][ T4622] bond_slave_1: left promiscuous mode 09:26:57 executing program 4: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 3: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:26:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:57 executing program 4: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 09:26:57 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:26:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:57 executing program 4: setresuid(0x0, 0xee00, 0xee00) ioprio_set$uid(0x0, 0xee01, 0x2007) 09:26:57 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:26:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:57 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) [ 57.078260][ T4680] loop3: detected capacity change from 0 to 8192 [ 57.086308][ T4680] ======================================================= [ 57.086308][ T4680] WARNING: The mand mount option has been deprecated and [ 57.086308][ T4680] and is ignored by this kernel. Remove the mand [ 57.086308][ T4680] option from the mount to silence this warning. [ 57.086308][ T4680] ======================================================= [ 57.124284][ T26] audit: type=1400 audit(1693214817.604:165): avc: denied { mount } for pid=4673 comm="syz-executor.3" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 09:26:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:58 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:26:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:26:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 57.842579][ T26] audit: type=1400 audit(1693214818.324:166): avc: denied { unmount } for pid=3118 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 09:26:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 57.993959][ T4714] loop1: detected capacity change from 0 to 8192 [ 57.997739][ T4708] loop5: detected capacity change from 0 to 8192 [ 58.035107][ T4715] loop0: detected capacity change from 0 to 8192 [ 58.057463][ T4718] loop4: detected capacity change from 0 to 8192 [ 58.069653][ T4719] loop3: detected capacity change from 0 to 8192 09:26:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:26:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 59.028419][ T4728] loop5: detected capacity change from 0 to 8192 [ 59.038794][ T4730] loop2: detected capacity change from 0 to 8192 [ 59.085094][ T4732] loop1: detected capacity change from 0 to 8192 [ 59.131067][ T4729] loop0: detected capacity change from 0 to 8192 [ 59.135545][ T4736] loop4: detected capacity change from 0 to 8192 [ 59.160185][ T4734] loop3: detected capacity change from 0 to 8192 09:27:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 60.072102][ T4744] loop0: detected capacity change from 0 to 8192 [ 60.099727][ T4747] loop2: detected capacity change from 0 to 8192 [ 60.137693][ T4749] loop1: detected capacity change from 0 to 8192 [ 60.147000][ T4754] loop3: detected capacity change from 0 to 8192 [ 60.147277][ T4750] loop5: detected capacity change from 0 to 8192 [ 60.160724][ T4753] loop4: detected capacity change from 0 to 8192 09:27:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 61.156541][ T4765] loop5: detected capacity change from 0 to 8192 [ 61.172245][ T4763] loop0: detected capacity change from 0 to 8192 [ 61.202348][ T4770] loop3: detected capacity change from 0 to 8192 [ 61.211371][ T4768] loop2: detected capacity change from 0 to 8192 [ 61.219326][ T4771] loop1: detected capacity change from 0 to 8192 [ 61.254637][ T4773] loop4: detected capacity change from 0 to 8192 09:27:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 62.247545][ T4781] loop0: detected capacity change from 0 to 8192 [ 62.253495][ T4790] loop4: detected capacity change from 0 to 8192 [ 62.266920][ T4783] loop5: detected capacity change from 0 to 8192 [ 62.295918][ T4786] loop1: detected capacity change from 0 to 8192 [ 62.311037][ T4788] loop3: detected capacity change from 0 to 8192 [ 62.332682][ T4792] loop2: detected capacity change from 0 to 8192 09:27:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 63.258728][ T4800] loop0: detected capacity change from 0 to 8192 [ 63.322218][ T4802] loop5: detected capacity change from 0 to 8192 [ 63.348932][ T4810] loop4: detected capacity change from 0 to 8192 [ 63.352124][ T4807] loop1: detected capacity change from 0 to 8192 [ 63.356539][ T4809] loop2: detected capacity change from 0 to 8192 [ 63.372540][ T4805] loop3: detected capacity change from 0 to 8192 09:27:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c070000000100000000000000b684f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f06ac2c535f630259450a58e69d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d4d31d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638b3a835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c35bb2183634a33b18c4b455ab222d70600000000006651be493328a803d1b56126efec0225a5433883b7a3bf4375a979c88ac0915f2178bf985c1aecd0d8eeb0d17cb21dbfd886caf2624ed505da0ef9893ef57c79a182dceca9c46a9f8b151e53b29c0c698ed30d8942e94ac0895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:27:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) [ 64.270463][ T4818] loop0: detected capacity change from 0 to 8192 09:27:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:27:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:27:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) 09:27:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) dup3(r1, r2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./bus\x00', 0x6000084) [ 64.382416][ T4820] loop5: detected capacity change from 0 to 8192 [ 64.407602][ T4824] loop2: detected capacity change from 0 to 8192 [ 64.423879][ T4828] loop4: detected capacity change from 0 to 8192 09:27:04 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:27:05 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:27:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) 09:27:05 executing program 1: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 09:27:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb70, &(0x7f0000000c40)="$eJzs3cFrHNUfAPDvzG7StOnvl20VsYIY8NBCcZO0WmjpofXiRVDQiwjimqQ1dNtKk0IbCm5B8CR48CQoiH+CZ6HoxaOIB/sfSKGUWi8eSmRmZ9O12U2aZrdTks8HZve9ebt93yl8973ZeZsJYMeazB7SiAMR8WUSMVHsTyNiNC+NRbTar7t399rs33evzSaxsvLOnSSSYl/n30qK5/HsoZq/M377KWJ/ZW2/i1eXzzWazflLRX1q6fwnU4tXl19ZON84O392/sLR12Zmjk0fmT52fGDH+sfyzV9/OfnWM99cvv/18gfH30jiVOwt2rqPY1AmY3L1/6RbNSLeG3RnJakUx9PrOAEAePqkXXO4AzERlbzUNhH1hVKDAwAAAAbi04hYAQAAALa5xPk/AAAAbHOddQD37l6b7WzlrkgAnpTbpyOi1iv/q9HKn8diJCL23Eu6fhnU/r13bQD9T0bElfc//zHbYki/wwd6a12PiOd75X+S538t/ysea/M/jYjpAfQ/+VBd/sOTs5X8PzWA/uU/AAAAAAAADM6N0+0L+Wuv/6Wr63+ix/W/So9rd49j4+t/6a0BdAP0cPt0xMme63/TzktqlaL2v3w9wEhyZqE5Px0R/4+IQzGyK6vPrNPH4S++fb1fW/f6v2zL+u+sBSziuFXd9d/3zDWWGls5ZqDt9vWIF6r91/9k43/SZ/3v24/Yx9krd57r17Zx/gPDsvJdxMGe4/+DO7ol69+fbyqfD0x1ZgVr7f/5sy2M/8CwZOP/nvXzv5Z0369zcfN9/P7i/ZV+bY87/x9N3s3vKjpa7LvSWFq6NBMxmry5dv+RzccM21EnHzr5kuX/oZfX//6v1/w/S7IPi0+JNCIaxXNW/+ihPv/5vvVDv3iM/1CeLP/nNjX+b76wMP7xX/36f7Tx/9V8TD9U7PH9H6zvURO07DgBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgaZJGxN5I0vpqOU3r9YjxiHg29qTNi4tLh89cvHxhLmuLqMVIemahOT8dERPtepLVZ/Lyg/qRh+pHI2JfRHw1sTuv12cvNufKPngAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABWjUfE3kjSekSkeTlN6/V2258TZUcHAAAADEyt7AAAAACAoXP+DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAW7Xvpxs0kIlondudbZrRoGyk1MmDY0rIDAEpTKTsAoDTVsgMASuMcH0g2aB/r22IGAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALCTHDxw42YSEa0Tu/MtM1q0jZQaGTBsadkBAKWplB0AUJpq2QEApXGODyQbtI/1bTGDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANhJFq8un2s0m/OXFBQUFFYLZX8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsJ39GwAA///fjgt3") 09:27:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) [ 65.217768][ T4846] loop0: detected capacity change from 0 to 8192 09:27:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) 09:27:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) 09:27:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) 09:27:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) 09:27:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x4b65, 0x0) [ 65.381072][ T4859] loop2: detected capacity change from 0 to 4096 [ 65.432454][ T4859] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.434842][ T4861] loop4: detected capacity change from 0 to 8192 [ 65.465303][ T26] audit: type=1400 audit(1693214825.944:167): avc: denied { mount } for pid=4857 comm="syz-executor.2" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 65.476159][ T4853] loop5: detected capacity change from 0 to 8192 [ 65.490182][ T26] audit: type=1400 audit(1693214825.954:168): avc: denied { unmount } for pid=3085 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 65.495800][ T3085] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) [ 66.142007][ T4875] loop0: detected capacity change from 0 to 8192 09:27:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/387, @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x0, 0x12}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0xffffff1f}, 0x20}}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400), 0x10) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x8e, &(0x7f0000000280)=""/142, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0xa, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r4, r5, r2, 0xffffffffffffffff]}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, r7, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), r6) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001280)={{r6}, r8, 0x0, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1f, 0x800, {0x8}}}, @subvolid}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0xf000) 09:27:06 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) 09:27:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb70, &(0x7f0000000c40)="$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") 09:27:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:06 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) [ 66.269690][ T26] audit: type=1400 audit(1693214826.754:169): avc: denied { create } for pid=4880 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 66.325649][ T26] audit: type=1400 audit(1693214826.784:170): avc: denied { read } for pid=4880 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 