RACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000020300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:05 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:05 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000030300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2880.863873][ T9535] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2880.902940][ T9535] bond225: entered promiscuous mode 13:03:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000040300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000050300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2880.999788][ T9547] gretap227: entered promiscuous mode [ 2881.022543][ T9547] bond225: (slave gretap227): Enslaving as an active interface with an up link 13:03:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2881.179078][ T9567] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2881.281094][ T9567] bond226: entered promiscuous mode [ 2881.370007][ T9573] gretap228: entered promiscuous mode [ 2881.403017][ T9573] bond226: (slave gretap228): Enslaving as an active interface with an up link 13:03:05 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000060300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2881.602912][ T9605] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2881.643977][ T9605] bond227: entered promiscuous mode [ 2881.698844][ T9605] gretap229: entered promiscuous mode [ 2881.715653][ T9605] bond227: (slave gretap229): Enslaving as an active interface with an up link 13:03:06 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:06 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000080300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000090300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2881.840082][ T9613] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000a0300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2881.896504][ T9613] bond228: entered promiscuous mode [ 2881.911738][ T9613] gretap230: entered promiscuous mode [ 2881.918681][ T9613] bond228: (slave gretap230): Enslaving as an active interface with an up link 13:03:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000b0300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2882.019803][ T9623] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2882.101788][ T9623] bond229: entered promiscuous mode [ 2882.157793][ T9629] gretap231: entered promiscuous mode [ 2882.211152][ T9629] bond229: (slave gretap231): Enslaving as an active interface with an up link 13:03:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000c0300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2882.440971][ T9634] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2882.500447][ T9634] bond230: entered promiscuous mode [ 2882.565302][ T9637] gretap232: entered promiscuous mode [ 2882.593783][ T9637] bond230: (slave gretap232): Enslaving as an active interface with an up link 13:03:07 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000d0300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:07 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000e0300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2882.774872][ T9646] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000f0300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000100300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2882.855468][ T9646] bond231: entered promiscuous mode 13:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2882.882060][ T9652] gretap233: entered promiscuous mode [ 2882.888498][ T9652] bond231: (slave gretap233): Enslaving as an active interface with an up link 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000110300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2882.962324][ T9659] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2883.012798][ T9659] bond232: entered promiscuous mode [ 2883.041342][ T9663] gretap234: entered promiscuous mode [ 2883.047722][ T9663] bond232: (slave gretap234): Enslaving as an active interface with an up link 13:03:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000120300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:07 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) 13:03:07 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:07 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000140300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2883.162090][ T9669] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2883.225274][ T9669] bond233: entered promiscuous mode 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000150300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2883.307438][ T9679] gretap235: entered promiscuous mode 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000160300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2883.351064][ T9679] bond233: (slave gretap235): Enslaving as an active interface with an up link 13:03:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000180300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2883.414746][ T9685] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2883.469439][ T9685] bond234: entered promiscuous mode 13:03:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2883.498927][ T9685] gretap236: entered promiscuous mode [ 2883.505623][ T9685] bond234: (slave gretap236): Enslaving as an active interface with an up link [ 2883.605057][ T9692] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2883.640779][ T9692] bond235: entered promiscuous mode [ 2883.733401][ T9694] gretap237: entered promiscuous mode [ 2883.754285][ T9694] bond235: (slave gretap237): Enslaving as an active interface with an up link 13:03:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000640300000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:08 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) 13:03:08 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:08 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2884.010183][ T9696] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2884.085834][ T9696] bond236: entered promiscuous mode [ 2884.100881][ T9705] gretap238: entered promiscuous mode [ 2884.109798][ T9705] bond236: (slave gretap238): Enslaving as an active interface with an up link 13:03:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070400000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2884.217599][ T9713] bond237: entered promiscuous mode 13:03:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070600000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2884.304490][ T9718] gretap239: entered promiscuous mode [ 2884.341597][ T9718] bond237: (slave gretap239): Enslaving as an active interface with an up link 13:03:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070700000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2884.427977][ T9722] bond238: entered promiscuous mode [ 2884.484994][ T9722] gretap240: entered promiscuous mode [ 2884.492905][ T9722] bond238: (slave gretap240): Enslaving as an active interface with an up link 13:03:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:09 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070800000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:09 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) 13:03:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070900000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2884.840403][ T9728] bond239: entered promiscuous mode 13:03:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070a00000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x14}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070b00000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2884.911003][ T9741] gretap241: entered promiscuous mode [ 2884.931140][ T9741] bond239: (slave gretap241): Enslaving as an active interface with an up link 13:03:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070c00000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2885.104113][ T9748] bond240: entered promiscuous mode 13:03:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070d00000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2885.183384][ T9751] gretap242: entered promiscuous mode [ 2885.189228][ T9751] bond240: (slave gretap242): Enslaving as an active interface with an up link 13:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000071000000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:10 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:10 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000071400000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2885.760376][ T9760] bond241: entered promiscuous mode 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000071500000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000071600000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2885.838628][ T9760] gretap243: entered promiscuous mode 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000076400000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2885.902793][ T9760] bond241: (slave gretap243): Enslaving as an active interface with an up link 13:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x23}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070020000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2886.013144][ T9780] bond242: entered promiscuous mode [ 2886.036624][ T9780] gretap244: entered promiscuous mode [ 2886.044816][ T9780] bond242: (slave gretap244): Enslaving as an active interface with an up link 13:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x24}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703fffff00007006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:10 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2886.616038][ T9787] bond243: entered promiscuous mode 13:03:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070302000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2886.693803][ T9787] gretap245: entered promiscuous mode [ 2886.727885][ T9787] bond243: (slave gretap245): Enslaving as an active interface with an up link 13:03:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070303000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070304000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2886.840386][ T9805] __nla_validate_parse: 7 callbacks suppressed [ 2886.840404][ T9805] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070305000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070306000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2886.957819][ T9805] bond244: entered promiscuous mode [ 2887.041697][ T9811] gretap246: entered promiscuous mode [ 2887.059701][ T9811] bond244: (slave gretap246): Enslaving as an active interface with an up link 13:03:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070307000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:11 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070308000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070309000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007030a000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2887.350342][ T9824] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x32}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007030b000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2887.416178][ T9824] bond245: entered promiscuous mode [ 2887.430901][ T9835] gretap247: entered promiscuous mode [ 2887.437607][ T9835] bond245: (slave gretap247): Enslaving as an active interface with an up link 13:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007030c000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2887.533336][ T9841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2887.590507][ T9841] bond246: entered promiscuous mode [ 2887.669811][ T9841] gretap248: entered promiscuous mode [ 2887.680907][ T9841] bond246: (slave gretap248): Enslaving as an active interface with an up link 13:03:12 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007030d000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:12 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:12 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0), 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007030f000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.075588][ T9850] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070310000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.169879][ T9850] bond247: entered promiscuous mode 13:03:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070312000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x48}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2888.264503][ T9864] gretap249: entered promiscuous mode [ 2888.290249][ T9864] bond247: (slave gretap249): Enslaving as an active interface with an up link 13:03:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070313000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.359864][ T9872] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070314000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.418818][ T9872] bond248: entered promiscuous mode [ 2888.460463][ T9872] gretap250: entered promiscuous mode [ 2888.488632][ T9872] bond248: (slave gretap250): Enslaving as an active interface with an up link 13:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070315000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:13 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0), 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:13 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:13 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070316000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.815596][ T9883] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070318000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070319000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.860146][ T9883] bond249: entered promiscuous mode [ 2888.877364][ T9883] gretap251: entered promiscuous mode [ 2888.883348][ T9883] bond249: (slave gretap251): Enslaving as an active interface with an up link 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007031b000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2888.944025][ T9898] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007031c000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007031e000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070321000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2889.059557][ T9898] bond250: entered promiscuous mode [ 2889.111648][ T9903] gretap252: entered promiscuous mode [ 2889.122600][ T9903] bond250: (slave gretap252): Enslaving as an active interface with an up link 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070330000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4d}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:13 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:13 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0), 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:13 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070334000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007033e000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070350000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070360000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2889.573679][ T9916] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070370000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2889.641701][ T9916] bond251: entered promiscuous mode 13:03:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070384000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x58}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2889.708498][ T9923] gretap253: entered promiscuous mode [ 2889.728608][ T9923] bond251: (slave gretap253): Enslaving as an active interface with an up link [ 2889.745399][T21911] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2889.820463][T21911] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2889.884057][ T9940] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703ae000fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2890.039725][ T9940] bond252: entered promiscuous mode [ 2890.050602][T21911] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2890.120979][ T9941] gretap254: entered promiscuous mode [ 2890.189399][ T9941] bond252: (slave gretap254): Enslaving as an active interface with an up link [ 2890.222329][T21911] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2890.805644][T21911] hsr_slave_0: left promiscuous mode [ 2890.811525][T21911] hsr_slave_1: left promiscuous mode [ 2890.817479][T21911] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2890.825205][T21911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2890.833397][T21911] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2890.840888][T21911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2890.849175][T21911] bridge_slave_1: left allmulticast mode [ 2890.854858][T21911] bridge_slave_1: left promiscuous mode [ 2890.860600][T21911] bridge0: port 2(bridge_slave_1) entered disabled state [ 2890.868384][T21911] bridge_slave_0: left allmulticast mode [ 2890.874078][T21911] bridge_slave_0: left promiscuous mode [ 2890.879694][T21911] bridge0: port 1(bridge_slave_0) entered disabled state [ 2890.891124][T21911] veth1_macvtap: left promiscuous mode [ 2890.896642][T21911] veth0_macvtap: left promiscuous mode [ 2890.902243][T21911] veth1_vlan: left promiscuous mode [ 2890.907566][T21911] veth0_vlan: left promiscuous mode [ 2891.000924][T21911] team0 (unregistering): Port device team_slave_1 removed [ 2891.011198][T21911] team0 (unregistering): Port device team_slave_0 removed [ 2891.022056][T21911] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2891.035959][T21911] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2891.070675][T21911] bond0 (unregistering): Released all slaves [ 2891.873128][T10066] chnl_net:caif_netlink_parms(): no params data found [ 2891.908935][T10066] bridge0: port 1(bridge_slave_0) entered blocking state [ 2891.916163][T10066] bridge0: port 1(bridge_slave_0) entered disabled state [ 2891.923434][T10066] bridge_slave_0: entered allmulticast mode [ 2891.930110][T10066] bridge_slave_0: entered promiscuous mode [ 2891.938535][T10066] bridge0: port 2(bridge_slave_1) entered blocking state [ 2891.945704][T10066] bridge0: port 2(bridge_slave_1) entered disabled state [ 2891.954308][T10066] bridge_slave_1: entered allmulticast mode [ 2891.961077][T10066] bridge_slave_1: entered promiscuous mode [ 2891.980831][T10066] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2891.991927][T10066] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2892.013540][T10066] team0: Port device team_slave_0 added [ 2892.020589][T10066] team0: Port device team_slave_1 added [ 2892.037540][T10066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2892.044612][T10066] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2892.070555][T10066] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2892.082904][T10066] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2892.089877][T10066] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2892.116019][T10066] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2892.145942][T10066] hsr_slave_0: entered promiscuous mode [ 2892.152308][T10066] hsr_slave_1: entered promiscuous mode [ 2892.158562][T10066] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2892.166239][T10066] Cannot create hsr debugfs directory [ 2892.547171][T10066] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2892.558836][T10066] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2892.568549][T10066] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2892.579510][T10066] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2892.629036][T10066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2892.649882][T10066] 8021q: adding VLAN 0 to HW filter on device team0 [ 2892.661842][T30078] bridge0: port 1(bridge_slave_0) entered blocking state [ 2892.668968][T30078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2892.690425][T30078] bridge0: port 2(bridge_slave_1) entered blocking state [ 2892.697656][T30078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2892.775000][T10066] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2892.863932][T10066] veth0_vlan: entered promiscuous mode [ 2892.874519][T10066] veth1_vlan: entered promiscuous mode [ 2892.896879][T10066] veth0_macvtap: entered promiscuous mode [ 2892.906386][T10066] veth1_macvtap: entered promiscuous mode [ 2892.921503][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2892.932023][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2892.942018][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2892.952553][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2892.962392][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2892.972836][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2892.982812][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2892.993241][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2893.005062][T10066] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2893.017202][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2893.027746][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2893.037686][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2893.048244][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2893.058190][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2893.068649][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2893.078556][T10066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2893.089065][T10066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2893.100870][T10066] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2893.113168][T10066] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2893.121953][T10066] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2893.130985][T10066] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2893.139993][T10066] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:03:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070357020fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:18 