last executing test programs: 4.219968614s ago: executing program 3 (id=4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) connect(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x3, @loopback}}, 0x80) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000540)=@gcm_128={{0x303}, "ffffffffffffffe2", "8e083700daf38a6d69e9b5e9c2f133d7", "b900", "b4003a00"}, 0x28) r1 = memfd_create(&(0x7f00000001c0)='\xd9\x16h\xde\xf3|m\xe9^\xf5\"@\x05\xa0\x8f\xaa\x86nwZ\x11**F\xdf\xac\xc6(\x8e>\xbe0\xf1f\xb1\x87\x86!\x9c\xe1\xd2X\x18\xaaO', 0x7) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x800000000006}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x2) lseek(r1, 0x1, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x20000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0xa}}, './file0\x00'}) shutdown(r0, 0x1) openat$cgroup(r5, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) getsockopt$inet6_tcp_buf(r5, 0x6, 0xe, &(0x7f0000000580)=""/4096, &(0x7f0000000180)=0x1000) 3.688059386s ago: executing program 3 (id=9): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa001, 0x0, 0x700000, 0x2, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x2000000000000016, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00'}, 0x18) r10 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x40000000, 0x0, 0x3}, 0x8}) connect$llc(r2, &(0x7f0000000180)={0x1a, 0x104, 0x0, 0x12, 0x0, 0x2, @remote}, 0x10) r11 = socket(0x10, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000480)={0x732, 0x0, 0x5, 0x7, 0x2, 0x4}) r12 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r12, 0x29, 0x20, &(0x7f0000000180)={@private1={0xfc, 0x1, '\x00', 0xfd}, 0x7fffffd, 0x0, 0x3, 0x1, 0xfffc}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r12, 0x29, 0x20, &(0x7f0000000000)={@loopback={0xfec0ffff00000000}, 0x8000000, 0x0, 0x3, 0x0, 0x0, 0x600}, 0x20) sendmsg$key(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="020303020a0000002ba57000fedbdf25080012000000010000000000ff0f000006002b00030200000800000000000000fe8000000000000000000000000000bbff0200"/78, @ANYRES32=r4, @ANYBLOB="e89bfb67d89d13c9f92456613a47f2a22d55c0e4cef30f3c57d6e0cc463bf7eafd2a30f5a71605aedeacd7f7b47bc8c752de0b0625191e44f9e56dd87b109ba167740f3fa6b327a8e8692bfce66511729b08619df92440f1a5206261851d935f5e81b566a759b5300170397bce7c17eaa3260e5683b5c388fa467f39d08a3d97aae2276da4494184d5088ba7a740514e3a7d869cdf5070e430d3709284e866b1abb7f6a8dd37b1564c", @ANYRESOCT=r10, @ANYRES64=r11, @ANYBLOB="d96c06c01d71a34d0264647a1ae115f008a78b06341a7c66d7c64bc93dae8eb25d5cfdc0d20e0745074b85ed9e04d3c1b3ad31f6fbf2cb50bde752ea588d3817276f2b53772b56bb081ec68bc5a87870885ed927611eb65da94f8acfda713dfa6848d4ac05ee02db1d1ad64da942d94c6cde3e4d38736e4968ccce8b26dff5", @ANYRES8=r9, @ANYRESOCT=r8, @ANYRESDEC=r7, @ANYRES16=r5, @ANYRES32=r9], 0x50}}, 0x8005) close_range(r11, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x94) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x18, r14, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f0000000000)=r0}, 0x20) 2.84037836s ago: executing program 4 (id=22): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x593, &(0x7f0000000400)={0x0, 0xc459, 0x8, 0x2, 0x398}, &(0x7f0000000040), &(0x7f0000000a40)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(r2, 0x12, 0x0, 0x0) 2.777354026s ago: executing program 4 (id=23): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000cc0)={0x0}, 0x1, 0x0, 0x20000, 0x40001d4}, 0x8840) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000ac0)=@newqdisc={0x24, 0x24, 0xf0b, 0x70bd2c, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}, {0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x48804}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x328000, 0x1000}, 0x20) shutdown(r5, 0x1) listen(0xffffffffffffffff, 0xfffffff8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r9 = syz_io_uring_setup(0x2d7b, &(0x7f0000000340)={0x0, 0x6bf6, 0x100, 0x5, 0x12}, &(0x7f00000000c0)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r10, r11, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r9, 0x4e22, 0x4000352a, 0x40, 0x0, 0x0) splice(r5, 0x0, r4, 0x0, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="01160800"/20, @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="04000000040000000200"/28], 0x50) 1.854543097s ago: executing program 4 (id=30): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00'}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 1.782371084s ago: executing program 0 (id=32): syz_socket_connect_nvme_tcp() 1.747630347s ago: executing program 4 (id=33): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) connect(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x3, @loopback}}, 0x80) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000540)=@gcm_128={{0x303}, "ffffffffffffffe2", "8e083700daf38a6d69e9b5e9c2f133d7", "b900", "b4003a00"}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x800000000006}, 0x18) lseek(0xffffffffffffffff, 0x1, 0x0) 1.710827491s ago: executing program 0 (id=34): syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r3 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x400, 0x3, 0x40289}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}) io_uring_enter(r3, 0x3498, 0x969, 0xffff000000000000, 0x0, 0x0) dup3(r0, r1, 0x0) 1.588997943s ago: executing program 4 (id=38): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0, 0x0, 0x2}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) fsopen(0x0, 0x0) link(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) semtimedop(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x2}, 0x18) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5}, 0x18) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005000400000000000900020073797a310000000005000500020200000500010006"], 0x44}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x24000004) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='kfree\x00', r8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7}, &(0x7f0000000000), &(0x7f00000003c0)=r8}, 0x20) syz_open_dev$sg(&(0x7f00000008c0), 0x0, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 1.538606278s ago: executing program 0 (id=40): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2}, 0x94) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'macvlan1\x00', 0x0}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r6], 0x40}}, 0x4008054) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x114, 0xe) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14, 0x10, 0x4}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x80, 