66.347608][ T4885] loop2: detected capacity change from 0 to 4096 09:27:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb70, &(0x7f0000000c40)="$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") 09:27:06 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) 09:27:06 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) [ 66.366047][ T4885] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.390637][ T3085] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 66.475480][ T4879] loop5: detected capacity change from 0 to 8192 [ 66.494466][ T4892] loop4: detected capacity change from 0 to 8192 [ 66.529994][ T4900] loop2: detected capacity change from 0 to 4096 [ 66.542775][ T4900] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.574919][ T3085] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb70, &(0x7f0000000c40)="$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") [ 67.065231][ T4905] loop2: detected capacity change from 0 to 4096 [ 67.096959][ T4905] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 09:27:07 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) [ 67.137150][ T3085] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:07 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:07 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 09:27:07 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) 09:27:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:07 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:07 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x80002020, 0x0, 0x0) 09:27:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x201, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x8000000000000000}}]}, 0x54}}, 0x0) 09:27:07 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) [ 67.254881][ T26] audit: type=1400 audit(1693214827.734:171): avc: denied { getopt } for pid=4913 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 09:27:07 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 09:27:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:07 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:07 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) [ 67.333125][ T26] audit: type=1400 audit(1693214827.814:172): avc: denied { read } for pid=4929 comm="syz-executor.4" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 67.358596][ T26] audit: type=1400 audit(1693214827.824:173): avc: denied { open } for pid=4929 comm="syz-executor.4" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 09:27:07 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:07 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) [ 67.388856][ T26] audit: type=1400 audit(1693214827.844:174): avc: denied { read write } for pid=4929 comm="syz-executor.4" name="rdma_cm" dev="devtmpfs" ino=225 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.412452][ T26] audit: type=1400 audit(1693214827.844:175): avc: denied { open } for pid=4929 comm="syz-executor.4" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=225 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 09:27:07 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 09:27:07 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 09:27:07 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:07 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) [ 67.437386][ T26] audit: type=1400 audit(1693214827.864:176): avc: denied { create } for pid=4929 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 09:27:07 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 09:27:08 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 09:27:08 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup3(r0, r3, 0x0) r5 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000100)) 09:27:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) 09:27:08 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$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") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) 09:27:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) 09:27:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) 09:27:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) 09:27:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) [ 68.121990][ T5086] loop3: detected capacity change from 0 to 512 09:27:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) 09:27:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x22, &(0x7f0000000040)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000100), 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/dmi', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x3) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x88, [0x1, 0x7, 0x5, 0x9, 0x100, 0x1ff], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/136}, &(0x7f0000000240)=0x78) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001b00)={'erspan0\x00', &(0x7f0000001a80)={'tunl0\x00', r2, 0x1, 0x8, 0x2, 0x1, {{0x14, 0x4, 0x0, 0x9, 0x50, 0x64, 0x0, 0x3, 0x2f, 0x0, @local, @private=0xa010102, {[@timestamp_prespec={0x44, 0x1c, 0x9e, 0x3, 0x0, [{@local, 0x5}, {@local, 0x1f}, {@remote, 0x8001}]}, @rr={0x7, 0x1f, 0xad, [@loopback, @loopback, @rand_addr=0x64010100, @multicast1, @remote, @multicast1, @rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003180)={'tunl0\x00', &(0x7f0000003080)={'syztnl2\x00', r5, 0x7, 0x7800, 0x6a3, 0x5, {{0x29, 0x4, 0x3, 0x31, 0xa4, 0x67, 0x0, 0x1, 0x4, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x44, 0xa8, 0x3, 0x2, [{@loopback}, {@private=0xa010101, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@rand_addr=0x64010100, 0x80000000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010102, 0x7fff}, {@local, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}, @end, @end, @timestamp={0x44, 0x14, 0x4, 0x0, 0x9, [0x5, 0xfffffffe, 0x1b, 0x2]}, @noop, @lsrr={0x83, 0x13, 0x2a, [@empty, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @multicast1]}, @ssrr={0x89, 0xb, 0x73, [@loopback, @local]}, @ssrr={0x89, 0x17, 0x57, [@broadcast, @loopback, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) r6 = accept$inet(r3, 0x0, 0x0) r7 = mq_open(&(0x7f0000000080)='$((^\x00', 0x40, 0x6, &(0x7f00000000c0)={0x1f, 0xffff, 0x7, 0x2}) dup2(r7, r6) readv(r6, 0x0, 0x0) signalfd4(r6, &(0x7f00000003c0)={[0x1ff]}, 0x8, 0x0) getsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000002ec0), &(0x7f0000002f00)=0x4) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000400)) flistxattr(r6, &(0x7f0000000000)=""/52, 0x34) lseek(r6, 0x90b, 0x0) preadv2(r6, &(0x7f0000002d00)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/203, 0xcb}, {&(0x7f0000002f40)=""/148, 0x94}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/154, 0x9a}], 0x2b, 0x40, 0xffffffc0, 0x2) r8 = signalfd(r4, &(0x7f0000002dc0)={[0x1]}, 0x8) accept4(r8, &(0x7f0000002e00)=@in={0x2, 0x0, @empty}, &(0x7f0000002e80)=0x80, 0x80000) [ 68.205747][ T5086] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 09:27:08 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$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") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x541c, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x0, 0x0, "5a755b38bfb6ab3f147250aac5d3be15d197df"}) 09:27:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4, 0x7, 0x0, 0x0}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 09:27:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4, 0x7, 0x0, 0x0}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 09:27:08 executing program 5: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$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") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) [ 68.250727][ T5086] ext4 filesystem being mounted at /root/syzkaller-testdir1615701204/syzkaller.Bpisdu/124/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.282044][ T3118] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:08 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x50, 0x3a, 0x0, @dev, @local, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "283e82", 0x0, 0x33, 0x0, @private1, @private0, [@dstopts={0x2f, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}]}]}}}}}}}, 0x0) 09:27:08 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x50, 0x3a, 0x0, @dev, @local, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "283e82", 0x0, 0x33, 0x0, @private1, @private0, [@dstopts={0x2f, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}]}]}}}}}}}, 0x0) [ 68.357949][ T5128] loop5: detected capacity change from 0 to 512 [ 68.391256][ T5136] loop3: detected capacity change from 0 to 512 [ 68.411196][ T5128] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 68.425045][ T5128] ext4 filesystem being mounted at /root/syzkaller-testdir3304125490/syzkaller.85tRR7/128/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.425919][ T5136] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 68.462284][ T5136] ext4 filesystem being mounted at /root/syzkaller-testdir1615701204/syzkaller.Bpisdu/125/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.462530][ T3076] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:09 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$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") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4, 0x7, 0x0, 0x0}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 09:27:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200000800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000040)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='ext4_alloc_da_blocks\x00', r0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 09:27:09 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x50, 0x3a, 0x0, @dev, @local, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "283e82", 0x0, 0x33, 0x0, @private1, @private0, [@dstopts={0x2f, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}]}]}}}}}}}, 0x0) 09:27:09 executing program 