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:18 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:18 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070360020fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.022587][T10275] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2894.065397][T10275] bond253: entered promiscuous mode 13:03:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x68}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300030fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.095366][T10275] gretap255: entered promiscuous mode [ 2894.101326][T10275] bond253: (slave gretap255): Enslaving as an active interface with an up link [ 2894.148172][T10285] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300050fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.247228][T10285] bond254: entered promiscuous mode 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300060fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2894.271180][T10288] gretap256: entered promiscuous mode [ 2894.277410][T10288] bond254: (slave gretap256): Enslaving as an active interface with an up link 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300070fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.361135][T10297] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2894.456856][T10297] bond255: entered promiscuous mode 13:03:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf6700000000000007031b070fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.490908][T10299] gretap257: entered promiscuous mode [ 2894.507377][T10299] bond255: (slave gretap257): Enslaving as an active interface with an up link 13:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x74}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300090fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:19 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x0, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:19 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000a0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000b0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.898214][T10310] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2894.936174][T10310] bond256: entered promiscuous mode 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000c0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000d0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2894.974498][T10310] gretap258: entered promiscuous mode [ 2894.980367][T10310] bond256: (slave gretap258): Enslaving as an active interface with an up link 13:03:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000f0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300120fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2895.109821][T10331] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2895.165139][T10331] bond257: entered promiscuous mode [ 2895.196640][T10337] gretap259: entered promiscuous mode [ 2895.202870][T10337] bond257: (slave gretap259): Enslaving as an active interface with an up link 13:03:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300130fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2895.673656][T10341] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:20 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x0, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:20 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300140fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2895.724142][T10341] bond258: entered promiscuous mode [ 2895.738479][T10343] gretap260: entered promiscuous mode [ 2895.754437][T10343] bond258: (slave gretap260): Enslaving as an active interface with an up link 13:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x86}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300150fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2895.891219][T10354] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300160fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2895.938802][T10354] bond259: entered promiscuous mode [ 2895.999434][T10354] gretap261: entered promiscuous mode 13:03:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300180fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300190fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2896.051020][T10354] bond259: (slave gretap261): Enslaving as an active interface with an up link 13:03:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2896.248336][T10371] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2896.290778][T10371] bond260: entered promiscuous mode [ 2896.410248][T10371] gretap262: entered promiscuous mode [ 2896.434983][T10371] bond260: (slave gretap262): Enslaving as an active interface with an up link 13:03:21 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x0, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001b0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xaa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:21 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x0, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703071b0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001c0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2896.696558][T10381] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001e0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2896.810299][T10381] bond261: entered promiscuous mode 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001f0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300200fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2896.933382][T10389] gretap263: entered promiscuous mode [ 2896.963491][T10389] bond261: (slave gretap263): Enslaving as an active interface with an up link 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300210fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:21 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb0}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:21 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:21 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x0, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:21 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300300fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300340fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2897.620033][T10407] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703003e0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2897.713212][T10407] bond262: entered promiscuous mode 13:03:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703003f0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300400fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300500fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xd3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2897.879881][T10418] gretap264: entered promiscuous mode [ 2897.886874][T10418] bond262: (slave gretap264): Enslaving as an active interface with an up link [ 2897.958422][T10428] bond263: entered promiscuous mode 13:03:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070302570fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2898.004054][T10428] gretap265: entered promiscuous mode [ 2898.010028][T10428] bond263: (slave gretap265): Enslaving as an active interface with an up link 13:03:22 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x0, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 2899.241327][T25518] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2899.307048][T25518] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2899.366669][T25518] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2899.427534][T25518] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2900.035634][T25518] hsr_slave_0: left promiscuous mode [ 2900.041479][T25518] hsr_slave_1: left promiscuous mode [ 2900.047638][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2900.055198][T25518] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2900.064051][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2900.071499][T25518] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2900.079681][T25518] bridge_slave_1: left allmulticast mode [ 2900.085381][T25518] bridge_slave_1: left promiscuous mode [ 2900.091034][T25518] bridge0: port 2(bridge_slave_1) entered disabled state [ 2900.099067][T25518] bridge_slave_0: left allmulticast mode [ 2900.104768][T25518] bridge_slave_0: left promiscuous mode [ 2900.110452][T25518] bridge0: port 1(bridge_slave_0) entered disabled state [ 2900.123247][T25518] veth1_macvtap: left promiscuous mode [ 2900.128794][T25518] veth0_macvtap: left promiscuous mode [ 2900.134355][T25518] veth1_vlan: left promiscuous mode [ 2900.139594][T25518] veth0_vlan: left promiscuous mode [ 2900.244888][T25518] team0 (unregistering): Port device team_slave_1 removed [ 2900.255566][T25518] team0 (unregistering): Port device team_slave_0 removed [ 2900.266039][T25518] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2900.278249][T25518] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2900.314401][T25518] bond0 (unregistering): Released all slaves [ 2900.968875][T10537] chnl_net:caif_netlink_parms(): no params data found [ 2901.010367][T10537] bridge0: port 1(bridge_slave_0) entered blocking state [ 2901.017617][T10537] bridge0: port 1(bridge_slave_0) entered disabled state [ 2901.025757][T10537] bridge_slave_0: entered allmulticast mode [ 2901.032399][T10537] bridge_slave_0: entered promiscuous mode [ 2901.039551][T10537] bridge0: port 2(bridge_slave_1) entered blocking state [ 2901.046730][T10537] bridge0: port 2(bridge_slave_1) entered disabled state [ 2901.054090][T10537] bridge_slave_1: entered allmulticast mode [ 2901.060700][T10537] bridge_slave_1: entered promiscuous mode [ 2901.080798][T10537] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2901.091958][T10537] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2901.114692][T10537] team0: Port device team_slave_0 added [ 2901.121747][T10537] team0: Port device team_slave_1 added [ 2901.141059][T10537] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2901.148068][T10537] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2901.174055][T10537] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2901.185864][T10537] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2901.192874][T10537] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2901.218795][T10537] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2901.249866][T10537] hsr_slave_0: entered promiscuous mode [ 2901.256213][T10537] hsr_slave_1: entered promiscuous mode [ 2901.262886][T10537] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2901.270834][T10537] Cannot create hsr debugfs directory [ 2901.612728][T10537] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2901.623963][T10537] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2901.633128][T10537] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2901.643713][T10537] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2901.694362][T10537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2901.711578][T10537] 8021q: adding VLAN 0 to HW filter on device team0 [ 2901.722386][T30078] bridge0: port 1(bridge_slave_0) entered blocking state [ 2901.729488][T30078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2901.756782][T30078] bridge0: port 2(bridge_slave_1) entered blocking state [ 2901.763948][T30078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2901.835991][T10537] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2901.926237][T10537] veth0_vlan: entered promiscuous mode [ 2901.935931][T10537] veth1_vlan: entered promiscuous mode [ 2901.958898][T10537] veth0_macvtap: entered promiscuous mode [ 2901.968544][T10537] veth1_macvtap: entered promiscuous mode [ 2901.981408][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2901.991975][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.001921][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2902.012425][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.022293][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2902.032865][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.042848][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2902.053404][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.064749][T10537] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2902.078179][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2902.088714][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.098715][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2902.109184][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.119056][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2902.129691][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.139616][T10537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2902.150099][T10537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2902.161468][T10537] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2902.173569][T10537] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2902.182368][T10537] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2902.191086][T10537] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2902.200006][T10537] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300600fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xdb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:27 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:27 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x0, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:27 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070302600fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2902.933701][T10738] __nla_validate_parse: 1 callbacks suppressed [ 2902.933719][T10738] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300700fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2903.029839][T10738] bond264: entered promiscuous mode 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300840fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300ae0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2903.152178][T10743] gretap266: entered promiscuous mode [ 2903.172634][T10743] bond264: (slave gretap266): Enslaving as an active interface with an up link 13:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xdc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300ff0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2903.348721][T10768] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2903.411918][T10768] bond265: entered promiscuous mode 13:03:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000007ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe0}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2903.463610][T10768] gretap267: entered promiscuous mode [ 2903.469603][T10768] bond265: (slave gretap267): Enslaving as an active interface with an up link [ 2903.571227][T10784] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2903.642589][T10784] bond266: entered promiscuous mode [ 2903.683185][T10790] gretap268: entered promiscuous mode [ 2903.689096][T10790] bond266: (slave gretap268): Enslaving as an active interface with an up link 13:03:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000dff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xec}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:28 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:28 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x0, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2903.980587][T10799] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2904.067915][T10799] bond267: entered promiscuous mode 13:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2904.101968][T10808] gretap269: entered promiscuous mode [ 2904.107866][T10808] bond267: (slave gretap269): Enslaving as an active interface with an up link 13:03:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300020fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2904.181899][T10812] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300030fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2904.255080][T10812] bond268: entered promiscuous mode 13:03:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2904.280996][T10816] gretap270: entered promiscuous mode [ 2904.286992][T10816] bond268: (slave gretap270): Enslaving as an active interface with an up link 13:03:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300040fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300050fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2904.423436][T10820] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2904.490808][T10820] bond269: entered promiscuous mode [ 2904.535766][T10824] gretap271: entered promiscuous mode [ 2904.541953][T10824] bond269: (slave gretap271): Enslaving as an active interface with an up link 13:03:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300060fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:29 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:29 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x0, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:29 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300070fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2904.853747][T10830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300080fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2904.927690][T10830] bond270: entered promiscuous mode 13:03:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300090fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2905.016850][T10838] gretap272: entered promiscuous mode [ 2905.051254][T10838] bond270: (slave gretap272): Enslaving as an active interface with an up link 13:03:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000a0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x126}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000b0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2905.167342][T10849] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2905.232762][T10849] bond271: entered promiscuous mode [ 2905.266454][T10857] gretap273: entered promiscuous mode [ 2905.272442][T10857] bond271: (slave gretap273): Enslaving as an active interface with an up link 13:03:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000c0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x134}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:30 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2905.774663][T10860] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2905.836465][T10860] bond272: entered promiscuous mode 13:03:30 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:30 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:30 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000d0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000f0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2905.859248][T10866] gretap274: entered promiscuous mode [ 2905.867173][T10866] bond272: (slave gretap274): Enslaving as an active interface with an up link 13:03:30 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300100fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:30 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:31 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300120fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x140}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:31 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:31 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300130fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300140fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2906.693507][T10892] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300150fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2906.778728][T10892] bond273: entered promiscuous mode 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300160fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2906.850780][T10899] gretap275: entered promiscuous mode [ 2906.881356][T10899] bond273: (slave gretap275): Enslaving as an active interface with an up link 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300180fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x157}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2907.071053][T10915] bond274: entered promiscuous mode [ 2907.145261][T10917] gretap276: entered promiscuous mode [ 2907.151170][T10917] bond274: (slave gretap276): Enslaving as an active interface with an up link 13:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x159}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300190fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:31 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:31 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) [ 2907.588652][T10925] bond275: entered promiscuous mode 13:03:32 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001b0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2907.627474][T10925] gretap277: entered promiscuous mode [ 2907.650263][T10925] bond275: (slave gretap277): Enslaving as an active interface with an up link 13:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x15d}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001c0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2907.781428][T10933] bond276: entered promiscuous mode 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703001e0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2907.816520][T10933] gretap278: entered promiscuous mode 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300210fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2907.875497][T10933] bond276: (slave gretap278): Enslaving as an active interface with an up link 13:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x166}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300300fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300340fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2907.980758][T10948] __nla_validate_parse: 3 callbacks suppressed [ 2907.980775][T10948] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2908.058248][T10948] bond277: entered promiscuous mode [ 2908.146006][T10951] gretap279: entered promiscuous mode [ 2908.153988][T10951] bond277: (slave gretap279): Enslaving as an active interface with an up link 13:03:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703003e0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:33 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x169}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2908.625198][T10956] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:33 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:33 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300500fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2908.688675][T10956] bond278: entered promiscuous mode 13:03:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300600fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2908.728532][T10958] gretap280: entered promiscuous mode [ 2908.734876][T10958] bond278: (slave gretap280): Enslaving as an active interface with an up link 13:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x18e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300700fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2908.832625][T10973] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2908.869303][T10973] bond279: entered promiscuous mode 13:03:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300840fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2908.954609][T10973] gretap281: entered promiscuous mode [ 2908.985290][T10973] bond279: (slave gretap281): Enslaving as an active interface with an up link 13:03:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300ae0fff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1a5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2909.097595][T10985] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2909.161898][T10985] bond280: entered promiscuous mode [ 2909.213424][T10987] gretap282: entered promiscuous mode [ 2909.219491][T10987] bond280: (slave gretap282): Enslaving as an active interface with an up link 13:03:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000014ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1b4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:34 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:34 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:34 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2909.583354][T10991] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2909.620631][T10991] bond281: entered promiscuous mode 13:03:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000015ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2909.688993][T10991] gretap283: entered promiscuous mode [ 2909.726192][T10991] bond281: (slave gretap283): Enslaving as an active interface with an up link 13:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1bc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000016ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2909.850341][T11007] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2909.915351][T11007] bond282: entered promiscuous mode [ 2909.953534][T11007] gretap284: entered promiscuous mode [ 2909.961872][T11007] bond282: (slave gretap284): Enslaving as an active interface with an up link 13:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1c9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000018ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2910.083099][T11014] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2910.140931][T11014] bond283: entered promiscuous mode 13:03:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000020ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2910.203047][T11014] gretap285: entered promiscuous mode [ 2910.239866][T11014] bond283: (slave gretap285): Enslaving as an active interface with an up link 13:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1ca}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000064ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2910.399630][T11021] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2910.462891][T11021] bond284: entered promiscuous mode [ 2910.534263][T11023] gretap286: entered promiscuous mode [ 2910.540217][T11023] bond284: (slave gretap286): Enslaving as an active interface with an up link 13:03:35 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f5356") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:35 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000007ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:35 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) [ 2910.942690][T25518] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2911.071594][T25518] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2911.147972][T25518] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2911.230073][T25518] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 13:03:35 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80), &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:36 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f5356") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) [ 2912.059181][T25518] hsr_slave_0: left promiscuous mode [ 2912.091216][T25518] hsr_slave_1: left promiscuous mode [ 2912.106979][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2912.114605][T25518] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2912.133168][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2912.140765][T25518] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2912.174140][T25518] bridge_slave_1: left allmulticast mode [ 2912.179892][T25518] bridge_slave_1: left promiscuous mode [ 2912.185574][T25518] bridge0: port 2(bridge_slave_1) entered disabled state [ 2912.291287][T25518] bridge_slave_0: left allmulticast mode [ 2912.297025][T25518] bridge_slave_0: left promiscuous mode [ 2912.302802][T25518] bridge0: port 1(bridge_slave_0) entered disabled state 13:03:36 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80), &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 2912.367647][T25518] veth1_macvtap: left promiscuous mode [ 2912.373264][T25518] veth0_macvtap: left promiscuous mode [ 2912.378840][T25518] veth1_vlan: left promiscuous mode [ 2912.384354][T25518] veth0_vlan: left promiscuous mode 13:03:37 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f5356") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2912.719401][T25518] team0 (unregistering): Port device team_slave_1 removed [ 2912.754943][T25518] team0 (unregistering): Port device team_slave_0 removed [ 2912.783016][T25518] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 13:03:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) [ 2912.826265][T25518] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2912.942825][T25518] bond0 (unregistering): Released all slaves 13:03:37 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80), &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:38 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2913.696767][T11107] chnl_net:caif_netlink_parms(): no params data found [ 2913.818347][T11107] bridge0: port 1(bridge_slave_0) entered blocking state [ 2913.825695][T11107] bridge0: port 1(bridge_slave_0) entered disabled state [ 2913.833381][T11107] bridge_slave_0: entered allmulticast mode [ 2913.840243][T11107] bridge_slave_0: entered promiscuous mode [ 2913.847641][T11107] bridge0: port 2(bridge_slave_1) entered blocking state [ 2913.854845][T11107] bridge0: port 2(bridge_slave_1) entered disabled state [ 2913.896566][T11107] bridge_slave_1: entered allmulticast mode [ 2913.918964][T11107] bridge_slave_1: entered promiscuous mode [ 2913.946619][T25518] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2914.243151][T25518] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2914.323892][T11107] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2914.339431][T11107] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2914.382916][T25518] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2914.503029][T25518] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2914.533415][T11107] team0: Port device team_slave_0 added [ 2914.582645][T11107] team0: Port device team_slave_1 added [ 2914.642046][T11107] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2914.649082][T11107] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2914.675030][T11107] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2914.718504][T11107] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2914.725530][T11107] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2914.751471][T11107] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2914.809248][T25518] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2914.933613][T25518] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2914.990291][T11107] hsr_slave_0: entered promiscuous mode [ 2914.997556][T11107] hsr_slave_1: entered promiscuous mode [ 2915.027563][T25518] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2915.099647][T25518] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2915.230230][T11161] chnl_net:caif_netlink_parms(): no params data found [ 2915.239767][T11158] chnl_net:caif_netlink_parms(): no params data found [ 2915.354077][T11161] bridge0: port 1(bridge_slave_0) entered blocking state [ 2915.361286][T11161] bridge0: port 1(bridge_slave_0) entered disabled state [ 2915.369659][T11161] bridge_slave_0: entered allmulticast mode [ 2915.377120][T11161] bridge_slave_0: entered promiscuous mode [ 2915.423616][T11161] bridge0: port 2(bridge_slave_1) entered blocking state [ 2915.430697][T11161] bridge0: port 2(bridge_slave_1) entered disabled state [ 2915.439934][T11161] bridge_slave_1: entered allmulticast mode [ 2915.453495][T11161] bridge_slave_1: entered promiscuous mode [ 2915.532060][T11161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2915.547579][T11158] bridge0: port 1(bridge_slave_0) entered blocking state [ 2915.554812][T11158] bridge0: port 1(bridge_slave_0) entered disabled state [ 2915.562921][T11158] bridge_slave_0: entered allmulticast mode [ 2915.569748][T11158] bridge_slave_0: entered promiscuous mode [ 2915.589661][T11161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2915.599103][T11158] bridge0: port 2(bridge_slave_1) entered blocking state [ 2915.606232][T11158] bridge0: port 2(bridge_slave_1) entered disabled state [ 2915.616827][T11158] bridge_slave_1: entered allmulticast mode [ 2915.623882][T11158] bridge_slave_1: entered promiscuous mode [ 2915.654091][T11161] team0: Port device team_slave_0 added [ 2915.680602][T11161] team0: Port device team_slave_1 added [ 2915.690269][T11158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2915.716736][T11158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2915.726577][T11161] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2915.733574][T11161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2915.759719][T11161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2915.826341][T11161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2915.833380][T11161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2915.859388][T11161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2915.873940][T11158] team0: Port device team_slave_0 added [ 2915.919525][T11158] team0: Port device team_slave_1 added [ 2915.960865][T11161] hsr_slave_0: entered promiscuous mode [ 2915.969660][T11161] hsr_slave_1: entered promiscuous mode [ 2915.976224][T11161] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2915.985862][T11161] Cannot create hsr debugfs directory [ 2916.000284][T11158] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2916.007490][T11158] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2916.033491][T11158] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2916.437524][T25518] gretap1 (unregistering): left allmulticast mode [ 2916.444073][T25518] gretap1 (unregistering): left promiscuous mode [ 2916.450431][T25518] bridge0: port 3(gretap1) entered disabled state [ 2916.461560][T25518] bond0: (slave gretap2): Releasing backup interface [ 2916.471428][T25518] bond1: (slave gretap3): Releasing backup interface [ 2916.481085][T25518] gretap3 (unregistering): left promiscuous mode [ 2916.491031][T25518] bond2: (slave gretap4): Releasing backup interface [ 2916.498701][T25518] gretap4 (unregistering): left promiscuous mode [ 2916.507724][T25518] bond3: (slave gretap5): Releasing backup interface [ 2916.515213][T25518] gretap5 (unregistering): left promiscuous mode [ 2916.524315][T25518] bond4: (slave gretap6): Releasing backup interface [ 2916.531589][T25518] gretap6 (unregistering): left promiscuous mode [ 2916.541168][T25518] bond5: (slave gretap7): Releasing backup interface [ 2916.548415][T25518] gretap7 (unregistering): left promiscuous mode [ 2916.557617][T25518] bond6: (slave gretap8): Releasing backup interface [ 2916.565925][T25518] gretap8 (unregistering): left promiscuous mode [ 2916.576918][T25518] bond7: (slave gretap9): Releasing backup interface [ 2916.584242][T25518] gretap9 (unregistering): left promiscuous mode [ 2916.593494][T25518] bond8: (slave gretap10): Releasing backup interface [ 2916.600974][T25518] gretap10 (unregistering): left promiscuous mode [ 2916.612468][T25518] bond9: (slave gretap11): Releasing backup interface [ 2916.619817][T25518] gretap11 (unregistering): left promiscuous mode [ 2916.629440][T25518] bond10: (slave gretap12): Releasing backup interface [ 2916.636938][T25518] gretap12 (unregistering): left promiscuous mode [ 2916.647965][T25518] bond11: (slave gretap13): Releasing backup interface [ 2916.655551][T25518] gretap13 (unregistering): left promiscuous mode [ 2916.665658][T25518] bond12: (slave gretap14): Releasing backup interface [ 2916.673639][T25518] gretap14 (unregistering): left promiscuous mode [ 2916.683142][T25518] bond13: (slave gretap15): Releasing backup interface [ 2916.690656][T25518] gretap15 (unregistering): left promiscuous mode [ 2916.699779][T25518] bond14: (slave gretap16): Releasing backup interface [ 2916.707316][T25518] gretap16 (unregistering): left promiscuous mode [ 2916.717288][T25518] bond15: (slave gretap17): Releasing backup interface [ 2916.724981][T25518] gretap17 (unregistering): left promiscuous mode [ 2916.734214][T25518] bond16: (slave gretap18): Releasing backup interface [ 2916.741663][T25518] gretap18 (unregistering): left promiscuous mode [ 2916.752730][T25518] bond17: (slave gretap19): Releasing backup interface [ 2916.760255][T25518] gretap19 (unregistering): left promiscuous mode [ 2916.769790][T25518] bond18: (slave gretap20): Releasing backup interface [ 2916.777381][T25518] gretap20 (unregistering): left promiscuous mode [ 2916.788596][T25518] bond19: (slave gretap21): Releasing backup interface [ 2916.796321][T25518] gretap21 (unregistering): left promiscuous mode [ 2916.810205][T25518] bond20: (slave gretap22): Releasing backup interface [ 2916.817556][T25518] gretap22 (unregistering): left promiscuous mode [ 2916.827451][T25518] bond21: (slave gretap23): Releasing backup interface [ 2916.834965][T25518] gretap23 (unregistering): left promiscuous mode [ 2916.846269][T25518] bond22: (slave gretap24): Releasing backup interface [ 2916.853797][T25518] gretap24 (unregistering): left promiscuous mode [ 2916.863367][T25518] bond23: (slave gretap25): Releasing backup interface [ 2916.870773][T25518] gretap25 (unregistering): left promiscuous mode [ 2916.881884][T25518] bond24: (slave gretap26): Releasing backup interface [ 2916.889670][T25518] gretap26 (unregistering): left promiscuous mode [ 2916.900764][T25518] bond25: (slave gretap27): Releasing backup interface [ 2916.908446][T25518] gretap27 (unregistering): left promiscuous mode [ 2916.920771][T25518] bond26: (slave gretap28): Releasing backup interface [ 2916.928390][T25518] gretap28 (unregistering): left promiscuous mode [ 2916.938512][T25518] bond27: (slave gretap29): Releasing backup interface [ 2916.946064][T25518] gretap29 (unregistering): left promiscuous mode [ 2916.956053][T25518] bond28: (slave gretap30): Releasing backup interface [ 2916.963815][T25518] gretap30 (unregistering): left promiscuous mode [ 2916.973010][T25518] bond29: (slave gretap31): Releasing backup interface [ 2916.980487][T25518] gretap31 (unregistering): left promiscuous mode [ 2916.989096][T25518] bond30: (slave gretap32): Releasing backup interface [ 2916.996600][T25518] gretap32 (unregistering): left promiscuous mode [ 2917.005868][T25518] bond31: (slave gretap33): Releasing backup interface [ 2917.013530][T25518] gretap33 (unregistering): left promiscuous mode [ 2917.022656][T25518] bond32: (slave gretap34): Releasing backup interface [ 2917.030253][T25518] gretap34 (unregistering): left promiscuous mode [ 2917.041177][T25518] bond33: (slave gretap35): Releasing backup interface [ 2917.049722][T25518] gretap35 (unregistering): left promiscuous mode [ 2917.060436][T25518] bond34: (slave gretap36): Releasing backup interface [ 2917.067992][T25518] gretap36 (unregistering): left promiscuous mode [ 2917.078983][T25518] bond35: (slave gretap37): Releasing backup interface [ 2917.086518][T25518] gretap37 (unregistering): left promiscuous mode [ 2917.096638][T25518] bond36: (slave gretap38): Releasing backup interface [ 2917.104208][T25518] gretap38 (unregistering): left promiscuous mode [ 2917.113431][T25518] bond37: (slave gretap39): Releasing backup interface [ 2917.120849][T25518] gretap39 (unregistering): left promiscuous mode [ 2917.130292][T25518] bond38: (slave gretap40): Releasing backup interface [ 2917.137811][T25518] gretap40 (unregistering): left promiscuous mode [ 2917.146962][T25518] bond39: (slave gretap41): Releasing backup interface [ 2917.155335][T25518] gretap41 (unregistering): left promiscuous mode [ 2917.164719][T25518] bond40: (slave gretap42): Releasing backup interface [ 2917.172607][T25518] gretap42 (unregistering): left promiscuous mode [ 2917.181574][T25518] bond41: (slave gretap43): Releasing backup interface [ 2917.189209][T25518] gretap43 (unregistering): left promiscuous mode [ 2917.198316][T25518] bond42: (slave gretap44): Releasing backup interface [ 2917.205955][T25518] gretap44 (unregistering): left promiscuous mode [ 2917.215070][T25518] bond43: (slave gretap45): Releasing backup interface [ 2917.222712][T25518] gretap45 (unregistering): left promiscuous mode [ 2917.231912][T25518] bond44: (slave gretap46): Releasing backup interface [ 2917.239482][T25518] gretap46 (unregistering): left promiscuous mode [ 2917.248940][T25518] bond45: (slave gretap47): Releasing backup interface [ 2917.256534][T25518] gretap47 (unregistering): left promiscuous mode [ 2917.266442][T25518] bond46: (slave gretap48): Releasing backup interface [ 2917.274086][T25518] gretap48 (unregistering): left promiscuous mode [ 2917.283832][T25518] bond47: (slave gretap49): Releasing backup interface [ 2917.291454][T25518] gretap49 (unregistering): left promiscuous mode [ 2917.300673][T25518] bond48: (slave gretap50): Releasing backup interface [ 2917.308120][T25518] gretap50 (unregistering): left promiscuous mode [ 2917.317675][T25518] bond49: (slave gretap51): Releasing backup interface [ 2917.326664][T25518] gretap51 (unregistering): left promiscuous mode [ 2917.335891][T25518] bond50: (slave gretap52): Releasing backup interface [ 2917.343520][T25518] gretap52 (unregistering): left promiscuous mode [ 2917.352345][T25518] bond51: (slave gretap53): Releasing backup interface [ 2917.359819][T25518] gretap53 (unregistering): left promiscuous mode [ 2917.368963][T25518] bond52: (slave gretap54): Releasing backup interface [ 2917.377397][T25518] gretap54 (unregistering): left promiscuous mode [ 2917.386724][T25518] bond53: (slave gretap55): Releasing backup interface [ 2917.394281][T25518] gretap55 (unregistering): left promiscuous mode [ 2917.403443][T25518] bond54: (slave gretap56): Releasing backup interface [ 2917.410810][T25518] gretap56 (unregistering): left promiscuous mode [ 2917.419893][T25518] bond55: (slave gretap57): Releasing backup interface [ 2917.427281][T25518] gretap57 (unregistering): left promiscuous mode [ 2917.436387][T25518] bond56: (slave gretap58): Releasing backup interface [ 2917.443918][T25518] gretap58 (unregistering): left promiscuous mode [ 2917.453023][T25518] bond57: (slave gretap59): Releasing backup interface [ 2917.460678][T25518] gretap59 (unregistering): left promiscuous mode [ 2917.470093][T25518] bond58: (slave gretap60): Releasing backup interface [ 2917.477755][T25518] gretap60 (unregistering): left promiscuous mode [ 2917.487861][T25518] bond59: (slave gretap61): Releasing backup interface [ 2917.495453][T25518] gretap61 (unregistering): left promiscuous mode [ 2917.505071][T25518] bond60: (slave gretap62): Releasing backup interface [ 2917.512702][T25518] gretap62 (unregistering): left promiscuous mode [ 2917.521727][T25518] bond61: (slave gretap63): Releasing backup interface [ 2917.529303][T25518] gretap63 (unregistering): left promiscuous mode [ 2917.538521][T25518] bond62: (slave gretap64): Releasing backup interface [ 2917.546126][T25518] gretap64 (unregistering): left promiscuous mode [ 2917.555198][T25518] bond63: (slave gretap65): Releasing backup interface [ 2917.562910][T25518] gretap65 (unregistering): left promiscuous mode [ 2917.571737][T25518] bond64: (slave gretap66): Releasing backup interface [ 