0xc, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x54, 0x3, 0x0, 0x1, [{0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x44, 0xb, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0x10}]}}}, {0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}]}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x104}}, 0x0) mmap(&(0x7f00002f3000/0x2000)=nil, 0x2000, 0x800006, 0x40010, r3, 0x5346b000) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, 0x8) r8 = gettid() tkill(r8, 0x12) tkill(0x0, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='f2fs_gc_begin\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000e00)=[{{&(0x7f0000000280)={0xa, 0x4e20, 0x9, @mcast2, 0x8001}, 0x1c, &(0x7f0000000200), 0x0, &(0x7f0000000e80)}}, {{&(0x7f00000003c0)={0xa, 0x4e23, 0x5, @private0, 0x4}, 0x1c, &(0x7f0000000cc0)=[{&(0x7f0000000800)}, {0x0}, {&(0x7f0000000980)="93cc8f8e94a04b8dd0d9d661a39849336c6c53fcb4708b13d343c78ad593cf3f188b0a2c95690216f3b72859a417d67fdcd58f5274eb76931709495cbe9562ceffaa6ca6cf39f1a51e46824faae6d35d45f77c8e40d1946e75642591ddf22a56653000c1a126c9c3134377704dfb040fbe913d5848427a688a886b823f90cb8eb068d59c92a6edb3c9f6bc2bfb07497118c83fc503bcb11593c0421b2f0640effccfc4cbab07b874e93f7f849d6bd18ab06124ea1f97ad34c567484e85372d5e77d0258c805d6b809a263595fe816ada41dd8ef4ad084f9c7041919467130140714bfa803c43", 0xe6}, {&(0x7f0000000b40)}, {&(0x7f0000000c40)="dee596bd41642e1eaf32ab3610f7b222a04b0a3cff27939d867e952555e97660dc857f76cfba7cbcb82955b705f795c9e64bc22ee77d8a608f4d89d7102741edd46d837e70cd98bf0cfb6102ed269c638144539cd8823f4d1289bc6d0f", 0x5d}, {&(0x7f0000000580)="04c3aaf5ce58720a0122f7429b7ef4f503eb27f5fa8bfe9afaa532627e006ffece93942416b44697e989f24f6dd042e4a9ade1e20ffbab", 0x37}], 0x6}}], 0x2, 0x2008840) r9 = geteuid() r10 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, r9, r10}, 0xc) r11 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet6(r11, &(0x7f00000019c0)=[{{&(0x7f00000002c0)={0xa, 0x4e22, 0x8001, @local, 0xe9f0}, 0x1c, 0x0, 0x0, &(0x7f0000001140)=[@flowinfo={{0x14, 0x29, 0xb, 0xa8f}}, @flowinfo={{0x14, 0x29, 0xb, 0x81}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3007}}], 0x48}}], 0x1, 0x4000000) sendmsg$netlink(r1, 0x0, 0x5) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r12, 0x29, 0x40, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x160, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@remote, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'gre0\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x3c, 0x9, 0x0, 0x50}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "978888d6ee9e7a5e4bc76ccf4228733e737d402fc4a91c346e4f9a692f63"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffff00, 0x0, 0xfffffefe], [0xffffff00, 0xff, 0xff, 0xff000000], 'bridge_slave_0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x1, 0x2, 0x2, 0x1}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 1.383993113s ago: executing program 0 (id=42): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00'}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 1.276029064s ago: executing program 0 (id=43): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6871cddc5ee58a1d, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESHEX], &(0x7f0000019300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300030f000000000700000000000005000900e000000001d78771b90bd8a3b4914783c587c7ab18285f7a55d53e6e9bfdac550000000003000600000000000200000000000000000000000000000002000100000000000000020d00000000030005000000000002"], 0x78}, 0x1, 0x7}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000480)='kmem_cache_free\x00', r1}, 0x18) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000194c0)={0x0, 0x0, &(0x7f0000019380)={&(0x7f0000019400)=ANY=[@ANYRES32=r6, @ANYRES32=r0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300050000000004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES64=r4], 0xb4}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800002, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000340)=0xa, 0x4) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r8}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000195c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYRES8], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9, 0x0, 0x7}, 0x18) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r10, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) bpf$MAP_CREATE(0x0, &(0x7f0000019200)=ANY=[@ANYBLOB="0e000000cc000000ff0f00000400000000400000", @ANYRES32=0x1, @ANYBLOB="0900000000000000000000000000000000000000301b2ebad170398a4bfb0bf9b734389be409335dc68882752728cf6ca703000000000000005885755c4046b2a5640553cbe4e6610c397bf82d75ec48c8bdf6e4a89106dc35a8281bccfaa7047ee8061fd4511bed8610ad54750fa00300000000000000a2aeba3980678e9b518f968a332a0291876173c8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000400"/28], 0x50) getsockopt$inet6_mreq(r10, 0x29, 0x0, &(0x7f00000193c0)={@private1}, &(0x7f0000019340)=0x14) request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000380)=')\x80', 0x0) 844.892577ms ago: executing program 4 (id=47): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000c00)={0x0, "757f43e4ba94fdb1d9af1678a7917f3c"}) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000001c00)={0x2, 0x8000000000000000, @start={r3, 0x0, "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", "f3d6bdba7e523d31369269b97f5f57ce75b6a8fdd87648b00ab46f7166853b89099aec959a758f651295be268d727999305c0ae7bec6a8b0f47002bfd4fa5a4bac966cece7cdf50cc841bef64ed2fbd1381e01d0f773e8a29190d3171b333d6a4e13f232a578411e1d43f989b9b0b7306e608c3228807b0a63a8a2cc56d8a3b933fdb73638c4cf7f802ed1d5f98657dcce0c56b6ac3c80bf8b059827dfe7c44d8df46d78a97507c219c575ffc64f92d9454569fae70bd1cdfff91e278db3846f20c89d27a35279e4170ee29f1668f4c0465e029780c01cf229e755622218f410e64dd79492402edd7151a967eb5be6446460143cd652a9afa82ff3ef4cc4cc4270534e0c3492f705d3754c71682f35ae653fae9a2a3d5a611f2c5e718b6c6e624f2737a3612a8dfa29dc317ae72329674b7c5f11e4b9e38814805a5c64937954f5394147fd06fbeda5d990b6bc06a18641d82736ad881d352cd28aa62681da9249e90be1c4753f6fae6f2f3879e5daf1385ae728b3fad626c2610bebcbfe8cb44d9d39c835e647ea7576d1a25cfb98a4a00ee0e93f97c67bf287d22a06d290156a3f829ed8c7b5e2c0fe577cbe845d456a7fe120de00802669a09f7fe892df394b37b0d101f86c77fb904a76fa2147ceb099999da802806a9b2362a4e1333cc081f4820ce1e01aab3721e779a7a6abe40d6c8570151e1f718564aec1b7e68e848edb64ab6247694e144a621796a0ef798d8c247b36a6c11aa1685948ca458bce486ec09a2c64a0600dc9abeebbb0299a72b7ef448c6f15edb9819e1aca319c1e96f18e3c9225694f2c71668b4a78c88747ccf7fcc550432c24384349351c5e70fcf880240f24d0ce40e042fb0dacbc639ce4d5a17c3905a482432e55c6eb5f73229465cfe67aa2871a3264cbbfc558d761e40926b003dc53b3b634c7f02ff76adcbe10b0e0b27f680c835aea453a10fa637e31b5435109d30004f7e1356e3c8db4ca0c13485f7b8b8a12426cd6c035996d48eee609c5c7ecf82a6120708079239dbdf0504ae58340f5a1bc8a84c8f88a4e7561fab556e7dcc5fc97e740f638852a52d57f5821f0ec717e82d54e6a6bfda557798b4fb4c14e65232d012dfe95afbfeb8ebbfcf6c3b44489bdbc6b6068ea7cdfbc289f64ebb8263787e807afc00fe84a4b8284ba4d863f62e98a75b076007faa2e648f3bd5127e1f61b24f16babcda95d82c8ebd5616a270a9ac796acac3afab93aa626985f0fa9e52cd687b0f0c8bd38737cb09332e81b4be1578f053abef82a64a88ca02b608758ec85e38194e11a32b072cabf0812d436df1ce91b6384204f5bd39fee8ac3b962a816b1fcd5ae36e60f52b82c0b7432f3d71c70f6074e89bf2c00e1f863ded96fe0d6a62758336a61124cc51b03c62c9ccbe1b082419327d00"}, [0x344, 