5: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$eJzs3c9vVFsdAPDvvW1pKYUWJfFHVBBRNISZdoCGsMKNxhASI3HlAmo7NE1nOk1nirSyKP+DiSSu9E9wYeLChJV7d7pzgwsTVOILfclbzMudmZZSOm3fo8x96Xw+ycm9555hvt/D9J4zPW3nBNC3LkTERkSciIgHETHeuZ50Stxul+xxr189md189WQ2iWbz3n+TVnt2LXb8m8ypznOORMTPfhzxy+TduPW19cWZSqW80qkXG9XlYn1t/epCdWa+PF9eKpWmp6Ynb167UTqyvp6v/vHljxbu/Pwvf/7mi79t/ODXWVpjnbad/ThK7a4PbcfJDEbEnQ8RLAcDnf6cyDsRPpc0Ir4UERez+7+ZdzYAQC80m+PRHN9ZBwCOu7S1Bpakhc5awFikaaHQXsM7F6NppVZvXHlYW12aa6+VTcRQ+nChUp7srBVOxFCS1ada52/qpV31axFxNiJ+M3yyVS/M1ipzeb7xAYA+dmrX/P/RcHv+BwCOuZG8EwAAes78DwD9x/wPAP3H/A8A/cf8DwD9x/wPAP3H/A8AfeWnd+9mpbnZ+fzruUdrq4u1R1fnyvXFQnV1tjBbW1kuzNdq863P7Kke9HyVWm156nqsPi42yvVGsb62fr9aW11q3G99rvf98lBPegUA7Ofs+ef/SCJi49bJVokdezmYq+F4S/NOAMjNQN4JALkZzDsBIDe+xwf22KL3LV1/RejZ0ecC9Mblr1n/h35l/R/6l/V/6F/W/6F/NZuJPf8BoM9Y4wf8/B8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+u7FWSdJCZy/wsUjTQiHidERMxFDycKFSnoyIMxHx9+Gh4aw+lXfSAMB7Sv+ddPb/ujx+aWx364nk4+HWMSJ+9bt7v30802isTGXX/7d9vfGsc72UR/4AwEG25umteXzL61dPZrdKL/N5+cP25qJZ3M1OabcMxmDrOBJDETH6/6RTb8verwwcQfyNpxHx1b36n7TWRiY6O5/ujp/FPt3T+Olb8dNWW/uY/V98+QhygX7zPBt/bu91/6VxoXXc+/4faY1Q729r/Nt8Z/xLt8e/gS7j34XDxrj+1590bXsa8fXBveIn2/GTLvEvHTL+P7/xrYvd2pq/j7gce8ffGavYqC4X62vrVxeqM/Pl+fJSqTQ9NT1589qNUrG1Rl3cWql+139uXTmzX/9Hu8QfOaD/3z1k///wyYNffHuf+N//zt6v/7l94mdz4vcOGX9m9E9dt+/O4s916f9Br/+VQ8Z/8a/1uUM+FADogfra+uJMpVJecdKzk+y92xcgDSe5nWRfAUfxPF/5gKnmPTIBH9qbmz7vTAAAAAAAAAAAAAAAgG568QdPefcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA4+vTAAAA//+0tdao") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4, 0x7, 0x0, 0x0}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 09:27:09 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x50, 0x3a, 0x0, @dev, @local, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "283e82", 0x0, 0x33, 0x0, @private1, @private0, [@dstopts={0x2f, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}]}]}}}}}}}, 0x0) 09:27:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="b00000001400010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="1400010000000000000000000000000000000001140006000000000000000000000000000000000014000600000000000000000000000000000000000800090000000000410002"], 0xb0}}, 0x0) [ 68.530358][ T3118] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:09 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) [ 68.596703][ T5158] loop3: detected capacity change from 0 to 512 [ 68.616991][ T5159] loop5: detected capacity change from 0 to 512 [ 68.627328][ T5162] __nla_validate_parse: 140 callbacks suppressed [ 68.627344][ T5162] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 09:27:09 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) [ 68.662190][ T5158] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 68.686284][ T5159] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 09:27:09 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$eJzs3c9vVFsdAPDvvW1pKYUWJfFHVBBRNISZdoCGsMKNxhASI3HlAmo7NE1nOk1nirSyKP+DiSSu9E9wYeLChJV7d7pzgwsTVOILfclbzMudmZZSOm3fo8x96Xw+ycm9555hvt/D9J4zPW3nBNC3LkTERkSciIgHETHeuZ50Stxul+xxr189md189WQ2iWbz3n+TVnt2LXb8m8ypznOORMTPfhzxy+TduPW19cWZSqW80qkXG9XlYn1t/epCdWa+PF9eKpWmp6Ynb167UTqyvp6v/vHljxbu/Pwvf/7mi79t/ODXWVpjnbad/ThK7a4PbcfJDEbEnQ8RLAcDnf6cyDsRPpc0Ir4UERez+7+ZdzYAQC80m+PRHN9ZBwCOu7S1Bpakhc5awFikaaHQXsM7F6NppVZvXHlYW12aa6+VTcRQ+nChUp7srBVOxFCS1ada52/qpV31axFxNiJ+M3yyVS/M1ipzeb7xAYA+dmrX/P/RcHv+BwCOuZG8EwAAes78DwD9x/wPAP3H/A8A/cf8DwD9x/wPAP3H/A8AfeWnd+9mpbnZ+fzruUdrq4u1R1fnyvXFQnV1tjBbW1kuzNdq863P7Kke9HyVWm156nqsPi42yvVGsb62fr9aW11q3G99rvf98lBPegUA7Ofs+ef/SCJi49bJVokdezmYq+F4S/NOAMjNQN4JALkZzDsBIDe+xwf22KL3LV1/RejZ0ecC9Mblr1n/h35l/R/6l/V/6F/W/6F/NZuJPf8BoM9Y4wf8/B8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+u7FWSdJCZy/wsUjTQiHidERMxFDycKFSnoyIMxHx9+Gh4aw+lXfSAMB7Sv+ddPb/ujx+aWx364nk4+HWMSJ+9bt7v30802isTGXX/7d9vfGsc72UR/4AwEG25umteXzL61dPZrdKL/N5+cP25qJZ3M1OabcMxmDrOBJDETH6/6RTb8verwwcQfyNpxHx1b36n7TWRiY6O5/ujp/FPt3T+Olb8dNWW/uY/V98+QhygX7zPBt/bu91/6VxoXXc+/4faY1Q729r/Nt8Z/xLt8e/gS7j34XDxrj+1590bXsa8fXBveIn2/GTLvEvHTL+P7/xrYvd2pq/j7gce8ffGavYqC4X62vrVxeqM/Pl+fJSqTQ9NT1589qNUrG1Rl3cWql+139uXTmzX/9Hu8QfOaD/3z1k///wyYNffHuf+N//zt6v/7l94mdz4vcOGX9m9E9dt+/O4s916f9Br/+VQ8Z/8a/1uUM+FADogfra+uJMpVJecdKzk+y92xcgDSe5nWRfAUfxPF/5gKnmPTIBH9qbmz7vTAAAAAAAAAAAAAAAgG568QdPefcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA4+vTAAAA//+0tdao") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="b00000001400010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="1400010000000000000000000000000000000001140006000000000000000000000000000000000014000600000000000000000000000000000000000800090000000000410002"], 0xb0}}, 0x0) 09:27:09 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) 09:27:09 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) 09:27:09 executing program 5: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x25, 0x4b6, &(0x7f0000000540)="$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") r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) [ 68.686348][ T5159] ext4 filesystem being mounted at /root/syzkaller-testdir3304125490/syzkaller.85tRR7/129/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.695378][ T5158] ext4 filesystem being mounted at /root/syzkaller-testdir1615701204/syzkaller.Bpisdu/126/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.739875][ T3076] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:09 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) [ 68.768505][ T3118] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 68.770239][ T5179] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 09:27:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) [ 68.818135][ T5182] loop5: detected capacity change from 0 to 512 [ 68.819315][ T5186] loop3: detected capacity change from 0 to 512 09:27:09 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x40, r2, 0xa19, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}]}, 0x40}}, 0x0) [ 68.862273][ T5182] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 68.882078][ T5182] ext4 filesystem being mounted at /root/syzkaller-testdir3304125490/syzkaller.85tRR7/130/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.920331][ T5186] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 68.930713][ T3076] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 68.941930][ T5186] ext4 filesystem being mounted at /root/syzkaller-testdir1615701204/syzkaller.Bpisdu/127/file0 supports timestamps until 2038-01-19 (0x7fffffff) 09:27:09 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="b00000001400010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="1400010000000000000000000000000000000001140006000000000000000000000000000000000014000600000000000000000000000000000000000800090000000000410002"], 0xb0}}, 0x0) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="b00000001400010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="1400010000000000000000000000000000000001140006000000000000000000000000000000000014000600000000000000000000000000000000000800090000000000410002"], 0xb0}}, 0x0) [ 68.971449][ T3118] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 68.984245][ T5203] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 69.012496][ T5212] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 2: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x100) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 2: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 2: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 2: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 2: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 2: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0) 09:27:09 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCNEWUNIT(r0, 0x4004743d, &(0x7f0000000080)) [ 69.363051][ T5271] ip6gretap0: entered promiscuous mode [ 69.371143][ T5271] macsec1: entered allmulticast mode [ 69.376506][ T5271] ip6gretap0: entered allmulticast mode [ 69.389546][ T5271] ip6gretap0: left allmulticast mode [ 69.394915][ T5271] ip6gretap0: left promiscuous mode 09:27:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 09:27:09 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:09 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) [ 69.481095][ T5293] ip6gretap0: entered promiscuous mode [ 69.487153][ T5293] macsec1: entered allmulticast mode [ 69.492471][ T5293] ip6gretap0: entered allmulticast mode [ 69.499418][ T5293] ip6gretap0: left allmulticast mode [ 69.504705][ T5293] ip6gretap0: left promiscuous mode 09:27:10 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) [ 69.546637][ T5295] ip6gretap0: entered promiscuous mode [ 69.559558][ T5295] macsec1: entered allmulticast mode [ 69.564889][ T5295] ip6gretap0: entered allmulticast mode [ 69.573868][ T5295] ip6gretap0: left allmulticast mode [ 69.579284][ T5295] ip6gretap0: left promiscuous mode 09:27:10 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x30, 0x1, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x8}]}]}, 0x30}}, 0x0) 09:27:10 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) [ 69.604610][ T5298] ip6gretap0: entered promiscuous mode [ 69.610913][ T5298] macsec1: entered allmulticast mode [ 69.616543][ T5298] ip6gretap0: entered allmulticast mode 09:27:10 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x30, 0x1, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x8}]}]}, 0x30}}, 0x0) [ 69.719845][ T5298] ip6gretap0: left allmulticast mode [ 69.725278][ T5298] ip6gretap0: left promiscuous mode [ 69.759817][ T5299] ip6gretap0: entered promiscuous mode [ 69.766865][ T5299] macsec1: entered allmulticast mode [ 69.772181][ T5299] ip6gretap0: entered allmulticast mode 09:27:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x30, 0x1, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x8}]}]}, 0x30}}, 0x0) [ 69.848138][ T5299] ip6gretap0: left allmulticast mode [ 69.853475][ T5299] ip6gretap0: left promiscuous mode 09:27:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x30, 0x1, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x8}]}]}, 0x30}}, 0x0) [ 69.978046][ T5301] ip6gretap0: entered promiscuous mode [ 69.983584][ T5301] macsec1: entered allmulticast mode [ 69.988929][ T5301] ip6gretap0: entered allmulticast mode [ 70.000192][ T5301] ip6gretap0: left allmulticast mode [ 70.006966][ T5301] ip6gretap0: left promiscuous mode 09:27:10 executing program 0: syz_emit_ethernet(0x50, &(0x7f00000015c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4fc615", 0x1a, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x18, 0x1, "99b1950b54a337fc"}]}}}}}}, 0x0) 09:27:10 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 0: syz_emit_ethernet(0x50, &(0x7f00000015c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4fc615", 