2917.579328][T25518] gretap66 (unregistering): left promiscuous mode [ 2917.588398][T25518] bond65: (slave gretap67): Releasing backup interface [ 2917.598319][T25518] gretap67 (unregistering): left promiscuous mode [ 2917.607261][T25518] bond66: (slave gretap68): Releasing backup interface [ 2917.615038][T25518] gretap68 (unregistering): left promiscuous mode [ 2917.624538][T25518] bond67: (slave gretap69): Releasing backup interface [ 2917.632339][T25518] gretap69 (unregistering): left promiscuous mode [ 2917.641753][T25518] bond68: (slave gretap70): Releasing backup interface [ 2917.649366][T25518] gretap70 (unregistering): left promiscuous mode [ 2917.658215][T25518] bond69: (slave gretap71): Releasing backup interface [ 2917.665894][T25518] gretap71 (unregistering): left promiscuous mode [ 2917.674794][T25518] bond70: (slave gretap72): Releasing backup interface [ 2917.684791][T25518] gretap72 (unregistering): left promiscuous mode [ 2917.694006][T25518] bond71: (slave gretap73): Releasing backup interface [ 2917.701620][T25518] gretap73 (unregistering): left promiscuous mode [ 2917.711699][T25518] bond72: (slave gretap74): Releasing backup interface [ 2917.719176][T25518] gretap74 (unregistering): left promiscuous mode [ 2917.728883][T25518] bond73: (slave gretap75): Releasing backup interface [ 2917.736552][T25518] gretap75 (unregistering): left promiscuous mode [ 2917.746139][T25518] bond74: (slave gretap76): Releasing backup interface [ 2917.753715][T25518] gretap76 (unregistering): left promiscuous mode [ 2917.763342][T25518] bond75: (slave gretap77): Releasing backup interface [ 2917.770889][T25518] gretap77 (unregistering): left promiscuous mode [ 2917.780287][T25518] bond76: (slave gretap78): Releasing backup interface [ 2917.787982][T25518] gretap78 (unregistering): left promiscuous mode [ 2917.797505][T25518] bond77: (slave gretap79): Releasing backup interface [ 2917.804941][T25518] gretap79 (unregistering): left promiscuous mode [ 2917.814050][T25518] bond78: (slave gretap80): Releasing backup interface [ 2917.821722][T25518] gretap80 (unregistering): left promiscuous mode [ 2917.831831][T25518] bond79: (slave gretap81): Releasing backup interface [ 2917.839423][T25518] gretap81 (unregistering): left promiscuous mode [ 2917.848988][T25518] bond80: (slave gretap82): Releasing backup interface [ 2917.856662][T25518] gretap82 (unregistering): left promiscuous mode [ 2917.865918][T25518] bond81: (slave gretap83): Releasing backup interface [ 2917.873509][T25518] gretap83 (unregistering): left promiscuous mode [ 2917.882503][T25518] bond82: (slave gretap84): Releasing backup interface [ 2917.890015][T25518] gretap84 (unregistering): left promiscuous mode [ 2917.899080][T25518] bond83: (slave gretap85): Releasing backup interface [ 2917.906852][T25518] gretap85 (unregistering): left promiscuous mode [ 2917.915867][T25518] bond84: (slave gretap86): Releasing backup interface [ 2917.923536][T25518] gretap86 (unregistering): left promiscuous mode [ 2917.932785][T25518] bond85: (slave gretap87): Releasing backup interface [ 2917.940409][T25518] gretap87 (unregistering): left promiscuous mode [ 2917.950291][T25518] bond86: (slave gretap88): Releasing backup interface [ 2917.957925][T25518] gretap88 (unregistering): left promiscuous mode [ 2917.967658][T25518] bond87: (slave gretap89): Releasing backup interface [ 2917.975257][T25518] gretap89 (unregistering): left promiscuous mode [ 2917.984411][T25518] bond88: (slave gretap90): Releasing backup interface [ 2917.991998][T25518] gretap90 (unregistering): left promiscuous mode [ 2918.000971][T25518] bond89: (slave gretap91): Releasing backup interface [ 2918.008793][T25518] gretap91 (unregistering): left promiscuous mode [ 2918.017619][T25518] bond90: (slave gretap92): Releasing backup interface [ 2918.025259][T25518] gretap92 (unregistering): left promiscuous mode [ 2918.034405][T25518] bond91: (slave gretap93): Releasing backup interface [ 2918.041887][T25518] gretap93 (unregistering): left promiscuous mode [ 2918.051106][T25518] bond92: (slave gretap94): Releasing backup interface [ 2918.059249][T25518] gretap94 (unregistering): left promiscuous mode [ 2918.068444][T25518] bond93: (slave gretap95): Releasing backup interface [ 2918.075971][T25518] gretap95 (unregistering): left promiscuous mode [ 2918.084799][T25518] bond94: (slave gretap96): Releasing backup interface [ 2918.092301][T25518] gretap96 (unregistering): left promiscuous mode [ 2918.101089][T25518] bond95: (slave gretap97): Releasing backup interface [ 2918.108518][T25518] gretap97 (unregistering): left promiscuous mode [ 2918.117479][T25518] bond96: (slave gretap98): Releasing backup interface [ 2918.124996][T25518] gretap98 (unregistering): left promiscuous mode [ 2918.134024][T25518] bond97: (slave gretap99): Releasing backup interface [ 2918.141541][T25518] gretap99 (unregistering): left promiscuous mode [ 2918.151112][T25518] bond98: (slave gretap100): Releasing backup interface [ 2918.158754][T25518] gretap100 (unregistering): left promiscuous mode [ 2918.168731][T25518] bond99: (slave gretap101): Releasing backup interface [ 2918.176398][T25518] gretap101 (unregistering): left promiscuous mode [ 2918.186116][T25518] bond100: (slave gretap102): Releasing backup interface [ 2918.193725][T25518] gretap102 (unregistering): left promiscuous mode [ 2918.202984][T25518] bond101: (slave gretap103): Releasing backup interface [ 2918.210612][T25518] gretap103 (unregistering): left promiscuous mode [ 2918.219838][T25518] bond102: (slave gretap104): Releasing backup interface [ 2918.227566][T25518] gretap104 (unregistering): left promiscuous mode [ 2918.237006][T25518] bond103: (slave gretap105): Releasing backup interface [ 2918.244628][T25518] gretap105 (unregistering): left promiscuous mode [ 2918.253724][T25518] bond104: (slave gretap106): Releasing backup interface [ 2918.261395][T25518] gretap106 (unregistering): left promiscuous mode [ 2918.270715][T25518] bond105: (slave gretap107): Releasing backup interface [ 2918.279166][T25518] gretap107 (unregistering): left promiscuous mode [ 2918.288447][T25518] bond106: (slave gretap108): Releasing backup interface [ 2918.296236][T25518] gretap108 (unregistering): left promiscuous mode [ 2918.306272][T25518] bond107: (slave gretap109): Releasing backup interface [ 2918.314130][T25518] gretap109 (unregistering): left promiscuous mode [ 2918.323329][T25518] bond108: (slave gretap110): Releasing backup interface [ 2918.330911][T25518] gretap110 (unregistering): left promiscuous mode [ 2918.340116][T25518] bond109: (slave gretap111): Releasing backup interface [ 2918.347957][T25518] gretap111 (unregistering): left promiscuous mode [ 2918.357226][T25518] bond110: (slave gretap112): Releasing backup interface [ 2918.364902][T25518] gretap112 (unregistering): left promiscuous mode [ 2918.374415][T25518] bond111: (slave gretap113): Releasing backup interface [ 2918.383098][T25518] gretap113 (unregistering): left promiscuous mode [ 2918.392740][T25518] bond112: (slave gretap114): Releasing backup interface [ 2918.400283][T25518] gretap114 (unregistering): left promiscuous mode [ 2918.409614][T25518] bond113: (slave gretap115): Releasing backup interface [ 2918.417555][T25518] gretap115 (unregistering): left promiscuous mode [ 2918.426773][T25518] bond114: (slave gretap116): Releasing backup interface [ 2918.434578][T25518] gretap116 (unregistering): left promiscuous mode [ 2918.444086][T25518] bond115: (slave gretap117): Releasing backup interface [ 2918.451818][T25518] gretap117 (unregistering): left promiscuous mode [ 2918.461265][T25518] bond116: (slave gretap118): Releasing backup interface [ 2918.469271][T25518] gretap118 (unregistering): left promiscuous mode [ 2918.478399][T25518] bond117: (slave gretap119): Releasing backup interface [ 2918.486109][T25518] gretap119 (unregistering): left promiscuous mode [ 2918.496182][T25518] bond118: (slave gretap120): Releasing backup interface [ 2918.503968][T25518] gretap120 (unregistering): left promiscuous mode [ 2918.513179][T25518] bond119: (slave gretap121): Releasing backup interface [ 2918.520860][T25518] gretap121 (unregistering): left promiscuous mode [ 2918.529981][T25518] bond120: (slave gretap122): Releasing backup interface [ 2918.537740][T25518] gretap122 (unregistering): left promiscuous mode [ 2918.547138][T25518] bond121: (slave gretap123): Releasing backup interface [ 2918.554822][T25518] gretap123 (unregistering): left promiscuous mode [ 2918.564565][T25518] bond122: (slave gretap124): Releasing backup interface [ 2918.572519][T25518] gretap124 (unregistering): left promiscuous mode [ 2918.581446][T25518] bond123: (slave gretap125): Releasing backup interface [ 2918.589376][T25518] gretap125 (unregistering): left promiscuous mode [ 2918.598608][T25518] bond124: (slave gretap126): Releasing backup interface [ 2918.608737][T25518] gretap126 (unregistering): left promiscuous mode [ 2918.617836][T25518] bond125: (slave gretap127): Releasing backup interface [ 2918.625980][T25518] gretap127 (unregistering): left promiscuous mode [ 2918.635135][T25518] bond126: (slave gretap128): Releasing backup interface [ 2918.642924][T25518] gretap128 (unregistering): left promiscuous mode [ 2918.652013][T25518] bond127: (slave gretap129): Releasing backup interface [ 2918.659925][T25518] gretap129 (unregistering): left promiscuous mode [ 2918.669397][T25518] bond128: (slave gretap130): Releasing backup interface [ 2918.677541][T25518] gretap130 (unregistering): left promiscuous mode [ 2918.686954][T25518] bond129: (slave gretap131): Releasing backup interface [ 2918.694819][T25518] gretap131 (unregistering): left promiscuous mode [ 2918.704256][T25518] bond130: (slave gretap132): Releasing backup interface [ 2918.712028][T25518] gretap132 (unregistering): left promiscuous mode [ 2918.722292][T25518] bond131: (slave gretap133): Releasing backup interface [ 2918.731939][T25518] gretap133 (unregistering): left promiscuous mode [ 2918.741584][T25518] bond132: (slave gretap134): Releasing backup interface [ 2918.749646][T25518] gretap134 (unregistering): left promiscuous mode [ 2918.759326][T25518] bond133: (slave gretap135): Releasing backup interface [ 2918.766961][T25518] gretap135 (unregistering): left promiscuous mode [ 2918.776407][T25518] bond134: (slave gretap136): Releasing backup interface [ 2918.784137][T25518] gretap136 (unregistering): left promiscuous mode [ 2918.793514][T25518] bond135: (slave gretap137): Releasing backup interface [ 2918.801283][T25518] gretap137 (unregistering): left promiscuous mode [ 2918.810745][T25518] bond136: (slave gretap138): Releasing backup interface [ 2918.818620][T25518] gretap138 (unregistering): left promiscuous mode [ 2918.828938][T25518] bond137: (slave gretap139): Releasing backup interface [ 2918.836586][T25518] gretap139 (unregistering): left promiscuous mode [ 2918.846298][T25518] bond138: (slave gretap140): Releasing backup interface [ 2918.854048][T25518] gretap140 (unregistering): left promiscuous mode [ 2918.863140][T25518] bond139: (slave gretap141): Releasing backup interface [ 2918.870799][T25518] gretap141 (unregistering): left promiscuous mode [ 2918.880219][T25518] bond140: (slave gretap142): Releasing backup interface [ 2918.888022][T25518] gretap142 (unregistering): left promiscuous mode [ 2918.897657][T25518] bond141: (slave gretap143): Releasing backup interface [ 2918.905432][T25518] gretap143 (unregistering): left promiscuous mode [ 2918.914983][T25518] bond142: (slave gretap144): Releasing backup interface [ 2918.922844][T25518] gretap144 (unregistering): left promiscuous mode [ 2918.931885][T25518] bond143: (slave gretap145): Releasing backup interface [ 2918.940733][T25518] gretap145 (unregistering): left promiscuous mode [ 2918.949891][T25518] bond144: (slave gretap146): Releasing backup interface [ 2918.957790][T25518] gretap146 (unregistering): left promiscuous mode [ 2918.967109][T25518] bond145: (slave gretap147): Releasing backup interface [ 2918.974967][T25518] gretap147 (unregistering): left promiscuous mode [ 2918.984442][T25518] bond146: (slave gretap148): Releasing backup interface [ 2918.992365][T25518] gretap148 (unregistering): left promiscuous mode [ 2919.001574][T25518] bond147: (slave gretap149): Releasing backup interface [ 2919.009408][T25518] gretap149 (unregistering): left promiscuous mode [ 2919.018803][T25518] bond148: (slave gretap150): Releasing backup interface [ 2919.026693][T25518] gretap150 (unregistering): left promiscuous mode [ 2919.036331][T25518] bond149: (slave gretap151): Releasing backup interface [ 2919.044998][T25518] gretap151 (unregistering): left promiscuous mode [ 2919.054223][T25518] bond150: (slave gretap152): Releasing backup interface [ 2919.062031][T25518] gretap152 (unregistering): left promiscuous mode [ 2919.071706][T25518] bond151: (slave gretap153): Releasing backup interface [ 2919.079335][T25518] gretap153 (unregistering): left promiscuous mode [ 2919.089105][T25518] bond152: (slave gretap154): Releasing backup interface [ 2919.096819][T25518] gretap154 (unregistering): left promiscuous mode [ 2919.106066][T25518] bond153: (slave gretap155): Releasing backup interface [ 2919.116503][T25518] gretap155 (unregistering): left promiscuous mode [ 2919.126155][T25518] bond154: (slave gretap156): Releasing backup interface [ 2919.133936][T25518] gretap156 (unregistering): left promiscuous mode [ 2919.143837][T25518] bond155: (slave gretap157): Releasing backup interface [ 2919.151558][T25518] gretap157 (unregistering): left promiscuous mode [ 2919.161593][T25518] bond156: (slave gretap158): Releasing backup interface [ 2919.169278][T25518] gretap158 (unregistering): left promiscuous mode [ 2919.178669][T25518] bond157: (slave gretap159): Releasing backup interface [ 2919.186442][T25518] gretap159 (unregistering): left promiscuous mode [ 2919.195896][T25518] bond158: (slave gretap160): Releasing backup interface [ 2919.203885][T25518] gretap160 (unregistering): left promiscuous mode [ 2919.213390][T25518] bond159: (slave gretap161): Releasing backup interface [ 2919.221064][T25518] gretap161 (unregistering): left promiscuous mode [ 2919.230330][T25518] bond160: (slave gretap162): Releasing backup interface [ 2919.238150][T25518] gretap162 (unregistering): left promiscuous mode [ 2919.247721][T25518] bond161: (slave gretap163): Releasing backup interface [ 2919.255903][T25518] gretap163 (unregistering): left promiscuous mode [ 2919.266093][T25518] bond162: (slave gretap164): Releasing backup interface [ 2919.274020][T25518] gretap164 (unregistering): left promiscuous mode [ 2919.284142][T25518] bond163: (slave gretap165): Releasing backup interface [ 2919.291879][T25518] gretap165 (unregistering): left promiscuous mode [ 2919.301934][T25518] bond164: (slave gretap166): Releasing backup interface [ 2919.309788][T25518] gretap166 (unregistering): left promiscuous mode [ 2919.319428][T25518] bond165: (slave gretap167): Releasing backup interface [ 2919.327201][T25518] gretap167 (unregistering): left promiscuous mode [ 2919.336682][T25518] bond166: (slave gretap168): Releasing backup interface [ 2919.344469][T25518] gretap168 (unregistering): left promiscuous mode [ 2919.353658][T25518] bond167: (slave gretap169): Releasing backup interface [ 2919.361294][T25518] gretap169 (unregistering): left promiscuous mode [ 2919.370919][T25518] bond168: (slave gretap170): Releasing backup interface [ 2919.379568][T25518] gretap170 (unregistering): left promiscuous mode [ 2919.389212][T25518] bond169: (slave gretap171): Releasing backup interface [ 2919.396980][T25518] gretap171 (unregistering): left promiscuous mode [ 2919.406545][T25518] bond170: (slave gretap172): Releasing backup interface [ 2919.414280][T25518] gretap172 (unregistering): left promiscuous mode [ 2919.423584][T25518] bond171: (slave gretap173): Releasing backup interface [ 2919.431694][T25518] gretap173 (unregistering): left promiscuous mode [ 2919.441293][T25518] bond172: (slave gretap174): Releasing backup interface [ 2919.449059][T25518] gretap174 (unregistering): left promiscuous mode [ 2919.459013][T25518] bond173: (slave gretap175): Releasing backup interface [ 2919.466668][T25518] gretap175 (unregistering): left promiscuous mode [ 2919.476106][T25518] bond174: (slave gretap176): Releasing backup interface [ 2919.484929][T25518] gretap176 (unregistering): left promiscuous mode [ 2919.494402][T25518] bond175: (slave gretap177): Releasing backup interface [ 2919.502353][T25518] gretap177 (unregistering): left promiscuous mode [ 2919.511634][T25518] bond176: (slave gretap178): Releasing backup interface [ 2919.519712][T25518] gretap178 (unregistering): left promiscuous mode [ 2919.528690][T25518] bond177: (slave gretap179): Releasing backup interface [ 2919.536654][T25518] gretap179 (unregistering): left promiscuous mode [ 2919.546271][T25518] bond178: (slave gretap180): Releasing backup interface [ 2919.554139][T25518] gretap180 (unregistering): left promiscuous mode [ 2919.563775][T25518] bond179: (slave gretap181): Releasing backup interface [ 2919.571479][T25518] gretap181 (unregistering): left promiscuous mode [ 2919.580752][T25518] bond180: (slave gretap182): Releasing backup interface [ 2919.588529][T25518] gretap182 (unregistering): left promiscuous mode [ 2919.598848][T25518] bond181: (slave gretap183): Releasing backup interface [ 2919.606612][T25518] gretap183 (unregistering): left promiscuous mode [ 2919.615925][T25518] bond182: (slave gretap184): Releasing backup interface [ 2919.623640][T25518] gretap184 (unregistering): left promiscuous mode [ 2919.632708][T25518] bond183: (slave gretap185): Releasing backup interface [ 2919.640585][T25518] gretap185 (unregistering): left promiscuous mode [ 2919.650167][T25518] bond184: (slave gretap186): Releasing backup interface [ 2919.657783][T25518] gretap186 (unregistering): left promiscuous mode [ 2919.667027][T25518] bond185: (slave gretap187): Releasing backup interface [ 2919.674949][T25518] gretap187 (unregistering): left promiscuous mode [ 2919.684487][T25518] bond186: (slave gretap188): Releasing backup interface [ 2919.692398][T25518] gretap188 (unregistering): left promiscuous mode [ 2919.701633][T25518] bond187: (slave gretap189): Releasing backup interface [ 2919.710551][T25518] gretap189 (unregistering): left promiscuous mode [ 2919.719736][T25518] bond188: (slave gretap190): Releasing backup interface [ 2919.727660][T25518] gretap190 (unregistering): left promiscuous mode [ 2919.737038][T25518] bond189: (slave gretap191): Releasing backup interface [ 2919.744912][T25518] gretap191 (unregistering): left promiscuous mode [ 2919.754188][T25518] bond190: (slave gretap192): Releasing backup interface [ 2919.761801][T25518] gretap192 (unregistering): left promiscuous mode [ 2919.773132][T25518] bond191: (slave gretap193): Releasing backup interface [ 2919.780719][T25518] gretap193 (unregistering): left promiscuous mode [ 2919.790118][T25518] bond192: (slave gretap194): Releasing backup interface [ 2919.797967][T25518] gretap194 (unregistering): left promiscuous mode [ 2919.807201][T25518] bond193: (slave gretap195): Releasing backup interface [ 2919.815597][T25518] gretap195 (unregistering): left promiscuous mode [ 2919.825494][T25518] bond194: (slave gretap196): Releasing backup interface [ 2919.833163][T25518] gretap196 (unregistering): left promiscuous mode [ 2919.842519][T25518] bond195: (slave gretap197): Releasing backup interface [ 2919.850069][T25518] gretap197 (unregistering): left promiscuous mode [ 2919.859787][T25518] bond196: (slave gretap198): Releasing backup interface [ 2919.867809][T25518] gretap198 (unregistering): left promiscuous mode [ 2919.877026][T25518] bond197: (slave gretap199): Releasing backup interface [ 2919.884704][T25518] gretap199 (unregistering): left promiscuous mode [ 2919.893966][T25518] bond198: (slave gretap200): Releasing backup interface [ 2919.901764][T25518] gretap200 (unregistering): left promiscuous mode [ 2919.911244][T25518] bond199: (slave gretap201): Releasing backup interface [ 2919.919038][T25518] gretap201 (unregistering): left promiscuous mode [ 2919.929162][T25518] bond200: (slave gretap202): Releasing backup interface [ 2919.936813][T25518] gretap202 (unregistering): left promiscuous mode [ 2919.946400][T25518] bond201: (slave gretap203): Releasing backup interface [ 2919.954489][T25518] gretap203 (unregistering): left promiscuous mode [ 2919.964481][T25518] bond202: (slave gretap204): Releasing backup interface [ 2919.972184][T25518] gretap204 (unregistering): left promiscuous mode [ 2919.981236][T25518] bond203: (slave gretap205): Releasing backup interface [ 2919.988787][T25518] gretap205 (unregistering): left promiscuous mode [ 2919.998243][T25518] bond204: (slave gretap206): Releasing backup interface [ 2920.005883][T25518] gretap206 (unregistering): left promiscuous mode [ 2920.015287][T25518] bond205: (slave gretap207): Releasing backup interface [ 2920.023108][T25518] gretap207 (unregistering): left promiscuous mode [ 2920.033040][T25518] bond206: (slave gretap208): Releasing backup interface [ 2920.040777][T25518] gretap208 (unregistering): left promiscuous mode [ 2920.050436][T25518] bond207: (slave gretap209): Releasing backup interface [ 2920.058276][T25518] gretap209 (unregistering): left promiscuous mode [ 2920.067706][T25518] bond208: (slave gretap210): Releasing backup interface [ 2920.075485][T25518] gretap210 (unregistering): left promiscuous mode [ 2920.085192][T25518] bond209: (slave gretap211): Releasing backup interface [ 2920.092931][T25518] gretap211 (unregistering): left promiscuous mode [ 2920.102293][T25518] bond210: (slave gretap212): Releasing backup interface [ 2920.110231][T25518] gretap212 (unregistering): left promiscuous mode [ 