0x2, 0x2, 0x7, 0x5, 0xc, 0x8001, 0x7, 0x1, 0x2, 0x7fff, 0x1, 0x8, 0x7, 0x0, 0x0, 0x34, 0x6, 0x7, 0x3f, 0x0, 0x7ae, 0x7ff, 0x7bdc, 0x800, 0x0, 0x1, 0x8000000000000000, 0x8, 0x0, 0xfffffffffffffff9, 0x9, 0x6, 0x6, 0x2, 0xecd, 0x3, 0xffffffff, 0x9, 0x0, 0xe6e5, 0x46, 0x2, 0x5e9, 0x7, 0x6, 0x0, 0x8, 0x400, 0x800, 0x0, 0x2, 0x0, 0x200000000852b, 0x3, 0x2, 0x5, 0x7, 0x7fffffff, 0x6, 0xa0af624, 0x3, 0x3, 0x6]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r4, 0x29, 0x4d, &(0x7f0000000040)=0x7, 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r5, 0x402, 0x1c) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53048fc) recvmmsg(r4, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}, 0xd6}], 0x1, 0x10002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x10) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000300)) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000002180)={'geneve1\x00'}) r9 = socket(0x10, 0x2, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1900100000000001000000000000000018000020207025000000002dba513d7b1a2dbcfc3f0000000000000000000007010000f8ffffffb702000008000000b703000000008fd885000400040000009560edffd53d6639d7f55a2d5863539e79e90913b3769c8de7366f327b66a9f398803d5187953f00"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x36}, 0x18) setsockopt$inet6_tcp_int(r10, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r10, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r10, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r10, 0x11a, 0x1, &(0x7f0000000480)=@gcm_256={{0x303}, "000200", "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", "7e25837b", "15d0db2c77179e1a"}, 0x38) write$binfmt_script(r10, &(0x7f0000000500)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r10, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) close_range(r9, r10, 0x0) 596.329961ms ago: executing program 2 (id=48): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6871cddc5ee58a1d, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESHEX], &(0x7f0000019300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00'}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 541.028877ms ago: executing program 1 (id=49): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6871cddc5ee58a1d, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESHEX], &(0x7f0000019300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00'}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 498.31038ms ago: executing program 2 (id=50): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) connect(r0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000540)=@gcm_128={{0x303}, "ffffffffffffffe2", "8e083700daf38a6d69e9b5e9c2f133d7", "b900", "b4003a00"}, 0x28) r1 = memfd_create(&(0x7f00000001c0)='\xd9\x16h\xde\xf3|m\xe9^\xf5\"@\x05\xa0\x8f\xaa\x86nwZ\x11**F\xdf\xac\xc6(\x8e>\xbe0\xf1f\xb1\x87\x86!\x9c\xe1\xd2X\x18\xaaO', 0x7) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x800000000006}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x2) lseek(r1, 0x1, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x20000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0xa}}, './file0\x00'}) shutdown(r0, 0x1) openat$cgroup(r5, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) getsockopt$inet6_tcp_buf(r5, 0x6, 0xe, &(0x7f0000000580)=""/4096, &(0x7f0000000180)=0x1000) 466.196564ms ago: executing program 1 (id=51): add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x609e495c}, 0x94) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') 418.084039ms ago: executing program 1 (id=52): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r3], 0x40}}, 0x4008054) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x114, 0xe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14, 0x10, 0x4}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x80, 0xc, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x54, 0x3, 0x0, 0x1, [{0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x44, 0xb, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0x10}]}}}, {0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}]}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x104}}, 0x0) mmap(&(0x7f00002f3000/0x2000)=nil, 0x2000, 0x800006, 0x40010, r1, 0x5346b000) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, 0x8) r5 = gettid() tkill(r5, 0x12) tkill(0x0, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='f2fs_gc_begin\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000e00)=[{{&(0x7f0000000280)={0xa, 0x4e20, 0x9, @mcast2, 0x8001}, 0x1c, &(0x7f0000000200), 0x0, &(0x7f0000000e80)}}, {{&(0x7f00000003c0)={0xa, 0x4e23, 0x5, @private0, 0x4}, 0x1c, &(0x7f0000000cc0)=[{&(0x7f0000000800)}, {0x0}, {&(0x7f0000000980)="93cc8f8e94a04b8dd0d9d661a39849336c6c53fcb4708b13d343c78ad593cf3f188b0a2c95690216f3b72859a417d67fdcd58f5274eb76931709495cbe9562ceffaa6ca6cf39f1a51e46824faae6d35d45f77c8e40d1946e75642591ddf22a56653000c1a126c9c3134377704dfb040fbe913d5848427a688a886b823f90cb8eb068d59c92a6edb3c9f6bc2bfb07497118c83fc503bcb11593c0421b2f0640effccfc4cbab07b874e93f7f849d6bd18ab06124ea1f97ad34c567484e85372d5e77d0258c805d6b809a263595fe816ada41dd8ef4ad084f9c7041919467130140714bfa803c43", 0xe6}, {&(0x7f0000000b40)}, {&(0x7f0000000c40)="dee596bd41642e1eaf32ab3610f7b222a04b0a3cff27939d867e952555e97660dc857f76cfba7cbcb82955b705f795c9e64bc22ee77d8a608f4d89d7102741edd46d837e70cd98bf0cfb6102ed269c638144539cd8823f4d1289bc6d0f", 0x5d}, {&(0x7f0000000580)="04c3aaf5ce58720a0122f7429b7ef4f503eb27f5fa8bfe9afaa532627e006ffece93942416b44697e989f24f6dd042e4a9ade1e20ffbab", 0x37}], 0x6}}], 0x2, 0x2008840) r6 = geteuid() r7 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet6(r8, &(0x7f00000019c0)=[{{&(0x7f00000002c0)={0xa, 0x4e22, 0x8001, @local, 0xe9f0}, 0x1c, 0x0, 0x0, &(0x7f0000001140)=[@flowinfo={{0x14, 0x29, 0xb, 0xa8f}}, @flowinfo={{0x14, 0x29, 0xb, 