0x1a, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x18, 0x1, "99b1950b54a337fc"}]}}}}}}, 0x0) [ 70.100287][ T5305] ip6gretap0: entered promiscuous mode [ 70.107706][ T5305] macsec1: entered allmulticast mode [ 70.113177][ T5305] ip6gretap0: entered allmulticast mode [ 70.125113][ T5305] ip6gretap0: left allmulticast mode [ 70.130539][ T5305] ip6gretap0: left promiscuous mode 09:27:10 executing program 0: syz_emit_ethernet(0x50, &(0x7f00000015c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4fc615", 0x1a, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x18, 0x1, "99b1950b54a337fc"}]}}}}}}, 0x0) [ 70.160172][ T5308] ip6gretap0: entered promiscuous mode [ 70.167586][ T5308] macsec1: entered allmulticast mode [ 70.173073][ T5308] ip6gretap0: entered allmulticast mode [ 70.189676][ T5308] ip6gretap0: left allmulticast mode [ 70.195077][ T5308] ip6gretap0: left promiscuous mode 09:27:10 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 0: syz_emit_ethernet(0x50, &(0x7f00000015c0)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4fc615", 0x1a, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x18, 0x1, "99b1950b54a337fc"}]}}}}}}, 0x0) 09:27:10 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) [ 70.218793][ T5317] ip6gretap0: entered promiscuous mode [ 70.224515][ T5317] macsec1: entered allmulticast mode [ 70.230056][ T5317] ip6gretap0: entered allmulticast mode [ 70.237707][ T5317] ip6gretap0: left allmulticast mode [ 70.243046][ T5317] ip6gretap0: left promiscuous mode 09:27:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) 09:27:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) 09:27:10 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) [ 70.294213][ T5326] ip6gretap0: entered promiscuous mode [ 70.301029][ T5326] macsec1: entered allmulticast mode [ 70.306389][ T5326] ip6gretap0: entered allmulticast mode [ 70.317371][ T5326] ip6gretap0: left allmulticast mode [ 70.322708][ T5326] ip6gretap0: left promiscuous mode 09:27:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) 09:27:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) [ 70.347869][ T5329] ip6gretap0: entered promiscuous mode [ 70.354191][ T5329] macsec1: entered allmulticast mode [ 70.359572][ T5329] ip6gretap0: entered allmulticast mode [ 70.371026][ T5329] ip6gretap0: left allmulticast mode [ 70.376450][ T5329] ip6gretap0: left promiscuous mode 09:27:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) [ 70.398875][ T5327] ip6gretap0: entered promiscuous mode [ 70.405016][ T5327] macsec1: entered allmulticast mode [ 70.410403][ T5327] ip6gretap0: entered allmulticast mode [ 70.418215][ T5327] ip6gretap0: left allmulticast mode [ 70.423547][ T5327] ip6gretap0: left promiscuous mode [ 70.440876][ T5333] ip6gretap0: entered promiscuous mode [ 70.446567][ T5333] macsec1: entered allmulticast mode [ 70.451928][ T5333] ip6gretap0: entered allmulticast mode [ 70.459457][ T5333] ip6gretap0: left allmulticast mode [ 70.464798][ T5333] ip6gretap0: left promiscuous mode [ 70.480218][ T5340] ip6gretap0: entered promiscuous mode [ 70.486005][ T5340] macsec1: entered allmulticast mode [ 70.491394][ T5340] ip6gretap0: entered allmulticast mode 09:27:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) 09:27:11 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) [ 70.498847][ T5340] ip6gretap0: left allmulticast mode [ 70.504161][ T5340] ip6gretap0: left promiscuous mode 09:27:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) 09:27:11 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="c40000003200100028bd7000fddbdf25000000000c0002000000000000000000640001000c00170007000100787400000c00150008000300080000000c00120008ea02f0d315eeb5428792281995b0004d8c16e5107a5185ef82d8bc938c3f0000000c000c0008000300060000000c00010008fb0200050000000c00200008000300040000000c001b00080003007b3200000c001e00080003000100000008000400010100003800010010000a00090001006373756d000000000c00200008000300ff0f00000c001300080003001d000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40090}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r3 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f, 0x2a03}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@ipv6_getnexthop={0x18, 0x6a, 0x1, 0x0, 0x0, {0xa, 0x2}}, 0x18}}, 0x0) 09:27:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) 09:27:11 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002ff0f03900000000001cf0b00006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bcb6c866c96ed3822a0200000046", 0x48}], 0x1}, 0x0) [ 70.584399][ T5351] ip6gretap0: entered promiscuous mode [ 70.602589][ T5351] macsec1: entered allmulticast mode [ 70.607998][ T5351] ip6gretap0: entered allmulticast mode [ 70.625684][ T26] kauditd_printk_skb: 10 callbacks suppressed 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 70.625695][ T26] audit: type=1400 audit(1693214831.114:187): avc: denied { setopt } for pid=5357 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 70.656925][ T5351] ip6gretap0: left allmulticast mode [ 70.662276][ T5351] ip6gretap0: left promiscuous mode [ 70.707101][ T5353] ip6gretap0: entered promiscuous mode [ 70.712716][ T5353] macsec1: entered allmulticast mode [ 70.718120][ T5353] ip6gretap0: entered allmulticast mode [ 70.727176][ T5353] ip6gretap0: left allmulticast mode [ 70.732535][ T5353] ip6gretap0: left promiscuous mode 09:27:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@ipv6_getnexthop={0x18, 0x6a, 0x1, 0x0, 0x0, {0xa, 0x2}}, 0x18}}, 0x0) 09:27:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@ipv6_getnexthop={0x18, 0x6a, 0x1, 0x0, 0x0, {0xa, 0x2}}, 0x18}}, 0x0) 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@ipv6_getnexthop={0x18, 0x6a, 0x1, 0x0, 0x0, {0xa, 0x2}}, 0x18}}, 0x0) 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c0000002000010128bd7000fcdbdf250a"], 0x6c}}, 0x0) 09:27:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 09:27:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0xf, 0x0, 0x0, @uid}]}]}, 0x24}}, 0x0) 09:27:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 09:27:11 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 09:27:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c0000002000010128bd7000fcdbdf250a"], 0x6c}}, 0x0) 09:27:11 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 09:27:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) 09:27:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0xf, 0x0, 0x0, @uid}]}]}, 0x24}}, 0x0) [ 70.951833][ T5399] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 70.989131][ T5409] openvswitch: netlink: Either Ethernet header or EtherType is required. 09:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 09:27:11 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 09:27:11 executing program 3: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) 09:27:11 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) [ 71.035256][ T5415] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 71.068833][ T5424] openvswitch: netlink: Either Ethernet header or EtherType is required. 09:27:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0xf, 0x0, 0x0, @uid}]}]}, 0x24}}, 0x0) 09:27:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) 09:27:11 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) 09:27:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c0000002000010128bd7000fcdbdf250a"], 0x6c}}, 0x0) 09:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {0x1e}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 09:27:11 executing program 3: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) [ 71.084508][ T26] audit: type=1400 audit(1693214831.564:188): avc: denied { open } for pid=5426 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 71.104139][ T26] audit: type=1400 audit(1693214831.564:189): avc: denied { kernel } for pid=5426 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 71.127103][ T5433] openvswitch: netlink: Either Ethernet header or EtherType is required. 09:27:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) 09:27:11 executing program 2: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) 09:27:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0xf, 0x0, 0x0, @uid}]}]}, 0x24}}, 0x0) 09:27:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) 09:27:11 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) [ 71.169616][ T5438] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. 09:27:11 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e002176820ecc76c0b0f938f1a2bd6fc37110017f"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0xc02, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/108, 0x154}, {&(0x7f00000002c0)=""/4096, 0x1014}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000012c0)=""/84, 0x54}], 0x4}}], 0x7, 0x0, 0x0) 09:27:11 executing program 3: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="b70000000000000007000000ec0000009500000000000000a9171809f8dcf159569d5475991f7de1a0d0c119cfcf6b98741c23fb7f8d3002ec85db75af955427e91496087a51a0a78f263552c20b7f5fa0396a180330807a5b6e8c79aa92038c78d1f16c1323f0e0c8b75c641a21757847cb22230e4321cc3581e40c59c4defee8cffe359cfeef7f59fffdb48647d28ae810f6d22d20271e9e88e94aa6982bf48356652b08e2fbd404e41e0058aae0478fbe542b648421d1b4486a542f7d478fbe6b5e0000002938222bc68e235184b7ad5b6c4fe70ec8320573db0db7fda3da6171a05509ffecef2cb9802d4f36c9a1ce46d3b355fee632c188ccfc2f0fc89e164561fb06ee9a0153981a47b5de6cdd3536d5534f9a699f73b2c9341d2d05043758ce1f4577ed74cdf5b3c697089daa4abda69a8c0c992404610a6be9e103c972459065dec0488e85a6a093c38d418fc87dd8019ef755bb4ef4fa6ee08d81797570578f2e8198e687012f25a69a90e7515e35f8abbddfa96c3f0485f01f0e9e144a2bd31c1b594c50de7c9efd826f1e19b7bd89ca4052b1985287bd13957a48467e0eeddf564d175bf4340885b63976df609806c3b2a3667539dfd66a000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) 09:27:11 executing program 2: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) 09:27:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c0000002000010128bd7000fcdbdf250a"], 0x6c}}, 0x0) 09:27:11 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) [ 71.222155][ T5449] openvswitch: netlink: Either Ethernet header or EtherType is required. 