2920.120136][T25518] bond211: (slave gretap213): Releasing backup interface [ 2920.127837][T25518] gretap213 (unregistering): left promiscuous mode [ 2920.137288][T25518] bond212: (slave gretap214): Releasing backup interface [ 2920.146051][T25518] gretap214 (unregistering): left promiscuous mode [ 2920.155219][T25518] bond213: (slave gretap215): Releasing backup interface [ 2920.163108][T25518] gretap215 (unregistering): left promiscuous mode [ 2920.172738][T25518] bond214: (slave gretap216): Releasing backup interface [ 2920.180429][T25518] gretap216 (unregistering): left promiscuous mode [ 2920.189897][T25518] bond215: (slave gretap217): Releasing backup interface [ 2920.197559][T25518] gretap217 (unregistering): left promiscuous mode [ 2920.206951][T25518] bond216: (slave gretap218): Releasing backup interface [ 2920.214792][T25518] gretap218 (unregistering): left promiscuous mode [ 2920.224051][T25518] bond217: (slave gretap219): Releasing backup interface [ 2920.231638][T25518] gretap219 (unregistering): left promiscuous mode [ 2920.241151][T25518] bond218: (slave gretap220): Releasing backup interface [ 2920.248947][T25518] gretap220 (unregistering): left promiscuous mode [ 2920.259015][T25518] bond219: (slave gretap221): Releasing backup interface [ 2920.266645][T25518] gretap221 (unregistering): left promiscuous mode [ 2920.276181][T25518] bond220: (slave gretap222): Releasing backup interface [ 2920.283832][T25518] gretap222 (unregistering): left promiscuous mode [ 2920.293120][T25518] bond221: (slave gretap223): Releasing backup interface [ 2920.301079][T25518] gretap223 (unregistering): left promiscuous mode [ 2920.310495][T25518] bond222: (slave gretap224): Releasing backup interface [ 2920.318133][T25518] gretap224 (unregistering): left promiscuous mode [ 2920.327630][T25518] bond223: (slave gretap225): Releasing backup interface [ 2920.335334][T25518] gretap225 (unregistering): left promiscuous mode [ 2920.344970][T25518] bond224: (slave gretap226): Releasing backup interface [ 2920.352857][T25518] gretap226 (unregistering): left promiscuous mode [ 2920.361800][T25518] bond225: (slave gretap227): Releasing backup interface [ 2920.370516][T25518] gretap227 (unregistering): left promiscuous mode [ 2920.379354][T25518] bond226: (slave gretap228): Releasing backup interface [ 2920.387243][T25518] gretap228 (unregistering): left promiscuous mode [ 2920.396695][T25518] bond227: (slave gretap229): Releasing backup interface [ 2920.404793][T25518] gretap229 (unregistering): left promiscuous mode [ 2920.414149][T25518] bond228: (slave gretap230): Releasing backup interface [ 2920.421839][T25518] gretap230 (unregistering): left promiscuous mode [ 2920.431224][T25518] bond229: (slave gretap231): Releasing backup interface [ 2920.439068][T25518] gretap231 (unregistering): left promiscuous mode [ 2920.448516][T25518] bond230: (slave gretap232): Releasing backup interface [ 2920.456309][T25518] gretap232 (unregistering): left promiscuous mode [ 2920.465565][T25518] bond231: (slave gretap233): Releasing backup interface [ 2920.474110][T25518] gretap233 (unregistering): left promiscuous mode [ 2920.483414][T25518] bond232: (slave gretap234): Releasing backup interface [ 2920.491025][T25518] gretap234 (unregistering): left promiscuous mode [ 2920.500608][T25518] bond233: (slave gretap235): Releasing backup interface [ 2920.508260][T25518] gretap235 (unregistering): left promiscuous mode [ 2920.518608][T25518] bond234: (slave gretap236): Releasing backup interface [ 2920.526302][T25518] gretap236 (unregistering): left promiscuous mode [ 2920.535732][T25518] bond235: (slave gretap237): Releasing backup interface [ 2920.543538][T25518] gretap237 (unregistering): left promiscuous mode [ 2920.552622][T25518] bond236: (slave gretap238): Releasing backup interface [ 2920.560208][T25518] gretap238 (unregistering): left promiscuous mode [ 2920.569801][T25518] bond237: (slave gretap239): Releasing backup interface [ 2920.577552][T25518] gretap239 (unregistering): left promiscuous mode [ 2920.587439][T25518] bond238: (slave gretap240): Releasing backup interface [ 2920.595223][T25518] gretap240 (unregistering): left promiscuous mode [ 2920.604499][T25518] bond239: (slave gretap241): Releasing backup interface [ 2920.612365][T25518] gretap241 (unregistering): left promiscuous mode [ 2920.621671][T25518] bond240: (slave gretap242): Releasing backup interface [ 2920.629650][T25518] gretap242 (unregistering): left promiscuous mode [ 2920.638875][T25518] bond241: (slave gretap243): Releasing backup interface [ 2920.647130][T25518] gretap243 (unregistering): left promiscuous mode [ 2920.656660][T25518] bond242: (slave gretap244): Releasing backup interface [ 2920.664565][T25518] gretap244 (unregistering): left promiscuous mode [ 2920.674310][T25518] bond243: (slave gretap245): Releasing backup interface [ 2920.682007][T25518] gretap245 (unregistering): left promiscuous mode [ 2920.691332][T25518] bond244: (slave gretap246): Releasing backup interface [ 2920.699942][T25518] gretap246 (unregistering): left promiscuous mode [ 2920.709498][T25518] bond245: (slave gretap247): Releasing backup interface [ 2920.717205][T25518] gretap247 (unregistering): left promiscuous mode [ 2920.726448][T25518] bond246: (slave gretap248): Releasing backup interface [ 2920.734060][T25518] gretap248 (unregistering): left promiscuous mode [ 2920.744004][T25518] bond247: (slave gretap249): Releasing backup interface [ 2920.751641][T25518] gretap249 (unregistering): left promiscuous mode [ 2920.761003][T25518] bond248: (slave gretap250): Releasing backup interface [ 2920.768862][T25518] gretap250 (unregistering): left promiscuous mode [ 2920.778240][T25518] bond249: (slave gretap251): Releasing backup interface [ 2920.785957][T25518] gretap251 (unregistering): left promiscuous mode [ 2920.795259][T25518] bond250: (slave gretap252): Releasing backup interface [ 2920.805484][T25518] gretap252 (unregistering): left promiscuous mode [ 2920.815069][T25518] bond251: (slave gretap253): Releasing backup interface [ 2920.822819][T25518] gretap253 (unregistering): left promiscuous mode [ 2920.832051][T25518] bond252: (slave gretap254): Releasing backup interface [ 2920.840125][T25518] gretap254 (unregistering): left promiscuous mode [ 2920.849660][T25518] bond253: (slave gretap255): Releasing backup interface [ 2920.857623][T25518] gretap255 (unregistering): left promiscuous mode [ 2920.866634][T25518] bond254: (slave gretap256): Releasing backup interface [ 2920.874537][T25518] gretap256 (unregistering): left promiscuous mode [ 2920.883993][T25518] bond255: (slave gretap257): Releasing backup interface [ 2920.891646][T25518] gretap257 (unregistering): left promiscuous mode [ 2920.901005][T25518] bond256: (slave gretap258): Releasing backup interface [ 2920.908733][T25518] gretap258 (unregistering): left promiscuous mode [ 2920.919073][T25518] bond257: (slave gretap259): Releasing backup interface [ 2920.926782][T25518] gretap259 (unregistering): left promiscuous mode [ 2920.936303][T25518] bond258: (slave gretap260): Releasing backup interface [ 2920.944120][T25518] gretap260 (unregistering): left promiscuous mode [ 2920.953634][T25518] bond259: (slave gretap261): Releasing backup interface [ 2920.961386][T25518] gretap261 (unregistering): left promiscuous mode [ 2920.971202][T25518] bond260: (slave gretap262): Releasing backup interface [ 2920.978877][T25518] gretap262 (unregistering): left promiscuous mode [ 2920.988537][T25518] bond261: (slave gretap263): Releasing backup interface [ 2920.996287][T25518] gretap263 (unregistering): left promiscuous mode [ 2921.005604][T25518] bond262: (slave gretap264): Releasing backup interface [ 2921.013271][T25518] gretap264 (unregistering): left promiscuous mode [ 2921.022560][T25518] bond263: (slave gretap265): Releasing backup interface [ 2921.030462][T25518] gretap265 (unregistering): left promiscuous mode [ 2921.040934][T25518] bond264: (slave gretap266): Releasing backup interface [ 2921.048719][T25518] gretap266 (unregistering): left promiscuous mode [ 2921.058082][T25518] bond265: (slave gretap267): Releasing backup interface [ 2921.065868][T25518] gretap267 (unregistering): left promiscuous mode [ 2921.075474][T25518] bond266: (slave gretap268): Releasing backup interface [ 2921.083350][T25518] gretap268 (unregistering): left promiscuous mode [ 2921.092645][T25518] bond267: (slave gretap269): Releasing backup interface [ 2921.100450][T25518] gretap269 (unregistering): left promiscuous mode [ 2921.110100][T25518] bond268: (slave gretap270): Releasing backup interface [ 2921.117854][T25518] gretap270 (unregistering): left promiscuous mode [ 2921.128103][T25518] bond269: (slave gretap271): Releasing backup interface [ 2921.135857][T25518] gretap271 (unregistering): left promiscuous mode [ 2921.146098][T25518] bond270: (slave gretap272): Releasing backup interface [ 2921.153902][T25518] gretap272 (unregistering): left promiscuous mode [ 2921.163649][T25518] bond271: (slave gretap273): Releasing backup interface [ 2921.171637][T25518] gretap273 (unregistering): left promiscuous mode [ 2921.181256][T25518] bond272: (slave gretap274): Releasing backup interface [ 2921.188870][T25518] gretap274 (unregistering): left promiscuous mode [ 2921.198413][T25518] bond273: (slave gretap275): Releasing backup interface [ 2921.206505][T25518] gretap275 (unregistering): left promiscuous mode [ 2921.215782][T25518] bond274: (slave gretap276): Releasing backup interface [ 2921.223615][T25518] gretap276 (unregistering): left promiscuous mode [ 2921.232872][T25518] bond275: (slave gretap277): Releasing backup interface [ 2921.240576][T25518] gretap277 (unregistering): left promiscuous mode [ 2921.250366][T25518] bond276: (slave gretap278): Releasing backup interface [ 2921.259082][T25518] gretap278 (unregistering): left promiscuous mode [ 2921.268889][T25518] bond277: (slave gretap279): Releasing backup interface [ 2921.276875][T25518] gretap279 (unregistering): left promiscuous mode [ 2921.286478][T25518] bond278: (slave gretap280): Releasing backup interface [ 2921.294131][T25518] gretap280 (unregistering): left promiscuous mode [ 2921.303256][T25518] bond279: (slave gretap281): Releasing backup interface [ 2921.310959][T25518] gretap281 (unregistering): left promiscuous mode [ 2921.320226][T25518] bond280: (slave gretap282): Releasing backup interface [ 2921.327909][T25518] gretap282 (unregistering): left promiscuous mode [ 2921.337144][T25518] bond281: (slave gretap283): Releasing backup interface [ 2921.344965][T25518] gretap283 (unregistering): left promiscuous mode [ 2921.354428][T25518] bond282: (slave gretap284): Releasing backup interface [ 2921.362157][T25518] gretap284 (unregistering): left promiscuous mode [ 2921.371170][T25518] bond283: (slave gretap285): Releasing backup interface [ 2921.379943][T25518] gretap285 (unregistering): left promiscuous mode [ 2921.389704][T25518] bond284: (slave gretap286): Releasing backup interface [ 2921.397558][T25518] gretap286 (unregistering): left promiscuous mode [ 2921.408646][T25518] bond1: (slave gretap1): Releasing backup interface [ 2921.416262][T25518] gretap1 (unregistering): left promiscuous mode [ 2921.425593][T25518] bond2: (slave gretap2): Releasing backup interface [ 2921.433261][T25518] gretap2 (unregistering): left promiscuous mode [ 2921.442574][T25518] bond3: (slave gretap3): Releasing backup interface [ 2921.450107][T25518] gretap3 (unregistering): left promiscuous mode [ 2921.459571][T25518] bond4: (slave gretap4): Releasing backup interface [ 2921.466899][T25518] gretap4 (unregistering): left promiscuous mode [ 2921.479296][T11158] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2921.486359][T11158] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2921.512292][T11158] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2921.588368][T11158] hsr_slave_0: entered promiscuous mode [ 2921.594852][T11158] hsr_slave_1: entered promiscuous mode [ 2921.600978][T11158] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2921.608860][T11158] Cannot create hsr debugfs directory [ 2921.636269][T11107] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2921.646496][T11107] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2921.656946][T11107] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2921.680061][T11107] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2921.697214][T25518] hsr_slave_0: left promiscuous mode [ 2921.703293][T25518] hsr_slave_1: left promiscuous mode [ 2921.709145][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2921.716754][T25518] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2921.726585][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2921.734225][T25518] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2921.744341][T25518] bridge_slave_1: left allmulticast mode [ 2921.750089][T25518] bridge_slave_1: left promiscuous mode [ 2921.755994][T25518] bridge0: port 2(bridge_slave_1) entered disabled state [ 2921.766579][T25518] bridge_slave_0: left allmulticast mode [ 2921.772401][T25518] bridge_slave_0: left promiscuous mode [ 2921.778074][T25518] bridge0: port 1(bridge_slave_0) entered disabled state [ 2921.790142][T25518] hsr_slave_0: left promiscuous mode [ 2921.796052][T25518] hsr_slave_1: left promiscuous mode [ 2921.802166][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2921.809669][T25518] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2921.817485][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2921.825016][T25518] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2921.833030][T25518] bridge_slave_1: left allmulticast mode [ 2921.839009][T25518] bridge_slave_1: left promiscuous mode [ 2921.844686][T25518] bridge0: port 2(bridge_slave_1) entered disabled state [ 2921.853176][T25518] bridge_slave_0: left allmulticast mode [ 2921.858938][T25518] bridge_slave_0: left promiscuous mode [ 2921.864626][T25518] bridge0: port 1(bridge_slave_0) entered disabled state [ 2921.878965][T25518] veth1_macvtap: left promiscuous mode [ 2921.884501][T25518] veth0_macvtap: left promiscuous mode [ 2921.890202][T25518] veth1_vlan: left promiscuous mode [ 2921.895481][T25518] veth0_vlan: left promiscuous mode [ 2921.901614][T25518] veth1_macvtap: left promiscuous mode [ 2921.907127][T25518] veth0_macvtap: left promiscuous mode [ 2921.912796][T25518] veth1_vlan: left promiscuous mode [ 2921.917996][T25518] veth0_vlan: left promiscuous mode [ 2922.034728][T25518] bond284 (unregistering): Released all slaves [ 2922.043900][T25518] bond283 (unregistering): Released all slaves [ 2922.055253][T25518] bond282 (unregistering): Released all slaves [ 2922.064303][T25518] bond281 (unregistering): Released all slaves [ 2922.073814][T25518] bond280 (unregistering): Released all slaves [ 2922.082978][T25518] bond279 (unregistering): Released all slaves [ 2922.092420][T25518] bond278 (unregistering): Released all slaves [ 2922.101474][T25518] bond277 (unregistering): Released all slaves [ 2922.110429][T25518] bond276 (unregistering): Released all slaves [ 2922.120058][T25518] bond275 (unregistering): Released all slaves [ 2922.129400][T25518] bond274 (unregistering): Released all slaves [ 2922.139033][T25518] bond273 (unregistering): Released all slaves [ 2922.148269][T25518] bond272 (unregistering): Released all slaves [ 2922.157453][T25518] bond271 (unregistering): Released all slaves [ 2922.166625][T25518] bond270 (unregistering): Released all slaves [ 2922.175402][T25518] bond269 (unregistering): Released all slaves [ 2922.184805][T25518] bond268 (unregistering): Released all slaves [ 2922.194106][T25518] bond267 (unregistering): Released all slaves [ 2922.203652][T25518] bond266 (unregistering): Released all slaves [ 2922.212732][T25518] bond265 (unregistering): Released all slaves [ 2922.221744][T25518] bond264 (unregistering): Released all slaves [ 2922.231178][T25518] bond263 (unregistering): Released all slaves [ 2922.240596][T25518] bond262 (unregistering): Released all slaves [ 2922.249507][T25518] bond261 (unregistering): Released all slaves [ 2922.258698][T25518] bond260 (unregistering): Released all slaves [ 2922.269534][T25518] bond259 (unregistering): Released all slaves [ 2922.278545][T25518] bond258 (unregistering): Released all slaves [ 2922.289040][T25518] bond257 (unregistering): Released all slaves [ 2922.298807][T25518] bond256 (unregistering): Released all slaves [ 2922.308115][T25518] bond255 (unregistering): Released all slaves [ 2922.317497][T25518] bond254 (unregistering): Released all slaves [ 2922.326358][T25518] bond253 (unregistering): Released all slaves [ 2922.335924][T25518] bond252 (unregistering): Released all slaves [ 2922.345051][T25518] bond251 (unregistering): Released all slaves [ 2922.354987][T25518] bond250 (unregistering): Released all slaves [ 2922.364064][T25518] bond249 (unregistering): Released all slaves [ 2922.373060][T25518] bond248 (unregistering): Released all slaves [ 2922.382058][T25518] bond247 (unregistering): Released all slaves [ 2922.391553][T25518] bond246 (unregistering): Released all slaves [ 2922.400433][T25518] bond245 (unregistering): Released all slaves [ 2922.409691][T25518] bond244 (unregistering): Released all slaves [ 2922.418948][T25518] bond243 (unregistering): Released all slaves [ 2922.428014][T25518] bond242 (unregistering): Released all slaves [ 2922.437067][T25518] bond241 (unregistering): Released all slaves [ 2922.445949][T25518] bond240 (unregistering): Released all slaves [ 2922.455102][T25518] bond239 (unregistering): Released all slaves [ 2922.464338][T25518] bond238 (unregistering): Released all slaves [ 2922.473334][T25518] bond237 (unregistering): Released all slaves [ 2922.482420][T25518] bond236 (unregistering): Released all slaves [ 2922.491404][T25518] bond235 (unregistering): Released all slaves [ 2922.500365][T25518] bond234 (unregistering): Released all slaves [ 2922.509645][T25518] bond233 (unregistering): Released all slaves [ 2922.518553][T25518] bond232 (unregistering): Released all slaves [ 2922.527479][T25518] bond231 (unregistering): Released all slaves [ 2922.536361][T25518] bond230 (unregistering): Released all slaves [ 2922.545826][T25518] bond229 (unregistering): Released all slaves [ 2922.554929][T25518] bond228 (unregistering): Released all slaves [ 2922.565261][T25518] bond227 (unregistering): Released all slaves [ 2922.574513][T25518] bond226 (unregistering): Released all slaves [ 2922.583578][T25518] bond225 (unregistering): Released all slaves [ 2922.592798][T25518] bond224 (unregistering): Released all slaves [ 2922.602248][T25518] bond223 (unregistering): Released all slaves [ 2922.611189][T25518] bond222 (unregistering): Released all slaves [ 2922.620306][T25518] bond221 (unregistering): Released all slaves [ 2922.629236][T25518] bond220 (unregistering): Released all slaves [ 2922.638013][T25518] bond219 (unregistering): Released all slaves [ 2922.647055][T25518] bond218 (unregistering): Released all slaves [ 2922.656420][T25518] bond217 (unregistering): Released all slaves [ 2922.665731][T25518] bond216 (unregistering): Released all slaves [ 2922.675026][T25518] bond215 (unregistering): Released all slaves [ 2922.684323][T25518] bond214 (unregistering): Released all slaves [ 2922.693415][T25518] bond213 (unregistering): Released all slaves [ 2922.702312][T25518] bond212 (unregistering): Released all slaves [ 2922.710954][T25518] bond211 (unregistering): Released all slaves [ 2922.720196][T25518] bond210 (unregistering): Released all slaves [ 2922.729043][T25518] bond209 (unregistering): Released all slaves [ 2922.738458][T25518] bond208 (unregistering): Released all slaves [ 2922.747805][T25518] bond207 (unregistering): Released all slaves [ 2922.756868][T25518] bond206 (unregistering): Released all slaves [ 2922.766046][T25518] bond205 (unregistering): Released all slaves [ 2922.775327][T25518] bond204 (unregistering): Released all slaves [ 2922.784753][T25518] bond203 (unregistering): Released all slaves [ 2922.793906][T25518] bond202 (unregistering): Released all slaves [ 2922.803363][T25518] bond201 (unregistering): Released all slaves [ 2922.812360][T25518] bond200 (unregistering): Released all slaves [ 2922.820862][T25518] bond199 (unregistering): Released all slaves [ 2922.830216][T25518] bond198 (unregistering): Released all slaves [ 2922.839662][T25518] bond197 (unregistering): Released all slaves [ 2922.848509][T25518] bond196 (unregistering): Released all slaves [ 2922.857597][T25518] bond195 (unregistering): Released all slaves [ 2922.866538][T25518] bond194 (unregistering): Released all slaves [ 2922.875650][T25518] bond193 (unregistering): Released all slaves [ 2922.885688][T25518] bond192 (unregistering): Released all slaves [ 2922.894988][T25518] bond191 (unregistering): Released all slaves [ 2922.904797][T25518] bond190 (unregistering): Released all slaves [ 2922.914185][T25518] bond189 (unregistering): Released all slaves [ 2922.922985][T25518] bond188 (unregistering): Released all slaves [ 2922.931988][T25518] bond187 (unregistering): Released all slaves [ 2922.940855][T25518] bond186 (unregistering): Released all slaves [ 2922.949918][T25518] bond185 (unregistering): Released all slaves [ 2922.958930][T25518] bond184 (unregistering): Released all slaves [ 2922.968369][T25518] bond183 (unregistering): Released all slaves [ 2922.977352][T25518] bond182 (unregistering): Released all slaves [ 2922.986345][T25518] bond181 (unregistering): Released all slaves [ 2922.995096][T25518] bond180 (unregistering): Released all slaves [ 2923.004442][T25518] bond179 (unregistering): Released all slaves [ 2923.013504][T25518] bond178 (unregistering): Released all slaves [ 2923.022395][T25518] bond177 (unregistering): Released all slaves [ 2923.031436][T25518] bond176 (unregistering): Released all slaves [ 2923.040323][T25518] bond175 (unregistering): Released all slaves [ 2923.049410][T25518] bond174 (unregistering): Released all slaves [ 2923.061081][T25518] bond173 (unregistering): Released all slaves [ 2923.070336][T25518] bond172 (unregistering): Released all slaves [ 2923.079008][T25518] bond171 (unregistering): Released all slaves [ 2923.087756][T25518] bond170 (unregistering): Released all slaves [ 2923.097046][T25518] bond169 (unregistering): Released all slaves [ 2923.106286][T25518] bond168 (unregistering): Released all slaves [ 2923.115440][T25518] bond167 (unregistering): Released all slaves [ 2923.124710][T25518] bond166 (unregistering): Released all slaves [ 2923.133919][T25518] bond165 (unregistering): Released all slaves [ 2923.143032][T25518] bond164 (unregistering): Released all slaves [ 2923.152188][T25518] bond163 (unregistering): Released all slaves [ 2923.161616][T25518] bond162 (unregistering): Released all slaves [ 2923.170964][T25518] bond161 (unregistering): Released all slaves [ 2923.179848][T25518] bond160 (unregistering): Released all slaves [ 2923.189202][T25518] bond159 (unregistering): Released all slaves [ 2923.198211][T25518] bond158 (unregistering): Released all slaves [ 2923.207274][T25518] bond157 (unregistering): Released all slaves [ 2923.216410][T25518] bond156 (unregistering): Released all slaves [ 2923.225376][T25518] bond155 (unregistering): Released all slaves [ 2923.234678][T25518] bond154 (unregistering): Released all slaves [ 2923.244161][T25518] bond153 (unregistering): Released all slaves [ 2923.253417][T25518] bond152 (unregistering): Released all slaves [ 2923.262341][T25518] bond151 (unregistering): Released all slaves [ 2923.271207][T25518] bond150 (unregistering): Released all slaves [ 2923.280222][T25518] bond149 (unregistering): Released all slaves [ 2923.289730][T25518] bond148 (unregistering): Released all slaves [ 2923.299989][T25518] bond147 (unregistering): Released all slaves [ 2923.309143][T25518] bond146 (unregistering): Released all slaves [ 2923.318050][T25518] bond145 (unregistering): Released all slaves [ 2923.327429][T25518] bond144 (unregistering): Released all slaves [ 2923.336739][T25518] bond143 (unregistering): Released all slaves [ 2923.345624][T25518] bond142 (unregistering): Released all slaves [ 2923.354493][T25518] bond141 (unregistering): Released all slaves [ 2923.363659][T25518] bond140 (unregistering): Released all slaves [ 2923.372706][T25518] bond139 (unregistering): Released all slaves [ 2923.381696][T25518] bond138 (unregistering): Released all slaves [ 2923.390520][T25518] bond137 (unregistering): Released all slaves [ 2923.399635][T25518] bond136 (unregistering): Released all slaves [ 2923.408524][T25518] bond135 (unregistering): Released all slaves [ 2923.418143][T25518] bond134 (unregistering): Released all slaves [ 2923.427450][T25518] bond133 (unregistering): Released all slaves [ 2923.436407][T25518] bond132 (unregistering): Released all slaves [ 2923.445916][T25518] bond131 (unregistering): Released all slaves [ 2923.455531][T25518] bond130 (unregistering): Released all slaves [ 2923.464980][T25518] bond129 (unregistering): Released all slaves [ 2923.474093][T25518] bond128 (unregistering): Released all slaves [ 2923.483381][T25518] bond127 (unregistering): Released all slaves [ 2923.492788][T25518] bond126 (unregistering): Released all slaves [ 2923.501685][T25518] bond125 (unregistering): Released all slaves [ 2923.510959][T25518] bond124 (unregistering): Released all slaves [ 2923.519744][T25518] bond123 (unregistering): Released all slaves [ 2923.528870][T25518] bond122 (unregistering): Released all slaves [ 2923.537597][T25518] bond121 (unregistering): Released all slaves [ 2923.546629][T25518] bond120 (unregistering): Released all slaves [ 2923.556136][T25518] bond119 (unregistering): Released all slaves [ 2923.565627][T25518] bond118 (unregistering): Released all slaves [ 2923.574635][T25518] bond117 (unregistering): Released all slaves [ 2923.583584][T25518] bond116 (unregistering): Released all slaves [ 2923.592540][T25518] bond115 (unregistering): Released all slaves [ 2923.601726][T25518] bond114 (unregistering): Released all slaves [ 2923.613220][T25518] bond113 (unregistering): Released all slaves [ 2923.622428][T25518] bond112 (unregistering): Released all slaves [ 2923.631697][T25518] bond111 (unregistering): Released all slaves [ 2923.640734][T25518] bond110 (unregistering): Released all slaves [ 2923.650134][T25518] bond109 (unregistering): Released all slaves [ 2923.659134][T25518] bond108 (unregistering): Released all slaves [ 2923.668191][T25518] bond107 (unregistering): Released all slaves [ 2923.677433][T25518] bond106 (unregistering): Released all slaves [ 2923.686562][T25518] bond105 (unregistering): Released all slaves [ 2923.696099][T25518] bond104 (unregistering): Released all slaves [ 2923.705175][T25518] bond103 (unregistering): Released all slaves [ 2923.714366][T25518] bond102 (unregistering): Released all slaves [ 2923.723531][T25518] bond101 (unregistering): Released all slaves [ 2923.733823][T25518] bond100 (unregistering): Released all slaves [ 2923.743137][T25518] bond99 (unregistering): Released all slaves [ 2923.752010][T25518] bond98 (unregistering): Released all slaves [ 2923.762256][T25518] bond97 (unregistering): Released all slaves [ 2923.771060][T25518] bond96 (unregistering): Released all slaves [ 2923.780459][T25518] bond95 (unregistering): Released all slaves [ 2923.789156][T25518] bond94 (unregistering): Released all slaves [ 2923.798195][T25518] bond93 (unregistering): Released all slaves [ 2923.808644][T25518] bond92 (unregistering): Released all slaves [ 2923.817764][T25518] bond91 (unregistering): Released all slaves [ 2923.826588][T25518] bond90 (unregistering): Released all slaves [ 2923.835657][T25518] bond89 (unregistering): Released all slaves [ 2923.845231][T25518] bond88 (unregistering): Released all slaves [ 2923.854476][T25518] bond87 (unregistering): Released all slaves [ 2923.863650][T25518] bond86 (unregistering): Released all slaves [ 2923.872816][T25518] bond85 (unregistering): Released all slaves [ 2923.881694][T25518] bond84 (unregistering): Released all slaves [ 2923.890809][T25518] bond83 (unregistering): Released all slaves [ 2923.899505][T25518] bond82 (unregistering): Released all slaves [ 2923.908366][T25518] bond81 (unregistering): Released all slaves [ 2923.917088][T25518] bond80 (unregistering): Released all slaves [ 2923.926222][T25518] bond79 (unregistering): Released all slaves [ 2923.935486][T25518] bond78 (unregistering): Released all slaves [ 2923.944681][T25518] bond77 (unregistering): Released all slaves [ 2923.954019][T25518] bond76 (unregistering): Released all slaves [ 2923.963179][T25518] bond75 (unregistering): Released all slaves [ 2923.972222][T25518] bond74 (unregistering): Released all slaves [ 2923.980945][T25518] bond73 (unregistering): Released all slaves [ 2923.989965][T25518] bond72 (unregistering): Released all slaves [ 2923.998979][T25518] bond71 (unregistering): Released all slaves [ 2924.008169][T25518] bond70 (unregistering): Released all slaves [ 2924.018581][T25518] bond69 (unregistering): Released all slaves [ 2924.028165][T25518] bond68 (unregistering): Released all slaves [ 2924.038441][T25518] bond67 (unregistering): Released all slaves [ 2924.047355][T25518] bond66 (unregistering): Released all slaves [ 2924.058161][T25518] bond65 (unregistering): Released all slaves [ 2924.067687][T25518] bond64 (unregistering): Released all slaves [ 2924.076721][T25518] bond63 (unregistering): Released all slaves [ 2924.085836][T25518] bond62 (unregistering): Released all slaves [ 2924.095379][T25518] bond61 (unregistering): Released all slaves [ 2924.104476][T25518] bond60 (unregistering): Released all slaves [ 2924.113291][T25518] bond59 (unregistering): Released all slaves [ 2924.122557][T25518] bond58 (unregistering): Released all slaves [ 2924.131298][T25518] bond57 (unregistering): Released all slaves [ 2924.140234][T25518] bond56 (unregistering): Released all slaves [ 2924.149045][T25518] bond55 (unregistering): Released all slaves [ 2924.158156][T25518] bond54 (unregistering): Released all slaves [ 2924.166985][T25518] bond53 (unregistering): Released all slaves [ 2924.176223][T25518] bond52 (unregistering): Released all slaves [ 2924.185140][T25518] bond51 (unregistering): Released all slaves [ 2924.194359][T25518] bond50 (unregistering): Released all slaves [ 2924.203102][T25518] bond49 (unregistering): Released all slaves [ 2924.211514][T25518] bond48 (unregistering): Released all slaves [ 2924.220477][T25518] bond47 (unregistering): Released all slaves [ 2924.229878][T25518] bond46 (unregistering): Released all slaves [ 2924.238763][T25518] bond45 (unregistering): Released all slaves [ 2924.248291][T25518] bond44 (unregistering): Released all slaves [ 2924.257543][T25518] bond43 (unregistering): Released all slaves [ 2924.266118][T25518] bond42 (unregistering): Released all slaves [ 2924.274865][T25518] bond41 (unregistering): Released all slaves [ 2924.284646][T25518] bond40 (unregistering): Released all slaves [ 2924.293659][T25518] bond39 (unregistering): Released all slaves [ 2924.302892][T25518] bond38 (unregistering): Released all slaves [ 2924.311809][T25518] bond37 (unregistering): Released all slaves [ 2924.321214][T25518] bond36 (unregistering): Released all slaves [ 2924.329860][T25518] bond35 (unregistering): Released all slaves [ 2924.338719][T25518] bond34 (unregistering): Released all slaves [ 2924.347661][T25518] bond33 (unregistering): Released all slaves [ 2924.356871][T25518] bond32 (unregistering): Released all slaves [ 2924.367176][T25518] bond31 (unregistering): Released all slaves [ 2924.376306][T25518] bond30 (unregistering): Released all slaves [ 2924.385791][T25518] bond29 (unregistering): Released all slaves [ 2924.394902][T25518] bond28 (unregistering): Released all slaves [ 2924.404110][T25518] bond27 (unregistering): Released all slaves [ 2924.413157][T25518] bond26 (unregistering): Released all slaves [ 2924.421810][T25518] bond25 (unregistering): Released all slaves [ 2924.430941][T25518] bond24 (unregistering): Released all slaves [ 2924.439835][T25518] bond23 (unregistering): Released all slaves [ 2924.448939][T25518] bond22 (unregistering): Released all slaves [ 2924.457855][T25518] bond21 (unregistering): Released all slaves [ 2924.466996][T25518] bond20 (unregistering): Released all slaves [ 2924.475970][T25518] bond19 (unregistering): Released all slaves [ 2924.485741][T25518] bond18 (unregistering): Released all slaves [ 2924.494701][T25518] bond17 (unregistering): Released all slaves [ 2924.503721][T25518] bond16 (unregistering): Released all slaves [ 2924.512774][T25518] bond15 (unregistering): Released all slaves [ 2924.521515][T25518] bond14 (unregistering): Released all slaves [ 2924.530485][T25518] bond13 (unregistering): Released all slaves [ 2924.539183][T25518] bond12 (unregistering): Released all slaves [ 2924.548160][T25518] bond11 (unregistering): Released all slaves [ 2924.557018][T25518] bond10 (unregistering): Released all slaves [ 2924.566696][T25518] bond9 (unregistering): Released all slaves [ 2924.575404][T25518] bond8 (unregistering): Released all slaves [ 2924.584437][T25518] bond7 (unregistering): Released all slaves [ 2924.593187][T25518] bond6 (unregistering): Released all slaves [ 2924.602225][T25518] bond5 (unregistering): Released all slaves [ 2924.611732][T25518] bond4 (unregistering): Released all slaves [ 2924.620645][T25518] bond3 (unregistering): Released all slaves [ 2924.629472][T25518] bond2 (unregistering): Released all slaves [ 2924.638085][T25518] bond1 (unregistering): Released all slaves [ 2924.680594][T25518] team0 (unregistering): Port device team_slave_1 removed [ 2924.692610][T25518] team0 (unregistering): Port device team_slave_0 removed [ 2924.703347][T25518] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2924.715560][T25518] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2924.749397][T25518] bond0 (unregistering): Released all slaves [ 2924.806967][T25518] bond4 (unregistering): Released all slaves [ 2924.816321][T25518] bond3 (unregistering): Released all slaves [ 2924.825495][T25518] bond2 (unregistering): Released all slaves [ 2924.834410][T25518] bond1 (unregistering): Released all slaves [ 2924.873148][T25518] team0 (unregistering): Port device team_slave_1 removed [ 2924.883995][T25518] team0 (unregistering): Port device team_slave_0 removed [ 2924.894258][T25518] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2924.906016][T25518] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2924.940433][T25518] bond0 (unregistering): Released all slaves [ 2925.037349][T11107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2925.064070][T11107] 8021q: adding VLAN 0 to HW filter on device team0 [ 2925.096511][ T8630] bridge0: port 1(bridge_slave_0) entered blocking state [ 2925.103706][ T8630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2925.164638][ T4214] bridge0: port 2(bridge_slave_1) entered blocking state [ 2925.172245][ T4214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2925.206924][T11107] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2925.217391][T11107] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2925.303376][T11161] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2925.319045][T11161] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2925.331444][T11107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2925.341227][T11161] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2925.365270][T11161] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2925.476644][T11161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2925.489930][T11161] 8021q: adding VLAN 0 to HW filter on device team0 [ 2925.524519][ T8630] bridge0: port 1(bridge_slave_0) entered blocking state [ 2925.531702][ T8630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2925.601957][T11161] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2925.612550][T11161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2925.628057][ T8630] bridge0: port 2(bridge_slave_1) entered blocking state [ 2925.635313][ T8630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2925.701372][T11107] veth0_vlan: entered promiscuous mode [ 2925.716684][T11161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2925.730046][T11107] veth1_vlan: entered promiscuous mode [ 2925.796690][T11158] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2925.819082][T11107] veth0_macvtap: entered promiscuous mode [ 2925.826569][T11158] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2925.845916][T11107] veth1_macvtap: entered promiscuous mode [ 2925.866968][T11158] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2925.885220][T11107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2925.895796][T11107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2925.905757][T11107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2925.916377][T11107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2925.928712][T11107] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2925.936760][T11158] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2925.963619][T11107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2925.974324][T11107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2925.984424][T11107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2925.994997][T11107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.007272][T11107] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2926.030413][T11107] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.039218][T11107] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.048206][T11107] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.057012][T11107] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.087936][T11161] veth0_vlan: entered promiscuous mode [ 2926.133161][T11161] veth1_vlan: entered promiscuous mode [ 2926.149634][T11158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2926.164245][T11161] veth0_macvtap: entered promiscuous mode [ 2926.171964][T11161] veth1_macvtap: entered promiscuous mode [ 2926.208779][T11158] 8021q: adding VLAN 0 to HW filter on device team0 [ 2926.235167][T11161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.245876][T11161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.255857][T11161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.266404][T11161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.276387][T11161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.286919][T11161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.299695][T11161] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2926.310959][T30159] bridge0: port 1(bridge_slave_0) entered blocking state [ 2926.318074][T30159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2926.331274][T11161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2926.341901][T11161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.351896][T11161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2926.362633][T11161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.372513][T11161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2926.383068][T11161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.396640][T11161] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2926.413166][ T4214] bridge0: port 2(bridge_slave_1) entered blocking state [ 2926.420374][ T4214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2926.429834][T11161] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.438801][T11161] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.447696][T11161] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.456542][T11161] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2926.606502][T11158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2926.850496][T11158] veth0_vlan: entered promiscuous mode [ 2926.871845][T11158] veth1_vlan: entered promiscuous mode [ 2926.904603][T11158] veth0_macvtap: entered promiscuous mode [ 2926.914080][T11158] veth1_macvtap: entered promiscuous mode [ 2926.926954][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.937623][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.947579][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.958127][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.967984][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.978452][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2926.988304][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2926.998770][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2927.011592][T11158] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2927.031778][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2927.042320][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2927.052362][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2927.062918][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2927.072798][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2927.083438][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2927.093289][T11158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2927.104399][T11158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2927.124586][T11158] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2927.145222][T11158] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2927.154114][T11158] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2927.166511][T11158] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2927.175298][T11158] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2927.271657][T11475] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x20a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:51 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:51 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:51 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[0xffffffffffffffff], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000dff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2927.363467][T11490] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000010ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x216}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2927.615455][T11517] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000014ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x223}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:52 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000015ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2927.924288][T11535] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x224}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000016ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2928.144703][T11558] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:52 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x227}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:52 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[0xffffffffffffffff], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 13:03:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000018ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2928.329294][T11568] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x238}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf670000000000000703000064ff07006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2928.486672][T11583] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x248}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2928.673654][T11593] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2928.735289][T11593] team0: Port device gretap1 added 13:03:53 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300001efe0f006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x25a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:53 