0x81}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3007}}], 0x48}}], 0x1, 0x4000000) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x5) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x160, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@remote, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'gre0\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x3c, 0x9, 0x0, 0x50}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "978888d6ee9e7a5e4bc76ccf4228733e737d402fc4a91c346e4f9a692f63"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffff00, 0x0, 0xfffffefe], [0xffffff00, 0xff, 0xff, 0xff000000], 'bridge_slave_0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x1, 0x2, 0x2, 0x1}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 372.039773ms ago: executing program 1 (id=53): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x7, 0x4, 0x100, 0x6, 0x8}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000030000000400000000000004ffff00000061009da38e2915329b2388fe4adc3929e93071c454936593bd80e7f0ffa765797475497e06656be4cdcf954df8b3785e59dcea168b81a8b47e1d90ebd61cbb00ae9b34cbf9002bd74a1e646c8279f6ec3caebf9ced2911bf6fdc9ba0553065f09eee0f15dc884eb4f8c258237a20f65f1ba5bc1356311f9815c7cf70f1ad014ce07fb49c63e94fb46d199485dd11b655e8698f27604ab21f34b7489419afbc6193cdd606667cd60a7062dffeea987fdaaaa935ab3a9e1f4528eb23f6f1f3391c0693"], 0x0, 0x27, 0x0, 0x8, 0xdd6}, 0x28) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r3, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000740)={0x0}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffff001}, 0x18) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001cc0)=@newtfilter={0x78, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x0, 0xf}, {}, {0x7, 0x10}}, [@filter_kind_options=@f_flow={{0x9}, {0x48, 0x2, [@TCA_FLOW_EMATCHES={0x44, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x34, 0x1, 0x0, 0x0, {{0x4, 0x9, 0x40}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xfc}, @TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}]}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x2008c014) 288.663151ms ago: executing program 1 (id=54): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6871cddc5ee58a1d, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESHEX], &(0x7f0000019300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00'}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 258.086044ms ago: executing program 2 (id=55): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2}, 0x94) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r4], 0x40}}, 0x4008054) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x114, 0xe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14, 0x10, 0x4}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x80, 0xc, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x54, 0x3, 0x0, 0x1, [{0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x44, 0xb, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0x10}]}}}, {0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}]}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x104}}, 0x0) mmap(&(0x7f00002f3000/0x2000)=nil, 0x2000, 0x800006, 0x40010, 0xffffffffffffffff, 0x5346b000) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, 0x8) r6 = gettid() tkill(r6, 0x12) tkill(0x0, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='f2fs_gc_begin\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000e00)=[{{&(0x7f0000000280)={0xa, 0x4e20, 0x9, @mcast2, 0x8001}, 0x1c, &(0x7f0000000200), 0x0, &(0x7f0000000e80)}}, {{&(0x7f00000003c0)={0xa, 0x4e23, 0x5, @private0, 0x4}, 0x1c, &(0x7f0000000cc0)=[{&(0x7f0000000800)}, {0x0}, {&(0x7f0000000980)="93cc8f8e94a04b8dd0d9d661a39849336c6c53fcb4708b13d343c78ad593cf3f188b0a2c95690216f3b72859a417d67fdcd58f5274eb76931709495cbe9562ceffaa6ca6cf39f1a51e46824faae6d35d45f77c8e40d1946e75642591ddf22a56653000c1a126c9c3134377704dfb040fbe913d5848427a688a886b823f90cb8eb068d59c92a6edb3c9f6bc2bfb07497118c83fc503bcb11593c0421b2f0640effccfc4cbab07b874e93f7f849d6bd18ab06124ea1f97ad34c567484e85372d5e77d0258c805d6b809a263595fe816ada41dd8ef4ad084f9c7041919467130140714bfa803c43", 0xe6}, {&(0x7f0000000b40)}, {&(0x7f0000000c40)="dee596bd41642e1eaf32ab3610f7b222a04b0a3cff27939d867e952555e97660dc857f76cfba7cbcb82955b705f795c9e64bc22ee77d8a608f4d89d7102741edd46d837e70cd98bf0cfb6102ed269c638144539cd8823f4d1289bc6d0f", 0x5d}, {&(0x7f0000000580)="04c3aaf5ce58720a0122f7429b7ef4f503eb27f5fa8bfe9afaa532627e006ffece93942416b44697e989f24f6dd042e4a9ade1e20ffbab", 0x37}], 0x6}}], 0x2, 0x2008840) r7 = geteuid() r8 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet6(r9, &(0x7f00000019c0)=[{{&(0x7f00000002c0)={0xa, 0x4e22, 0x8001, @local, 0xe9f0}, 0x1c, 0x0, 0x0, &(0x7f0000001140)=[@flowinfo={{0x14, 0x29, 0xb, 0xa8f}}, @flowinfo={{0x14, 0x29, 0xb, 0x81}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3007}}], 0x48}}], 0x1, 0x4000000) sendmsg$netlink(r1, 0x0, 0x5) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r10, 0x29, 0x40, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x160, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@remote, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'gre0\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x3c, 0x9, 0x0, 0x50}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "978888d6ee9e7a5e4bc76ccf4228733e737d402fc4a91c346e4f9a692f63"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffff00, 0x0, 0xfffffefe], [0xffffff00, 0xff, 0xff, 0xff000000], 'bridge_slave_0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x1, 0x2, 0x2, 0x1}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 209.537239ms ago: executing program 2 (id=56): socket$packet(0x11, 0x3, 0x300) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)='0', 0x1}], 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000001c0), 0x0, 0x835, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x1}, 0x18) prctl$PR_GET_IO_FLUSHER(0x3a) r3 = socket(0x28, 0x5, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(0xffffffffffffffff, 0x0) connect$vsock_stream(r3, &(0x7f0000000080), 0x10) sendmmsg(r3, &(0x7f0000000100)=[{{0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x8080) r4 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) recvfrom$unix(r4, &(0x7f0000000300)=""/278, 0x116, 0x22, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0ffb}]}) setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file1\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) sync() sync() set_mempolicy(0x8006, &(0x7f0000000240)=0xfff, 0xd) r5 = openat$cgroup_ro(r1, &(0x7f0000000200)='memory.stat\x00', 0x275a, 0x0) fcntl$lock(r5, 