09:27:11 executing program 2: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) 09:27:11 executing program 3: perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) 09:27:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:11 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:27:11 executing program 1: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0) 09:27:11 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) 09:27:11 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) [ 71.276313][ T5459] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 71.285235][ T26] audit: type=1400 audit(1693214831.764:190): avc: denied { mounton } for pid=5460 comm="syz-executor.4" path="/root/syzkaller-testdir1870558942/syzkaller.RVmS2s/148/file0" dev="sda1" ino=1971 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 09:27:11 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) 09:27:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:11 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:27:11 executing program 1: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0) 09:27:11 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) 09:27:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:11 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) 09:27:11 executing program 1: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0) 09:27:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:11 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:27:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:11 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$nfs4(&(0x7f00000000c0)='/proc//0lf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, 0x0) 09:27:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:11 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:27:12 executing program 1: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0) 09:27:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8}]}}}]}]}], {0x14}}, 0x8c}}, 0x0) 09:27:12 executing program 3: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8}]}}}]}]}], {0x14}}, 0x8c}}, 0x0) 09:27:12 executing program 3: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:12 executing program 4: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000040)=0x401, 0x4) dup3(r2, r1, 0x0) 09:27:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8}]}}}]}]}], {0x14}}, 0x8c}}, 0x0) 09:27:12 executing program 3: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 4: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) [ 71.589683][ T26] audit: type=1326 audit(1693214832.074:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5524 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f10547a7ae9 code=0x0 09:27:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, 0x1ff, 0x0) 09:27:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8}]}}}]}]}], {0x14}}, 0x8c}}, 0x0) 09:27:12 executing program 3: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 5: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 4: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:12 executing program 1: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 2: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 5: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) 09:27:12 executing program 2: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:12 executing program 1: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) [ 72.447855][ T26] audit: type=1326 audit(1693214832.934:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f10547a7ae9 code=0x0 09:27:13 executing program 5: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:13 executing program 2: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) [ 72.516458][ T5565] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 72.519156][ T26] audit: type=1326 audit(1693214832.994:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5560 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f84fffa4ae9 code=0x0 [ 72.556063][ T10] ================================================================== [ 72.564182][ T10] BUG: KCSAN: data-race in process_one_work / process_one_work [ 72.571720][ T10] [ 72.574039][ T10] read-write to 0xffff8881000660a0 of 8 bytes by task 3093 on cpu 0: [ 72.582088][ T10] process_one_work+0x45f/0x860 [ 72.586931][ T10] worker_thread+0x5f2/0xa10 [ 72.591509][ T10] kthread+0x1d7/0x210 [ 72.595570][ T10] ret_from_fork+0x2e/0x40 [ 72.599977][ T10] ret_from_fork_asm+0x11/0x20 [ 72.604732][ T10] [ 72.607042][ T10] read-write to 0xffff8881000660a0 of 8 bytes by task 10 on cpu 1: [ 72.614917][ T10] process_one_work+0x45f/0x860 [ 72.619756][ T10] worker_thread+0x5f2/0xa10 [ 72.624336][ T10] kthread+0x1d7/0x210 [ 72.628407][ T10] ret_from_fork+0x2e/0x40 [ 72.632813][ T10] ret_from_fork_asm+0x11/0x20 [ 72.637567][ T10] [ 72.639876][ T10] value changed: 0x0000000000001412 -> 0x0000000000001413 [ 72.646965][ T10] [ 72.649272][ T10] Reported by Kernel Concurrency Sanitizer on: [ 72.655577][ T10] CPU: 1 PID: 10 Comm: kworker/u4:0 Not tainted 6.5.0-syzkaller #0 09:27:13 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) [ 72.663455][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 72.673510][ T10] Workqueue: events_unbound fsnotify_connector_destroy_workfn [ 72.680974][ T10] ================================================================== [ 72.708008][ T5578] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 72.722229][ T26] audit: type=1326 audit(1693214833.204:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9ef0088ae9 code=0x0 09:27:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:13 executing program 1: timer_create(0xfffffffd, 0x0, &(0x7f0000000040)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) 09:27:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) 09:27:13 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) 09:27:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) 09:27:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) 09:27:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) 09:27:13 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) [ 73.290736][ T5583] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 73.302968][ T5584] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 73.316318][ T26] audit: type=1326 audit(1693214833.804:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5586 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f10547a7ae9 code=0x0 09:27:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\xd2\xa1\x10\x00\b\x00'}, @NLBL_MGMT_A_PROTOCOL={0x30, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0xff, 0x1, '\x00', 0xc}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x3}}]}, 0x50}, 0x1, 0x10}, 0x0) 09:27:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) 09:27:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) [ 73.366772][ T5595] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 73.373386][ T26] audit: type=1326 audit(1693214833.844:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5588 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9ef0088ae9 code=0x0 [ 73.400417][ T5596] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 73.434373][ T5600] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:27:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:14 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@null, 0x0, 'pim6reg1\x00'}) 09:27:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x33, 0x1, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0x10, 0x1, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x28}}, 0x0) 09:27:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) 09:27:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x0, 0xfffffffc}, {0x15}, {0x6}]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) 09:27:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) 09:27:14 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@null, 0x0, 'pim6reg1\x00'}) 09:27:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x33, 0x1, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0x10, 0x1, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x28}}, 0x0) 09:27:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x33, 0x1, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0x10, 0x1, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x28}}, 0x0) 09:27:14 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@null, 0x0, 'pim6reg1\x00'}) 09:27:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x33, 0x1, 0x0, 0x0, {0x3}, [@typed={0x4}, @nested={0x10, 0x1, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x28}}, 0x0) 09:27:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:15 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@null, 0x0, 'pim6reg1\x00'}) 09:27:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 09:27:15 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007380)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @local}}}}], 0x28}}], 0x1, 0x0) 09:27:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007380)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @local}}}}], 0x28}}], 0x1, 0x0) 09:27:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 09:27:16 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007380)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @local}}}}], 0x28}}], 0x1, 0x0) 09:27:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007380)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @local}}}}], 0x28}}], 0x1, 0x0) 09:27:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:16 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:16 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:16 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:16 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:17 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:17 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:17 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:17 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:17 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) 09:27:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x7, [0x0]}}]}, 0x158}}, 0x0) 09:27:18 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:18 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) 09:27:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) 09:27:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) 09:27:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) [ 78.084398][ T5757] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.3'. 