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[0xffffffffffffffff], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 2928.872830][T11608] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:53 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f5356") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x268}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300002dfd17006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2929.026056][T11625] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x284}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300003cfc1f006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x298}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300004bfb27006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300005afa2f006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x29c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:54 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c80)=[r0], 0x0, 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:54 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:54 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f5356") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2a6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff02006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2aa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff03006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2af}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff04006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2ba}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff05006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c80)=[r0], 0x0, 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:03:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:03:54 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff06006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:54 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:03:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff08006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff09006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0a006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0b006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:03:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) [ 2932.389581][T24144] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2932.444383][T24144] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2932.496859][T24144] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2932.576306][T24144] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2933.052022][T24144] team0: Port device gretap1 removed [ 2934.019426][T11826] chnl_net:caif_netlink_parms(): no params data found [ 2934.056072][T11826] bridge0: port 1(bridge_slave_0) entered blocking state [ 2934.063365][T11826] bridge0: port 1(bridge_slave_0) entered disabled state [ 2934.070855][T11826] bridge_slave_0: entered allmulticast mode [ 2934.077998][T11826] bridge_slave_0: entered promiscuous mode [ 2934.085488][T11826] bridge0: port 2(bridge_slave_1) entered blocking state [ 2934.092709][T11826] bridge0: port 2(bridge_slave_1) entered disabled state [ 2934.100075][T11826] bridge_slave_1: entered allmulticast mode [ 2934.106564][T11826] bridge_slave_1: entered promiscuous mode [ 2934.124982][T11826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2934.136434][T11826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2934.157516][T11826] team0: Port device team_slave_0 added [ 2934.164219][T11826] team0: Port device team_slave_1 added [ 2934.180340][T11826] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2934.187356][T11826] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2934.213357][T11826] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2934.225225][T11826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2934.232318][T11826] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2934.258324][T11826] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2934.286574][T11826] hsr_slave_0: entered promiscuous mode [ 2934.292825][T11826] hsr_slave_1: entered promiscuous mode [ 2934.298749][T11826] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2934.306348][T11826] Cannot create hsr debugfs directory [ 2934.675378][T11826] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2934.685510][T11826] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2934.695969][T11826] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2934.707584][T24144] hsr_slave_0: left promiscuous mode [ 2934.716020][T24144] hsr_slave_1: left promiscuous mode [ 2934.722040][T24144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2934.729592][T24144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2934.737521][T24144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2934.745060][T24144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2934.753082][T24144] bridge_slave_1: left allmulticast mode [ 2934.758735][T24144] bridge_slave_1: left promiscuous mode [ 2934.764519][T24144] bridge0: port 2(bridge_slave_1) entered disabled state [ 2934.772680][T24144] bridge_slave_0: left allmulticast mode [ 2934.778342][T24144] bridge_slave_0: left promiscuous mode [ 2934.784067][T24144] bridge0: port 1(bridge_slave_0) entered disabled state [ 2934.795505][T24144] veth1_macvtap: left promiscuous mode [ 2934.800978][T24144] veth0_macvtap: left promiscuous mode [ 2934.806597][T24144] veth1_vlan: left promiscuous mode [ 2934.811888][T24144] veth0_vlan: left promiscuous mode [ 2934.912063][T24144] team0 (unregistering): Port device team_slave_1 removed [ 2934.922501][T24144] team0 (unregistering): Port device team_slave_0 removed [ 2934.932705][T24144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2934.945171][T24144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2934.980498][T24144] bond0 (unregistering): Released all slaves [ 2935.035225][T11826] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2935.083513][T11826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2935.096634][T11826] 8021q: adding VLAN 0 to HW filter on device team0 [ 2935.109798][T27320] bridge0: port 1(bridge_slave_0) entered blocking state [ 2935.117040][T27320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2935.133060][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 2935.140170][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2935.223466][T11826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2935.391377][T11826] veth0_vlan: entered promiscuous mode [ 2935.409503][T11826] veth1_vlan: entered promiscuous mode [ 2935.430275][T11826] veth0_macvtap: entered promiscuous mode [ 2935.438322][T11826] veth1_macvtap: entered promiscuous mode [ 2935.453269][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2935.463848][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.474005][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2935.484508][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.494414][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2935.504908][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.514958][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2935.525761][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.537842][T11826] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2935.549994][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2935.560483][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.570431][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2935.580924][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.590776][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2935.601237][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.611142][T11826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2935.621764][T11826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2935.633841][T11826] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2935.645562][T11826] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2935.654521][T11826] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2935.663560][T11826] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2935.672366][T11826] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2935.717884][T11960] __nla_validate_parse: 6 callbacks suppressed [ 2935.717900][T11960] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2c6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:00 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:00 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:00 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c80)=[r0], 0x0, 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0c006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) [ 2935.840791][T11985] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2de}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0d006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2936.018455][T11995] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2e8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0e006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2936.190358][T12008] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2ea}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0f006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2936.485039][T12030] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2fb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2936.684321][T12040] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:01 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff10006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:01 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:01 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 2937.006679][T12082] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff11006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x302}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2937.166270][T12097] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2937.231858][T12097] team0: Port device gretap1 added 13:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x308}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff12006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2937.318532][T12104] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x30c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff14006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2937.486281][T12108] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x30e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff15006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:02 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:02 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x310}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff16006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:02 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:02 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff18006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x314}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x32a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2938.193919][T25518] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 13:04:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff64006702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2938.274190][T25518] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2938.355966][T25518] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 13:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x33c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2938.435854][T25518] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2939.174657][T25518] hsr_slave_0: left promiscuous mode [ 2939.188844][T25518] hsr_slave_1: left promiscuous mode [ 2939.203821][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2939.211316][T25518] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2939.227721][T25518] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2939.235239][T25518] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2939.244072][T25518] bridge_slave_1: left allmulticast mode [ 2939.249743][T25518] bridge_slave_1: left promiscuous mode [ 2939.255420][T25518] bridge0: port 2(bridge_slave_1) entered disabled state [ 2939.263188][T25518] bridge_slave_0: left allmulticast mode [ 2939.268824][T25518] bridge_slave_0: left promiscuous mode [ 2939.274506][T25518] bridge0: port 1(bridge_slave_0) entered disabled state [ 2939.285560][T25518] veth1_macvtap: left promiscuous mode [ 2939.291036][T25518] veth0_macvtap: left promiscuous mode [ 2939.296648][T25518] veth1_vlan: left promiscuous mode [ 2939.301872][T25518] veth0_vlan: left promiscuous mode [ 2939.397891][T25518] team0 (unregistering): Port device team_slave_1 removed [ 2939.408796][T25518] team0 (unregistering): Port device team_slave_0 removed [ 2939.418875][T25518] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2939.431020][T25518] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2939.465608][T25518] bond0 (unregistering): Released all slaves [ 2940.485906][T12261] chnl_net:caif_netlink_parms(): no params data found [ 2940.520663][T12261] bridge0: port 1(bridge_slave_0) entered blocking state [ 2940.527794][T12261] bridge0: port 1(bridge_slave_0) entered disabled state [ 2940.535105][T12261] bridge_slave_0: entered allmulticast mode [ 2940.541595][T12261] bridge_slave_0: entered promiscuous mode [ 2940.548566][T12261] bridge0: port 2(bridge_slave_1) entered blocking state [ 2940.555645][T12261] bridge0: port 2(bridge_slave_1) entered disabled state [ 2940.563438][T12261] bridge_slave_1: entered allmulticast mode [ 2940.569890][T12261] bridge_slave_1: entered promiscuous mode [ 2940.588572][T12261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2940.599209][T12261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2940.618834][T12261] team0: Port device team_slave_0 added [ 2940.625464][T12261] team0: Port device team_slave_1 added [ 2940.642782][T12261] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2940.649729][T12261] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2940.675719][T12261] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2940.687076][T12261] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2940.694059][T12261] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2940.720070][T12261] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2940.747941][T12261] hsr_slave_0: entered promiscuous mode [ 2940.754075][T12261] hsr_slave_1: entered promiscuous mode [ 2940.760002][T12261] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2940.767784][T12261] Cannot create hsr debugfs directory [ 2941.136407][T12261] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2941.145637][T12261] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2941.155359][T12261] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2941.164377][T12261] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2941.212437][T12261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2941.228248][T12261] 8021q: adding VLAN 0 to HW filter on device team0 [ 2941.238940][T27320] bridge0: port 1(bridge_slave_0) entered blocking state [ 2941.246224][T27320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2941.264572][T27320] bridge0: port 2(bridge_slave_1) entered blocking state [ 2941.271698][T27320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2941.349391][T12261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2941.435207][T12261] veth0_vlan: entered promiscuous mode [ 2941.446517][T12261] veth1_vlan: entered promiscuous mode [ 2941.467844][T12261] veth0_macvtap: entered promiscuous mode [ 2941.476323][T12261] veth1_macvtap: entered promiscuous mode [ 2941.489486][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2941.500007][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.509954][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2941.520522][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.530634][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2941.541180][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.551087][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2941.561660][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.576566][T12261] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2941.589658][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2941.600328][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.610264][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2941.620901][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.630781][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2941.641543][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.651397][T12261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2941.661968][T12261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2941.673895][T12261] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2941.683189][T12261] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2941.691939][T12261] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2941.700663][T12261] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2941.709380][T12261] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:04:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff00206702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x350}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:06 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:06 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07001802000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2942.430014][T12451] __nla_validate_parse: 5 callbacks suppressed [ 2942.430054][T12451] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07002002000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07026702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x352}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07036702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07046702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2942.671772][T12474] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:07 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07056702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x35e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:07 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x0, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:07 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07066702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2943.431863][T12534] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07076702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x362}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07086702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2943.576213][T12548] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07096702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x364}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2943.745198][T12562] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:08 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070a6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x372}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:08 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:08 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x0, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070b6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070c6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2944.324202][T12573] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070d6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070f6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x375}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07106702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2944.469116][T12593] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07126702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x378}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:09 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x0, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff00") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:09 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07136702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2945.201273][T12603] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x384}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07146702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2945.301522][T12614] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07156702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x392}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07166702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07186702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07196702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2945.500653][T12624] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:10 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x0, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff00") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff071b6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x39e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:10 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff071c6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff071e6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07216702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3a5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07306702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07346702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x0, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3bc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff073e6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff00") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x3, 