0x5, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 156.969045ms ago: executing program 1 (id=57): r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0xa, &(0x7f0000000000)=0x2, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x1ff02, 0x351500) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000100004000000000000000000570000000a20000000000a05000000000000000000070000000900010073797a30000000003c000a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021480000000c0a01030000000000000000070000000900020073797a310000000009"], 0xcc}}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r4}, 0x38) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f00000001c0)={@dev, @multicast2}, &(0x7f0000000200)=0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000100000000000000003000003"], 0x10) 89.330441ms ago: executing program 2 (id=58): r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x609e495c}, 0x94) r1 = add_key$user(&(0x7f0000001040), &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000240)="de", 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', r1}) 37.295546ms ago: executing program 2 (id=59): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x7, 0x4, 0x100, 0x6, 0x8}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000030000000400000000000004ffff00000061009da38e2915329b2388fe4adc3929e93071c454936593bd80e7f0ffa765797475497e06656be4cdcf954df8b3785e59dcea168b81a8b47e1d90ebd61cbb00ae9b34cbf9002bd74a1e646c8279f6ec3caebf9ced2911bf6fdc9ba0553065f09eee0f15dc884eb4f8c258237a20f65f1ba5bc1356311f9815c7cf70f1ad014ce07fb49c63e94fb46d199485dd11b655e8698f27604ab21f34b7489419afbc6193cdd606667cd60a7062dffeea987fdaaaa935ab3a9e1f4528eb23f6f1f3391c0693"], 0x0, 0x27, 0x0, 0x8, 0xdd6}, 0x28) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r3, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000740)={0x0}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffff001}, 0x18) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001cc0)=@newtfilter={0x78, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x0, 0xf}, {}, {0x7, 0x10}}, [@filter_kind_options=@f_flow={{0x9}, {0x48, 0x2, [@TCA_FLOW_EMATCHES={0x44, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x34, 0x1, 0x0, 0x0, {{0x4, 0x9, 0x40}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xfc}, @TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}]}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x2008c014) 0s ago: executing program 0 (id=60): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6871cddc5ee58a1d, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESHEX], &(0x7f0000019300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00'}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.189' (ED25519) to the list of known hosts. [ 34.103281][ T29] audit: type=1400 audit(1761031265.963:62): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 34.126307][ T29] audit: type=1400 audit(1761031265.983:63): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.127262][ T3305] cgroup: Unknown subsys name 'net' [ 34.154088][ T29] audit: type=1400 audit(1761031266.013:64): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.313115][ T3305] cgroup: Unknown subsys name 'cpuset' [ 34.319437][ T3305] cgroup: Unknown subsys name 'rlimit' [ 34.450670][ T29] audit: type=1400 audit(1761031266.303:65): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.475138][ T29] audit: type=1400 audit(1761031266.303:66): avc: denied { create } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.495672][ T29] audit: type=1400 audit(1761031266.303:67): avc: denied { write } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.504323][ T3308] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.516113][ T29] audit: type=1400 audit(1761031266.303:68): avc: denied { read } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.544918][ T29] audit: type=1400 audit(1761031266.303:69): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.569708][ T29] audit: type=1400 audit(1761031266.303:70): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.575228][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.592929][ T29] audit: type=1400 audit(1761031266.393:71): avc: denied { relabelto } for pid=3308 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 35.983739][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 36.019094][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 36.034163][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 36.079759][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.086853][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.094104][ T3316] bridge_slave_0: entered allmulticast mode [ 36.100482][ T3316] bridge_slave_0: entered promiscuous mode [ 36.122282][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.129345][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.136499][ T3316] bridge_slave_1: entered allmulticast mode [ 36.142778][ T3316] bridge_slave_1: entered promiscuous mode [ 36.171835][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 36.186691][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.208356][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.222297][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.229377][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.236584][ T3320] bridge_slave_0: entered allmulticast mode [ 36.243290][ T3320] bridge_slave_0: entered promiscuous mode [ 36.249782][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.256861][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.264063][ T3320] bridge_slave_1: entered allmulticast mode [ 36.270484][ T3320] bridge_slave_1: entered promiscuous mode [ 36.276819][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 36.299795][ T3316] team0: Port device team_slave_0 added [ 36.327330][ T3316] team0: Port device team_slave_1 added [ 36.334129][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.348208][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.357326][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.364467][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.371600][ T3315] bridge_slave_0: entered allmulticast mode [ 36.378066][ T3315] bridge_slave_0: entered promiscuous mode [ 36.401827][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.408910][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.416160][ T3315] bridge_slave_1: entered allmulticast mode [ 36.422478][ T3315] bridge_slave_1: entered promiscuous mode [ 