09:27:18 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) 09:27:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) 09:27:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) 09:27:18 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) 09:27:18 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x64342, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) r3 = timerfd_create(0x0, 0x0) readv(r3, &(0x7f0000000440)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x4) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:27:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_delneigh={0x1c, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0x73}}, 0x1c}}, 0x0) 09:27:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x50, 0x1e, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x14, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x4}}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 09:27:18 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) 09:27:18 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) [ 78.179517][ T5775] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.4'. [ 78.215867][ T5779] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.3'. [ 78.289724][ T5788] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 78.299092][ T5788] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 09:27:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) setsockopt$inet_buf(r0, 0x0, 0x2e, 0x0, 0x0) 09:27:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x50, 0x1e, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x14, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x4}}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 5: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) 09:27:19 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x30, 0xa0000000, 0xffffffff}, &(0x7f0000000080)=0x18) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00080008000c00080000e9002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24491550", 0x55}], 0x1}, 0x0) [ 78.592689][ T5786] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.4'. [ 78.602247][ T5785] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.3'. [ 78.643036][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 78.643047][ T26] audit: type=1400 audit(1693214839.124:210): avc: denied { create } for pid=5790 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 78.648482][ T5796] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.4'. 09:27:19 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) [ 78.672138][ T26] audit: type=1400 audit(1693214839.134:211): avc: denied { bind } for pid=5790 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 78.692105][ T5798] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.3'. [ 78.697587][ T26] audit: type=1400 audit(1693214839.154:212): avc: denied { write } for pid=5790 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 78.726615][ T5794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 09:27:19 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) 09:27:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x50, 0x1e, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x14, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x4}}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 09:27:19 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) [ 78.750361][ T26] audit: type=1400 audit(1693214839.214:213): avc: denied { read } for pid=5789 comm="syz-executor.5" path="socket:[27473]" dev="sockfs" ino=27473 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) 09:27:19 executing program 5: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x50, 0x1e, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x14, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x4}}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 09:27:19 executing program 2: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) 09:27:19 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a1b0351b14c11c55a2061e0883eba6a4", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4c6b537f8f5cfd65b82566df4ff05820", 0x10) 09:27:19 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 5: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 2: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="58000000000000001401000006"], 0x58}, 0x0) 09:27:19 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "ca"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0x3}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x7}, 0x0) 09:27:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x2, &(0x7f00000000c0)=@raw=[@map_idx_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:19 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x2, &(0x7f00000000c0)=@raw=[@map_idx_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:19 executing program 5: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) [ 79.350616][ T26] audit: type=1400 audit(1693214839.834:214): avc: denied { create } for pid=5859 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 09:27:19 executing program 2: io_setup(0xaaf, &(0x7f0000000000)=0x0) r1 = socket$igmp(0x2, 0x3, 0x2) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 09:27:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000300)=0x7fffffffffffffff, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r0, &(0x7f0000000340)={0x18}, 0x18) 09:27:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x2, &(0x7f00000000c0)=@raw=[@map_idx_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:19 executing program 3: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:19 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) [ 79.417919][ T26] audit: type=1400 audit(1693214839.864:215): avc: denied { write } for pid=5859 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 09:27:19 executing program 3: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "ca"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0x3}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x7}, 0x0) 09:27:20 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x2, &(0x7f00000000c0)=@raw=[@map_idx_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 3: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x13, 0x0, &(0x7f0000000200)) 09:27:20 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$eJzs3c1vVFUbAPDnTD8olPdtIUbFhTQxBhKlpQUMMS5gTxr8iBs3VloIUqChNVo0sSS4MTFujDFx5UL8L5TIlpWuXLhxZUiIGpYmjrnTe8u0zLS0THsr9/dLht57zlzOczt9eu49PWcmgMoayv6pReyLiJkUMZAWluq6I68cWnzevb8+OpM9UtTrr/+RIuVlxfNT/rU/P7gvIn76McXergfbnZ2/emFienrqSr4/MndxZmR2/uqh8xcnzk2dm7o09tLY8WNHjx0fPdyxcz11/d33Bz4df+vbr/9Oo9/9Op7iROzO65rPo1OGYmjxe7JjeXn2fT3e6cZK0pWfT/NLnLpLDIh1KV6/noh4KgaiK+6/eAPxyaulBgdsqnqKqAMVleQ/VFRxHVDc26+8D66VclUCbIW7JxcHAB7M/+7FscHoa4wN7LqXonlYJ0VEJ0bmsjZu3xq/fvbW+PXYpHE4oLWFaxHxdKv8T43cHGyM4mf5X1uW/9l1wen8a1b+2gbbH1qxL/9h6yzmf9+G8v/tpvx/Z4Pty38AAAAAAADonJsnI+LFVn//ry3N/4li/k/TIq/+iDjRgfbX/vtf7U4HmgFauHsy4pWW839rxezfwa5863+N+QA96ez56anDEfH/iDgYPTuy/dFV2jj02d6v2tUV8/+KR9b+7XwuYB7Hne4V62cnJ+YmHvW8gYi71yKeaTn/Ny31/6nF/N/s98HMQ7ax9/kbp9vVrZ3/wGapfxNxoGX/n5aek1Z/f46RxvXASHFV8KBnP/z8+3bty38oT9b/71o9/wdT8/v1zK6/jSPz3fV2dRu9/u9NbzRGI3rzsg8m5uaujEb0plNdWemy8rH1xwyPoyIfinzJ8v/gc6uP/7W6/t8ZEQsr/u/05/I1xYUn/+n/rV08+n8oT5b/k+vq/9e/MXZj8Id27T9c/3+00dcfzEuM/8GiL4s07V1e3iIdu1tVbXW8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA4qEXE7ki14aXtWm14OKI/Ip6IXbXpy7NzL5y9/N6lyayu8fn/teKTfgcW91Px+f+DTftjK/aPRMSeiPiia2djf/jM5enJsk8eAAAAAAAAAAAAAAAAAAAAton+Nuv/M793lR0dsOm6yw4AKE2L/P+5jDiAraf/h+qS/1Bd8h+qS/5Ddcl/qC75D9Ul/6G65D8AAAAAADxW9uy/+UuKiIWXdzYemd68rqfUyIDNVis7AKA03uIHqsvUH6gu9/hAWqO+r+1Bax25mpkzj3AwAAAAAAAAAAAAAFTOgX3W/0NVWf8P1WX9P1RXsf5/f8lxAFvPPT4Qa6zkb7n+f82jAAAAAAAAAAAAAIBOmp2/emFienrqio03t0cYW7lRr9c/zn4Ktks8//GNYir8donnkTbK/b0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADc928AAAD//7D0Jqk=") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 09:27:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x13, 0x0, &(0x7f0000000200)) [ 79.547525][ T26] audit: type=1400 audit(1693214840.034:216): avc: denied { create } for pid=5899 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 09:27:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 79.593238][ T5905] loop4: detected capacity change from 0 to 1024 [ 79.622660][ T26] audit: type=1400 audit(1693214840.064:217): avc: denied { getopt } for pid=5899 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 09:27:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 0: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x300, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/142, 0x8e}], 0x1, 0x0, 0x0) 09:27:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x13, 0x0, &(0x7f0000000200)) 09:27:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$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") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 09:27:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "ca"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0x3}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x7}, 0x0) 09:27:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x13, 0x0, &(0x7f0000000200)) 09:27:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$eJzs3c1vVFUbAPDnTD8olPdtIUbFhTQxBhKlpQUMMS5gTxr8iBs3VloIUqChNVo0sSS4MTFujDFx5UL8L5TIlpWuXLhxZUiIGpYmjrnTe8u0zLS0THsr9/dLht57zlzOczt9eu49PWcmgMoayv6pReyLiJkUMZAWluq6I68cWnzevb8+OpM9UtTrr/+RIuVlxfNT/rU/P7gvIn76McXergfbnZ2/emFienrqSr4/MndxZmR2/uqh8xcnzk2dm7o09tLY8WNHjx0fPdyxcz11/d33Bz4df+vbr/9Oo9/9Op7iROzO65rPo1OGYmjxe7JjeXn2fT3e6cZK0pWfT/NLnLpLDIh1KV6/noh4KgaiK+6/eAPxyaulBgdsqnqKqAMVleQ/VFRxHVDc26+8D66VclUCbIW7JxcHAB7M/+7FscHoa4wN7LqXonlYJ0VEJ0bmsjZu3xq/fvbW+PXYpHE4oLWFaxHxdKv8T43cHGyM4mf5X1uW/9l1wen8a1b+2gbbH1qxL/9h6yzmf9+G8v/tpvx/Z4Pty38AAAAAAADonJsnI+LFVn//ry3N/4li/k/TIq/+iDjRgfbX/vtf7U4HmgFauHsy4pWW839rxezfwa5863+N+QA96ez56anDEfH/iDgYPTuy/dFV2jj02d6v2tUV8/+KR9b+7XwuYB7Hne4V62cnJ+YmHvW8gYi71yKeaTn/Ny31/6nF/N/s98HMQ7ax9/kbp9vVrZ3/wGapfxNxoGX/n5aek1Z/f46RxvXASHFV8KBnP/z8+3bty38oT9b/71o9/wdT8/v1zK6/jSPz3fV2dRu9/u9NbzRGI3rzsg8m5uaujEb0plNdWemy8rH1xwyPoyIfinzJ8v/gc6uP/7W6/t8ZEQsr/u/05/I1xYUn/+n/rV08+n8oT5b/k+vq/9e/MXZj8Id27T9c/3+00dcfzEuM/8GiL4s07V1e3iIdu1tVbXW8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA4qEXE7ki14aXtWm14OKI/Ip6IXbXpy7NzL5y9/N6lyayu8fn/teKTfgcW91Px+f+DTftjK/aPRMSeiPiia2djf/jM5enJsk8eAAAAAAAAAAAAAAAAAAAAton+Nuv/M793lR0dsOm6yw4AKE2L/P+5jDiAraf/h+qS/1Bd8h+qS/5Ddcl/qC75D9Ul/6G65D8AAAAAADxW9uy/+UuKiIWXdzYemd68rqfUyIDNVis7AKA03uIHqsvUH6gu9/hAWqO+r+1Bax25mpkzj3AwAAAAAAAAAAAAAFTOgX3W/0NVWf8P1WX9P1RXsf5/f8lxAFvPPT4Qa6zkb7n+f82jAAAAAAAAAAAAAIBOmp2/emFienrqio03t0cYW7lRr9c/zn4Ktks8//GNYir8donnkTbK/b0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADc928AAAD//7D0Jqk=") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 