0x4}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x9, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07506702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07606702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3c4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07706702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07846702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3c6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:11 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x0, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07ae6702000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3ca}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x0, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07001802000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006703000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006704000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006705000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006706000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3ce}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2947.564242][T24144] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2947.608608][T12706] __nla_validate_parse: 6 callbacks suppressed [ 2947.608642][T12706] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2947.665305][T24144] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2947.774116][T24144] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2947.871290][T24144] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 13:04:12 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:12 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x0, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3da}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2948.292946][T12719] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2948.366315][T12719] bond1: entered promiscuous mode [ 2948.446624][T12729] gretap2: entered promiscuous mode [ 2948.473205][T12729] bond1: (slave gretap2): Enslaving as an active interface with an up link [ 2948.651287][T24144] hsr_slave_0: left promiscuous mode [ 2948.659685][T24144] hsr_slave_1: left promiscuous mode [ 2948.668808][T24144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2948.676348][T24144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2948.688030][T24144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2948.696317][T24144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2948.717396][T24144] bridge_slave_1: left allmulticast mode [ 2948.723160][T24144] bridge_slave_1: left promiscuous mode [ 2948.728854][T24144] bridge0: port 2(bridge_slave_1) entered disabled state [ 2948.761129][T24144] bridge_slave_0: left allmulticast mode [ 2948.766857][T24144] bridge_slave_0: left promiscuous mode [ 2948.772585][T24144] bridge0: port 1(bridge_slave_0) entered disabled state [ 2948.788903][T24144] veth1_macvtap: left promiscuous mode [ 2948.794496][T24144] veth0_macvtap: left promiscuous mode [ 2948.800044][T24144] veth1_vlan: left promiscuous mode [ 2948.806132][T24144] veth0_vlan: left promiscuous mode [ 2948.987165][T24144] team0 (unregistering): Port device team_slave_1 removed [ 2948.998171][T24144] team0 (unregistering): Port device team_slave_0 removed [ 2949.010257][T24144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2949.023698][T24144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2949.063821][T24144] bond0 (unregistering): Released all slaves [ 2949.854460][T12818] chnl_net:caif_netlink_parms(): no params data found [ 2949.892873][T12818] bridge0: port 1(bridge_slave_0) entered blocking state [ 2949.900031][T12818] bridge0: port 1(bridge_slave_0) entered disabled state [ 2949.907436][T12818] bridge_slave_0: entered allmulticast mode [ 2949.914270][T12818] bridge_slave_0: entered promiscuous mode [ 2949.921579][T12818] bridge0: port 2(bridge_slave_1) entered blocking state [ 2949.928747][T12818] bridge0: port 2(bridge_slave_1) entered disabled state [ 2949.936933][T12818] bridge_slave_1: entered allmulticast mode [ 2949.943353][T12818] bridge_slave_1: entered promiscuous mode [ 2949.962182][T12818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2949.975082][T12818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2949.997309][T12818] team0: Port device team_slave_0 added [ 2950.004092][T12818] team0: Port device team_slave_1 added [ 2950.022382][T12818] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2950.029440][T12818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2950.055439][T12818] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2950.066839][T12818] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2950.073833][T12818] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2950.099873][T12818] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2950.130279][T12818] hsr_slave_0: entered promiscuous mode [ 2950.138797][T12818] hsr_slave_1: entered promiscuous mode [ 2950.144859][T12818] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2950.153559][T12818] Cannot create hsr debugfs directory [ 2950.532113][T12818] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2950.542552][T12818] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2950.551526][T12818] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2950.562019][T12818] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2950.616056][T12818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2950.630120][T12818] 8021q: adding VLAN 0 to HW filter on device team0 [ 2950.642841][ T8630] bridge0: port 1(bridge_slave_0) entered blocking state [ 2950.649957][ T8630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2950.664078][T31683] bridge0: port 2(bridge_slave_1) entered blocking state [ 2950.671171][T31683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2950.757264][T12818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2950.839445][T12818] veth0_vlan: entered promiscuous mode [ 2950.848566][T12818] veth1_vlan: entered promiscuous mode [ 2950.869548][T12818] veth0_macvtap: entered promiscuous mode [ 2950.878984][T12818] veth1_macvtap: entered promiscuous mode [ 2950.894262][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2950.904823][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2950.914841][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2950.925315][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2950.935155][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2950.945628][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2950.955477][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2950.965915][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2950.976809][T12818] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2950.989043][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2950.999607][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2951.009575][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2951.020141][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2951.029995][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2951.040463][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2951.050481][T12818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2951.061004][T12818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2951.074012][T12818] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2951.084144][T12818] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2951.092917][T12818] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2951.101627][T12818] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2951.110352][T12818] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:04:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006707000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3de}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:16 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:16 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:16 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x0, 0xff, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2951.858524][T13032] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2951.912344][T13032] bond2: entered promiscuous mode [ 2951.967709][T13032] gretap3: entered promiscuous mode [ 2952.018776][T13032] bond2: (slave gretap3): Enslaving as an active interface with an up link 13:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3e4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2952.114780][T13041] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2952.171216][T13041] bond3: entered promiscuous mode [ 2952.201758][T13043] gretap4: entered promiscuous mode [ 2952.246311][T13043] bond3: (slave gretap4): Enslaving as an active interface with an up link 13:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3ee}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2952.385699][T13045] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2952.434856][T13045] bond4: entered promiscuous mode [ 2952.462806][T13045] gretap5: entered promiscuous mode [ 2952.477189][T13045] bond4: (slave gretap5): Enslaving as an active interface with an up link 13:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2952.573754][T13048] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2952.649739][T13048] bond5: entered promiscuous mode 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006708000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2952.712589][T13050] gretap6: entered promiscuous mode [ 2952.718218][T13050] bond5: (slave gretap6): Enslaving as an active interface with an up link 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006709000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2952.803705][T13053] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2952.824026][T13053] bond6: entered promiscuous mode [ 2952.839432][T13053] gretap7: entered promiscuous mode 13:04:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0700670a000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2952.845678][T13053] bond6: (slave gretap7): Enslaving as an active interface with an up link 13:04:17 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:17 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0700670b000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:17 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0x0, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 2952.937050][T13061] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2953.009070][T13061] bond7: entered promiscuous mode 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0700670c000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0700670d000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff0700670f000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006710000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2953.091232][T13067] gretap8: entered promiscuous mode 13:04:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006711000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2953.127052][T13067] bond7: (slave gretap8): Enslaving as an active interface with an up link 13:04:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0x0, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006714000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:18 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:18 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:18 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0x0, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006715000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2953.818188][T13090] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006716000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2953.866357][T13090] bond8: entered promiscuous mode 13:04:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006764000003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067071b0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2953.982801][T13108] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006700200003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2954.049789][T13108] bond9: entered promiscuous mode [ 2954.099505][T13113] gretap9: entered promiscuous mode [ 2954.113764][T13113] bond9: (slave gretap9): Enslaving as an active interface with an up link 13:04:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0x0, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3fa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006738d80003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2954.704568][T13121] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2954.740684][T13121] bond10: entered promiscuous mode 13:04:19 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:19 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0x0, 0x1f, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:19 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702020003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3fc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2954.756561][T13121] gretap10: entered promiscuous mode [ 2954.765211][T13121] bond10: (slave gretap10): Enslaving as an active interface with an up link [ 2954.825776][T13132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702030003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2954.919668][T13132] bond11: entered promiscuous mode 13:04:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702040003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2954.970166][T13136] gretap11: entered promiscuous mode 13:04:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702050003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2955.018876][T13136] bond11: (slave gretap11): Enslaving as an active interface with an up link 13:04:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3fe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2955.132954][T13147] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2955.185849][T13147] bond12: entered promiscuous mode [ 2955.220052][T13147] gretap12: entered promiscuous mode [ 2955.254280][T13147] bond12: (slave gretap12): Enslaving as an active interface with an up link 13:04:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0x0, 0x0, 0x3, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702060003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:20 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2955.707963][T13154] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2955.729495][T13154] bond13: entered promiscuous mode [ 2955.777035][T13154] gretap13: entered promiscuous mode 13:04:20 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x0, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702070003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5b6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2955.804448][T13154] bond13: (slave gretap13): Enslaving as an active interface with an up link 13:04:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702080003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2955.878253][T13164] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702090003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5dc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067020a0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2956.022126][T13173] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x0, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067020b0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:20 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x0, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:20 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x0, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:21 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067020c0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067020d0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067020f0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x803}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702100003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x0, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702120003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:22 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x0, 0x0, 0x80000001, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:22 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:22 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x0, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702130003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702140003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702150003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702160003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2957.808205][T13222] bond14: entered promiscuous mode 13:04:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702180003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2957.893510][T13222] gretap14: entered promiscuous mode [ 2957.926933][T13222] bond14: (slave gretap14): Enslaving as an active interface with an up link 13:04:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x3f, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x6, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[r2], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x0, 0x56e, 0x3, 0x22, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x0, 0x0, 0x0, 0x3, 0xb3, &(0x7f00000008c0)=""/179, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000009c0)=[{0x2, 0x5, 0x2}, {0x3, 0x5, 0x4, 0x3}, {0x0, 0x1, 0xb, 0x7}, {0x5, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x6}, {0x2, 0x3, 0x6, 0x9}, {0xfffffffc, 0x0, 0x0, 0x4}, {}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000600)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32=r3, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r4], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x1, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x4, 0x80, 0x40, 0x2680, r3, 0x7fff, '\x00', 0x0, r5, 0x3, 0x3, 0x0, 0xc}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 13:04:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702190003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:23 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7, 0x9, 0xff, 0x1f, 0x0, 0x0, 0x20020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0x7}, 0x24a0c, 0x9, 0x8, 0x6, 0x2, 0xffffff01, 0x1000, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x10000, &(0x7f00000004c0)="ce732a067036f6a9f01244f3e23817780defda9bcf66452ac1b45d6eb828107c6f462afd130895d68d60911857e244900c6cfbe3b3977dd1743c7a3b0f0a2fd9715f24027b1118575016aa3bd518c433f6d2b6eb32801579303e98cce8b09143ced60a6f4ed613a0a7288a9e525927ae069851e0d38c517cc8a58acaa5191bbe751e1bddb26a17", 0x87, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001be5f889847f53560fafb3231b3c26795f744969cad6") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa02}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) 13:04:23 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.empty_time\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="bec233e7c7e9f4c8aa26ee26c376af9f616883d20de8ddb1687a2ab4255f90c5ff001b") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:04:23 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000000004b64ffec850000006d000000970000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xfffffffffffffd57, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x85}, @ldst={0x1, 0x0, 0x2, 0x5, 0x7, 0xfffffffffffffff4}, @call, @printk={@pointer}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x8d, &(0x7f0000000380)=""/141, 0x40f00, 0xeb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x5, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x0, 0x2, 0x3, 0xb}, {0x0, 0x1, 0xb, 0xc}, {0x5, 0x1, 0xe, 0x7}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18250000", @ANYRES32=0x1, @ANYBLOB="00000000fffbffff182a0000", @ANYRES32, @ANYBLOB="00000000030000009d610d95049cb06885e00a79326716a0506a4a2b19a161fdd2a2d2cc7e381eb5f88e8e9c6294754b321d10106e56ce3143b1e9e5768b9ea81be8373ac2"], &(0x7f0000000840)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x0, 0x3, 0x1000, 0x1881}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r0], &(0x7f0000001cc0)=[{0x1, 0x1, 0x4}, {0x2, 0x2, 0x4, 0x3}, {0x2, 0x4, 0x7, 0x8}, {0x0, 0x4, 0x10, 0xb}, {0x1, 0x4, 0x0, 0x6}], 0x10, 0x887}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/smsc75xx', 0x2c101, 0x86) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 13:04:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067021b0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2958.687395][T13241] __nla_validate_parse: 5 callbacks suppressed [ 2958.687425][T13241] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2958.725358][T13241] bond15: entered promiscuous mode 13:04:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067021c0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe6700078d25b3001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xac7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 2958.741804][T13241] gretap15: entered promiscuous mode [ 2958.751146][T13241] bond15: (slave gretap15): Enslaving as an active interface with an up link 13:04:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff070067021e0003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2958.847594][T13252] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:04:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702210003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:04:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061138c0000000000bf2000000000000015000200071b00003d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702300003000000160602000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ef2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2959.312393][T13236] ==================================================================