36.438256][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.445674][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.471723][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.496886][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.503875][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.529845][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.541392][ T3320] team0: Port device team_slave_0 added [ 36.561648][ T3320] team0: Port device team_slave_1 added [ 36.568617][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.593765][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.607589][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.614764][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.622083][ T3323] bridge_slave_0: entered allmulticast mode [ 36.628530][ T3323] bridge_slave_0: entered promiscuous mode [ 36.648957][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.655941][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.681856][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.692807][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.699858][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.707230][ T3323] bridge_slave_1: entered allmulticast mode [ 36.713821][ T3323] bridge_slave_1: entered promiscuous mode [ 36.720085][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.727246][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.734491][ T3321] bridge_slave_0: entered allmulticast mode [ 36.740919][ T3321] bridge_slave_0: entered promiscuous mode [ 36.756551][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.763519][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.789665][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.805641][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.812761][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.819871][ T3321] bridge_slave_1: entered allmulticast mode [ 36.826327][ T3321] bridge_slave_1: entered promiscuous mode [ 36.834553][ T3316] hsr_slave_0: entered promiscuous mode [ 36.840469][ T3316] hsr_slave_1: entered promiscuous mode [ 36.847107][ T3315] team0: Port device team_slave_0 added [ 36.855566][ T3315] team0: Port device team_slave_1 added [ 36.882619][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.896625][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.903612][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.929613][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.941594][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.963105][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.978142][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.985145][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.011098][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.023086][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.060211][ T3321] team0: Port device team_slave_0 added [ 37.079840][ T3323] team0: Port device team_slave_0 added [ 37.087492][ T3320] hsr_slave_0: entered promiscuous mode [ 37.093536][ T3320] hsr_slave_1: entered promiscuous mode [ 37.099423][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 37.105192][ T3320] Cannot create hsr debugfs directory [ 37.111208][ T3321] team0: Port device team_slave_1 added [ 37.130387][ T3323] team0: Port device team_slave_1 added [ 37.150403][ T3315] hsr_slave_0: entered promiscuous mode [ 37.156459][ T3315] hsr_slave_1: entered promiscuous mode [ 37.162353][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 37.168074][ T3315] Cannot create hsr debugfs directory [ 37.181253][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.188285][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.214201][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.225178][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.232139][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.258119][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.269312][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.276320][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.302261][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.329214][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.336326][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.362238][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.423227][ T3323] hsr_slave_0: entered promiscuous mode [ 37.429131][ T3323] hsr_slave_1: entered promiscuous mode [ 37.435089][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 37.440808][ T3323] Cannot create hsr debugfs directory [ 37.467204][ T3321] hsr_slave_0: entered promiscuous mode [ 37.473435][ T3321] hsr_slave_1: entered promiscuous mode [ 37.479334][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 37.485145][ T3321] Cannot create hsr debugfs directory [ 37.556294][ T3316] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.577086][ T3316] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.598172][ T3316] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.608963][ T3316] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.654216][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.671873][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.690551][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.700848][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.725356][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.735117][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.747382][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.761328][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.801203][ T3321] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.810114][ T3321] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.821663][ T3321] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.830560][ T3321] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.853419][ T3323] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.867885][ T3323] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.881233][ T3323] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.904780][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.912069][ T3323] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.945220][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.954147][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.970334][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.984144][ T265] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.991271][ T265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.006323][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.014337][ T265] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.021489][ T265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.039561][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.057655][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.066695][ T265] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.073839][ T265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.082333][ T265] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.089496][ T265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.109038][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.119529][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.132083][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.139147][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.166829][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.177103][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.184188][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.203591][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.210701][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.223735][ T1694] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.230870][ T1694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.263499][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.295326][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.308821][ T1694] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.315917][ T1694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.334242][ T1694] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.341310][ T1694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.361643][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.396523][ T3323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.412489][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.446306][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.468036][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.508267][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.595906][ T3316] veth0_vlan: entered promiscuous mode [ 38.622936][ T3320] veth0_vlan: entered promiscuous mode [ 38.629820][ T3316] veth1_vlan: entered promiscuous mode [ 38.654893][ T3320] veth1_vlan: entered promiscuous mode [ 38.661035][ T3323] veth0_vlan: entered promiscuous mode [ 38.685014][ T3315] veth0_vlan: entered promiscuous mode [ 38.690998][ T3323] veth1_vlan: entered promiscuous mode [ 38.705661][ T3320] veth0_macvtap: entered promiscuous mode [ 38.717836][ T3320] veth1_macvtap: entered promiscuous mode [ 38.730529][ T3315] veth1_vlan: entered promiscuous mode [ 38.739061][ T3316] veth0_macvtap: entered promiscuous mode [ 38.749663][ T3316] veth1_macvtap: entered promiscuous mode [ 38.761798][ T3315] veth0_macvtap: entered promiscuous mode [ 38.778901][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.789459][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.799059][ T3315] veth1_macvtap: entered promiscuous mode [ 38.812438][ T3323] veth0_macvtap: entered promiscuous mode [ 38.822577][ T3323] veth1_macvtap: entered promiscuous mode [ 38.831629][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.840842][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.861817][ T265] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.870677][ T3321] veth0_vlan: entered promiscuous mode [ 38.883116][ T265] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.891982][ T265] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.903933][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.914767][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.924267][ T265] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.933178][ T265] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.942045][ T265] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.951827][ T3321] veth1_vlan: entered promiscuous mode [ 38.963595][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.975607][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.979020][ T265] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.001807][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.033403][ T265] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.055564][ T265] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.073616][ T3321] veth0_macvtap: entered promiscuous mode [ 39.080454][ T265] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.101823][ T3321] veth1_macvtap: entered promiscuous mode [ 39.112241][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 39.112254][ T29] audit: type=1400 audit(1761031270.963:96): avc: denied { ioctl } for pid=3483 comm="syz.0.1" path="/dev/virtual_nci" dev="devtmpfs" ino=132 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.121123][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.142847][ T29] audit: type=1400 audit(1761031270.963:97): avc: denied { bind } for pid=3483 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 39.151750][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.168802][ T29] audit: type=1400 audit(1761031270.963:98): avc: denied { listen } for pid=3483 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 39.202186][ T265] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.211004][ T265] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.235900][ T29] audit: type=1400 audit(1761031271.083:99): avc: denied { prog_load } for pid=3483 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.250535][ T265] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.254615][ T29] audit: type=1400 audit(1761031271.083:100): avc: denied { bpf } for pid=3483 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.283589][ T29] audit: type=1400 audit(1761031271.083:101): avc: denied { perfmon } for pid=3483 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.304379][ T29] audit: type=1326 audit(1761031271.083:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3490 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a1e04efc9 code=0x7ffc0000 [ 39.327638][ T29] audit: type=1326 audit(1761031271.083:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3490 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4a1e04efc9 code=0x7ffc0000 [ 39.350753][ T29] audit: type=1400 audit(1761031271.083:104): avc: denied { map_create } for pid=3490 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.369577][ T29] audit: type=1400 audit(1761031271.083:105): avc: denied { map_read map_write } for pid=3490 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.412419][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.421614][ T3496] loop1: detected capacity change from 0 to 1024 [ 39.429308][ T3496] EXT4-fs: Ignoring removed orlov option [ 39.453528][ T3496] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.473280][ T3499] loop2: detected capacity change from 0 