09:27:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 79.676558][ T5905] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 79.695333][ T3124] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'erspan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x8, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 09:27:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x270, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0x258}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d0) 09:27:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x270, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0x258}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d0) 09:27:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'erspan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x8, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) [ 79.796772][ T5939] loop5: detected capacity change from 0 to 1024 [ 79.808417][ T5942] loop4: detected capacity change from 0 to 1024 09:27:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$eJzs3c1vVFUbAPDnTD8olPdtIUbFhTQxBhKlpQUMMS5gTxr8iBs3VloIUqChNVo0sSS4MTFujDFx5UL8L5TIlpWuXLhxZUiIGpYmjrnTe8u0zLS0THsr9/dLht57zlzOczt9eu49PWcmgMoayv6pReyLiJkUMZAWluq6I68cWnzevb8+OpM9UtTrr/+RIuVlxfNT/rU/P7gvIn76McXergfbnZ2/emFienrqSr4/MndxZmR2/uqh8xcnzk2dm7o09tLY8WNHjx0fPdyxcz11/d33Bz4df+vbr/9Oo9/9Op7iROzO65rPo1OGYmjxe7JjeXn2fT3e6cZK0pWfT/NLnLpLDIh1KV6/noh4KgaiK+6/eAPxyaulBgdsqnqKqAMVleQ/VFRxHVDc26+8D66VclUCbIW7JxcHAB7M/+7FscHoa4wN7LqXonlYJ0VEJ0bmsjZu3xq/fvbW+PXYpHE4oLWFaxHxdKv8T43cHGyM4mf5X1uW/9l1wen8a1b+2gbbH1qxL/9h6yzmf9+G8v/tpvx/Z4Pty38AAAAAAADonJsnI+LFVn//ry3N/4li/k/TIq/+iDjRgfbX/vtf7U4HmgFauHsy4pWW839rxezfwa5863+N+QA96ez56anDEfH/iDgYPTuy/dFV2jj02d6v2tUV8/+KR9b+7XwuYB7Hne4V62cnJ+YmHvW8gYi71yKeaTn/Ny31/6nF/N/s98HMQ7ax9/kbp9vVrZ3/wGapfxNxoGX/n5aek1Z/f46RxvXASHFV8KBnP/z8+3bty38oT9b/71o9/wdT8/v1zK6/jSPz3fV2dRu9/u9NbzRGI3rzsg8m5uaujEb0plNdWemy8rH1xwyPoyIfinzJ8v/gc6uP/7W6/t8ZEQsr/u/05/I1xYUn/+n/rV08+n8oT5b/k+vq/9e/MXZj8Id27T9c/3+00dcfzEuM/8GiL4s07V1e3iIdu1tVbXW8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPA4qEXE7ki14aXtWm14OKI/Ip6IXbXpy7NzL5y9/N6lyayu8fn/teKTfgcW91Px+f+DTftjK/aPRMSeiPiia2djf/jM5enJsk8eAAAAAAAAAAAAAAAAAAAAton+Nuv/M793lR0dsOm6yw4AKE2L/P+5jDiAraf/h+qS/1Bd8h+qS/5Ddcl/qC75D9Ul/6G65D8AAAAAADxW9uy/+UuKiIWXdzYemd68rqfUyIDNVis7AKA03uIHqsvUH6gu9/hAWqO+r+1Bax25mpkzj3AwAAAAAAAAAAAAAFTOgX3W/0NVWf8P1WX9P1RXsf5/f8lxAFvPPT4Qa6zkb7n+f82jAAAAAAAAAAAAAIBOmp2/emFienrqio03t0cYW7lRr9c/zn4Ktks8//GNYir8donnkTbK/b0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADc928AAAD//7D0Jqk=") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) [ 79.840154][ T5939] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 79.868097][ T5942] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 09:27:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "ca"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0x3}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x7}, 0x0) 09:27:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x270, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0x258}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d0) 09:27:20 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'erspan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x8, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 09:27:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$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") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 09:27:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x270, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0x258}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d0) 09:27:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'erspan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x8, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) [ 79.903166][ T3076] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.913303][ T3124] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0xbf791ea4ee2af69c, 0x2, 0x6, 0x0, 0xa}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$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") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) [ 79.983264][ T5975] loop5: detected capacity change from 0 to 1024 [ 79.994814][ T5977] loop4: detected capacity change from 0 to 1024 [ 80.009877][ T5975] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 09:27:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0xbf791ea4ee2af69c, 0x2, 0x6, 0x0, 0xa}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f0000000280)=ANY=[], 0x1, 0x5bd, &(0x7f0000000600)="$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") quotactl$Q_SETQUOTA(0x0, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) [ 80.056721][ T5977] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 80.069658][ T3076] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:20 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:20 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0xbf791ea4ee2af69c, 0x2, 0x6, 0x0, 0xa}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 80.103264][ T3124] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0xbf791ea4ee2af69c, 0x2, 0x6, 0x0, 0xa}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) [ 80.164943][ T5999] loop5: detected capacity change from 0 to 1024 09:27:20 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:20 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 80.225137][ T5999] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 80.262453][ C0] hrtimer: interrupt took 26120 ns [ 80.268539][ T6007] loop4: detected capacity change from 0 to 1024 09:27:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) [ 80.314728][ T6007] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 09:27:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:20 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 80.358282][ T3124] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 80.375598][ T3076] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 09:27:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="430092c37548000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000086dd02030600ffff"], 0xfce) 09:27:20 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:21 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:21 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) [ 80.535651][ T6024] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:27:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="430092c37548000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000086dd02030600ffff"], 0xfce) 09:27:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x1, 0xfff1}}}, 0x24}}, 0x0) 09:27:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="430092c37548000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000086dd02030600ffff"], 0xfce) 09:27:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="430092c37548000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000086dd02030600ffff"], 0xfce) [ 80.709813][ T6040] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:27:21 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x82, &(0x7f0000000140)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x78) [ 80.754237][ T6044] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:27:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000080)={@void, @val, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @mcast1, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) ioctl$SG_BLKTRACESTOP(r0, 0x1275, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300001}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@newchain={0x388, 0x64, 0x100, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x7, 0xa}, {0x6}, {0x5, 0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x3f}, @filter_kind_options=@f_basic={{0xa}, {0x350, 0x2, [@TCA_BASIC_ACT={0x2b4, 0x3, [@m_ipt={0x140, 0xc, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x7b, 0x6, {0x19, 'security\x00', 0x34, 0xfb, "928bd4bfa191a38d87c3b83a18e676c825708b0f014482116429943bedcab6a61ccd202d34b4f4b11978f97dadc721b0ee294e45cd8608d8934b89a6503eaa23ae6c00f5d0cabc47a0f29a5fc47e8b2a41"}}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x400}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0x4e, 0x6, "55961d8713ee52f71c6e9cb8d992f1bfc2ac3f66f7e4c59c5063bb253dc4ea85941c7ebabb78c252d2a9025633f1d42f1eea79de91646298d6d778209d38dcae03545c63a5687833528a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_connmark={0x108, 0x7, 0x0, 0x0, {{0xd}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xd02, 0x4, 0x8, 0xe15}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x59ff, 0x8, 0x3, 0x80000001, 0x4}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xc658, 0x4, 0x7, 0xfff, 0x4}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x401, 0x3, 0x6, 0xc281}, 0xb414}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x3, 0x3, 0xc1b, 0x5c}, 0x401}}]}, {0x49, 0x6, "2b51f3f4efb8500850b37cbf4aa2b3e5e15bac902440c35cd18d1e587bb0473bbd9265a13930b4a18c3a84d57a33669d52a6d6963cc274a6c24ebf784ea5f9894bbdd89d05"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x6, 0x3, '\xda\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x80000000, 0x401, 0x5, 0x2, 0xc2bb}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x12, 0x6, "bd63b166825cca519099372b26cc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_EMATCHES={0x98, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5251, 0x7, 0x7}, {{0x2, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}}}, @TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0x1, 0x9, 0x8001}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}, @TCA_EMATCH_TREE_LIST={0x5c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x3, 0x5}, {0x40, 0x1, 0x4, 0x7f}}}, @TCF_EM_META={0xc, 0x1, 0x0, 0x0, {{0x0, 0x4, 0x7}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x2, 0x3, 0x3}, {0xfffffffe, 0x9, 0x20}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8000, 0x7, 0x3}, {{0x4, 0x1, 0x1}, {0x3, 0x1}}}}]}]}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x81}, 0x4000000) [ 80.816818][ T6048] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 80.831281][ T26] audit: type=1400 audit(1693214841.314:218): avc: denied { read write } for pid=6051 comm="syz-executor.4" name="sg0" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 09:27:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000080)={@void, @val, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @mcast1, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) ioctl$SG_BLKTRACESTOP(r0, 0x1275, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300001}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@newchain={0x388, 0x64, 0x100, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x7, 0xa}, {0x6}, {0x5, 0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x3f}, @filter_kind_options=@f_basic={{0xa}, {0x350, 0x2, [@TCA_BASIC_ACT={0x2b4, 0x3, [@m_ipt={0x140, 0xc, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x7b, 0x6, {0x19, 'security\x00', 0x34, 0xfb, "928bd4bfa191a38d87c3b83a18e676c825708b0f014482116429943bedcab6a61ccd202d34b4f4b11978f97dadc721b0ee294e45cd8608d8934b89a6503eaa23ae6c00f5d0cabc47a0f29a5fc47e8b2a41"}}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x400}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0x4e, 0x6, "55961d8713ee52f71c6e9cb8d992f1bfc2ac3f66f7e4c59c5063bb253dc4ea85941c7ebabb78c252d2a9025633f1d42f1eea79de91646298d6d778209d38dcae03545c63a5687833528a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_connmark={0x108, 0x7, 0x0, 0x0, {{0xd}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xd02, 0x4, 0x8, 0xe15}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x59ff, 0x8, 0x3, 0x80000001, 0x4}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xc658, 0x4, 0x7, 0xfff, 0x4}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x401, 0x3, 0x6, 0xc281}, 0xb414}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x3, 0x3, 0xc1b, 0x5c}, 0x401}}]}, {0x49, 0x6, "2b51f3f4efb8500850b37cbf4aa2b3e5e15bac902440c35cd18d1e587bb0473bbd9265a13930b4a18c3a84d57a33669d52a6d6963cc274a6c24ebf784ea5f9894bbdd89d05"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x6, 0x3, '\xda\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x80000000, 0x401, 0x5, 0x2, 0xc2bb}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x12, 0x6, "bd63b166825cca519099372b26cc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_EMATCHES={0x98, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5251, 0x7, 0x7}, {{0x2, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}}}, @TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0x1, 0x9, 0x8001}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}, @TCA_EMATCH_TREE_LIST={0x5c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x3, 0x5}, {0x40, 0x1, 0x4, 0x7f}}}, @TCF_EM_META={0xc, 0x1, 0x0, 0x0, {{0x0, 0x4, 0x7}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x2, 0x3, 0x3}, {0xfffffffe, 0x9, 0x20}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8000, 0x7, 0x3}, {{0x4, 0x1, 0x1}, {0x3, 0x1}}}}]}]}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x81}, 0x4000000) 09:27:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000080)={@void, @val, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @mcast1, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) ioctl$SG_BLKTRACESTOP(r0, 0x1275, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300001}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@newchain={0x388, 0x64, 0x100, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x7, 0xa}, {0x6}, {0x5, 0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x3f}, @filter_kind_options=@f_basic={{0xa}, {0x350, 0x2, [@TCA_BASIC_ACT={0x2b4, 0x3, [@m_ipt={0x140, 0xc, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x7b, 0x6, {0x19, 'security\x00', 0x34, 0xfb, "928bd4bfa191a38d87c3b83a18e676c825708b0f014482116429943bedcab6a61ccd202d34b4f4b11978f97dadc721b0ee294e45cd8608d8934b89a6503eaa23ae6c00f5d0cabc47a0f29a5fc47e8b2a41"}}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x400}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0x4e, 0x6, "55961d8713ee52f71c6e9cb8d992f1bfc2ac3f66f7e4c59c5063bb253dc4ea85941c7ebabb78c252d2a9025633f1d42f1eea79de91646298d6d778209d38dcae03545c63a5687833528a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_connmark={0x108, 0x7, 0x0, 0x0, {{0xd}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xd02, 0x4, 0x8, 0xe15}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x59ff, 0x8, 0x3, 0x80000001, 0x4}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xc658, 0x4, 0x7, 0xfff, 0x4}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x401, 0x3, 0x6, 0xc281}, 0xb414}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x3, 0x3, 0xc1b, 0x5c}, 0x401}}]}, {0x49, 0x6, "2b51f3f4efb8500850b37cbf4aa2b3e5e15bac902440c35cd18d1e587bb0473bbd9265a13930b4a18c3a84d57a33669d52a6d6963cc274a6c24ebf784ea5f9894bbdd89d05"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x6, 0x3, '\xda\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x80000000, 0x401, 0x5, 0x2, 0xc2bb}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x12, 0x6, "bd63b166825cca519099372b26cc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_EMATCHES={0x98, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5251, 0x7, 0x7}, {{0x2, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}}}, @TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0x1, 0x9, 0x8001}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}, @TCA_EMATCH_TREE_LIST={0x5c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x3, 0x5}, {0x40, 0x1, 0x4, 0x7f}}}, @TCF_EM_META={0xc, 0x1, 0x0, 0x0, {{0x0, 0x4, 0x7}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x2, 0x3, 0x3}, {0xfffffffe, 0x9, 0x20}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8000, 0x7, 0x3}, {{0x4, 0x1, 0x1}, {0x3, 0x1}}}}]}]}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x81}, 0x4000000) 09:27:21 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 09:27:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000080)={@void, @val, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @mcast1, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) ioctl$SG_BLKTRACESTOP(r0, 0x1275, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300001}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@newchain={0x388, 0x64, 0x100, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x7, 0xa}, {0x6}, {0x5, 0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x3f}, @filter_kind_options=@f_basic={{0xa}, {0x350, 0x2, [@TCA_BASIC_ACT={0x2b4, 0x3, [@m_ipt={0x140, 0xc, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x7b, 0x6, {0x19, 'security\x00', 0x34, 0xfb, "928bd4bfa191a38d87c3b83a18e676c825708b0f014482116429943bedcab6a61ccd202d34b4f4b11978f97dadc721b0ee294e45cd8608d8934b89a6503eaa23ae6c00f5d0cabc47a0f29a5fc47e8b2a41"}}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x400}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0x4e, 0x6, "55961d8713ee52f71c6e9cb8d992f1bfc2ac3f66f7e4c59c5063bb253dc4ea85941c7ebabb78c252d2a9025633f1d42f1eea79de91646298d6d778209d38dcae03545c63a5687833528a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_connmark={0x108, 0x7, 0x0, 0x0, {{0xd}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xd02, 0x4, 0x8, 0xe15}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x59ff, 0x8, 0x3, 0x80000001, 0x4}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xc658, 0x4, 0x7, 0xfff, 0x4}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x401, 0x3, 0x6, 0xc281}, 0xb414}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x3, 0x3, 0xc1b, 0x5c}, 0x401}}]}, {0x49, 0x6, "2b51f3f4efb8500850b37cbf4aa2b3e5e15bac902440c35cd18d1e587bb0473bbd9265a13930b4a18c3a84d57a33669d52a6d6963cc274a6c24ebf784ea5f9894bbdd89d05"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_simple={0x68, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x6, 0x3, '\xda\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x80000000, 0x401, 0x5, 0x2, 0xc2bb}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x12, 0x6, "bd63b166825cca519099372b26cc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_EMATCHES={0x98, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5251, 0x7, 0x7}, {{0x2, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}}}, @TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0x1, 0x9, 0x8001}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}, @TCA_EMATCH_TREE_LIST={0x5c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x3, 0x5}, {0x40, 0x1, 0x4, 0x7f}}}, @TCF_EM_META={0xc, 0x1, 0x0, 0x0, {{0x0, 0x4, 0x7}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x2, 0x3, 0x3}, {0xfffffffe, 0x9, 0x20}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8000, 0x7, 0x3}, {{0x4, 0x1, 0x1}, {0x3, 0x1}}}}]}]}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x81}, 0x4000000) [ 80.856622][ T26] audit: type=1400 audit(1693214841.314:219): avc: denied { open } for pid=6051 comm="syz-executor.4" path="/dev/sg0" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 09:27:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000080)={@void, @val, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @mcast1, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) ioctl$SG_BLKTRACESTOP(r0, 0x1275, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300001}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@newchain={0x388, 0x64, 0x100, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x7, 0xa}, {0x6}, {0x5, 0x4}}, [@TCA_CHAIN={0x8, 0xb, 0x3f}, @filter_kind_options=@f_basic={{0xa}, {0x350, 0x2, [@TCA_BASIC_ACT={0x2b4, 0x3, [@m_ipt={0x140, 0xc, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x7b, 0x6, {0x19, 'security\x00', 0x34, 0xfb, "928bd4bfa191a38d87c3b83a18e676c825708b0f014482116429943bedcab6a61ccd202d34b4f4b11978f97dadc721b0ee294e45cd8608d8934b89a6503eaa23ae6c00f5d0cabc47a0f29a5fc47e8b2a41"}}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x400}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0x4e, 0x6, "55961d8713ee52f71c6e9cb8d992f1bfc2ac3f66f7e4c59c5063bb253dc4ea85941c7ebabb78c252d2a9025633f1d42f