to 1024 [ 39.475494][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.488299][ T3499] EXT4-fs: Ignoring removed orlov option [ 39.495341][ T3499] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.530523][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.557022][ T52] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.566725][ T3503] only policy match revision 0 supported [ 39.566736][ T3503] unable to load match [ 39.577826][ T52] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.617947][ T52] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.643262][ T52] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.659265][ T3513] macvlan1: entered promiscuous mode [ 39.666630][ T3513] ipvlan0: entered promiscuous mode [ 39.669961][ C1] hrtimer: interrupt took 48182 ns [ 39.672949][ T3513] ipvlan0: left promiscuous mode [ 39.686343][ T3513] macvlan1: left promiscuous mode [ 39.890195][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.912841][ T3527] loop4: detected capacity change from 0 to 2048 [ 39.925274][ T3528] netlink: 'syz.0.12': attribute type 10 has an invalid length. [ 39.943960][ T3306] loop4: p1 < > p3 [ 39.950607][ T3306] loop4: p3 size 54016 extends beyond EOD, truncated [ 39.956366][ T3528] team0: Port device dummy0 added [ 39.971426][ T3527] loop4: p1 < > p3 [ 39.976502][ T3531] netlink: 'syz.0.12': attribute type 10 has an invalid length. [ 39.988604][ T3527] loop4: p3 size 54016 extends beyond EOD, truncated [ 40.016561][ T3531] team0: Port device dummy0 removed [ 40.030444][ T3531] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 40.070656][ T3528] syz.0.12 (3528) used greatest stack depth: 10656 bytes left [ 40.215019][ T3538] only policy match revision 0 supported [ 40.215035][ T3538] unable to load match [ 40.231135][ T3425] kernel read not supported for file /10/schedstat (pid: 3425 comm: kworker/1:4) [ 40.244763][ T3315] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.260789][ T3541] loop2: detected capacity change from 0 to 1024 [ 40.265966][ T3544] tipc: Started in network mode [ 40.272049][ T3544] tipc: Node identity 66a324d7ca98, cluster identity 4711 [ 40.278496][ T3541] EXT4-fs: Ignoring removed orlov option [ 40.279344][ T3544] tipc: Enabled bearer , priority 0 [ 40.304790][ T3544] syzkaller0: entered promiscuous mode [ 40.310380][ T3544] syzkaller0: entered allmulticast mode [ 40.321499][ T3544] netlink: 12 bytes leftover after parsing attributes in process `syz.4.17'. [ 40.339844][ T3541] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.341074][ T3544] tipc: Resetting bearer [ 40.403543][ T3543] tipc: Resetting bearer [ 40.414034][ T3543] tipc: Disabling bearer [ 40.447751][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.523707][ T3557] loop2: detected capacity change from 0 to 128 [ 40.563441][ T3557] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 40.640741][ T3557] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 40.837494][ T265] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 40.939080][ T3567] only policy match revision 0 supported [ 40.939095][ T3567] unable to load match [ 40.971208][ T3570] only policy match revision 0 supported [ 40.971222][ T3570] unable to load match [ 41.028849][ T3574] loop1: detected capacity change from 0 to 1024 [ 41.059471][ T3574] EXT4-fs: Ignoring removed orlov option [ 41.081960][ T3576] loop2: detected capacity change from 0 to 1024 [ 41.091069][ T3574] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.108248][ T3576] EXT4-fs: Ignoring removed orlov option [ 41.156201][ T3518] infiniband syz!: set active [ 41.161586][ T3518] infiniband syz!: added team_slave_0 [ 41.191655][ T3576] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.266432][ T3518] RDS/IB: syz!: added [ 41.271097][ T3518] smc: adding ib device syz! with port count 1 [ 41.277859][ T3518] smc: ib device syz! port 1 has no pnetid [ 41.377100][ T3584] loop0: detected capacity change from 0 to 1024 [ 41.392508][ T3584] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 41.405652][ T3584] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 41.444230][ T3584] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 41.455172][ T3584] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 41.496469][ T3584] JBD2: no valid journal superblock found [ 41.502291][ T3584] EXT4-fs (loop0): Could not load journal inode [ 41.547922][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.633833][ T3315] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.758333][ T3615] loop2: detected capacity change from 0 to 164 [ 41.789362][ T3615] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 41.815335][ T3621] macvlan1: entered promiscuous mode [ 41.821637][ T3621] ipvlan0: entered promiscuous mode [ 41.833663][ T3621] ipvlan0: left promiscuous mode [ 41.843489][ T3621] macvlan1: left promiscuous mode [ 41.863850][ T3615] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 41.887698][ T3615] Symlink component flag not implemented [ 41.893394][ T3615] Symlink component flag not implemented [ 41.912282][ T3615] Symlink component flag not implemented (7) [ 41.918298][ T3615] Symlink component flag not implemented (116) [ 41.975438][ T3625] loop1: detected capacity change from 0 to 2048 [ 42.032525][ T3625] loop1: p1 < > p3 [ 42.037524][ T3625] loop1: p3 size 54016 extends beyond EOD, truncated [ 42.084435][ T3631] macvlan1: entered promiscuous mode [ 42.139560][ T3631] ipvlan0: entered promiscuous mode [ 42.158939][ T3631] ipvlan0: left promiscuous mode [ 42.185287][ T3631] macvlan1: left promiscuous mode [ 42.444239][ T3649] loop1: detected capacity change from 0 to 1024 [ 42.451408][ T3649] EXT4-fs: Ignoring removed orlov option [ 42.672166][ T3649] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.783173][ T3315] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.994968][ T3673] only policy match revision 0 supported [ 42.994983][ T3673] unable to load match [ 43.327079][ T3687] ================================================================== [ 43.335318][ T3687] BUG: KCSAN: data-race in dequeue_signal / ptrace_check_attach [ 43.342969][ T3687] [ 43.345311][ T3687] read-write to 0xffff88810407c738 of 8 bytes by task 3688 on cpu 0: [ 43.353414][ T3687] dequeue_signal+0x309/0x3b0 [ 43.358121][ T3687] get_signal+0x376/0xf70 [ 43.362476][ T3687] arch_do_signal_or_restart+0x96/0x440 [ 43.368041][ T3687] exit_to_user_mode_loop+0x77/0x110 [ 43.373344][ T3687] do_syscall_64+0x1d6/0x200 [ 43.377948][ T3687] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.383846][ T3687] [ 43.386181][ T3687] read to 0xffff88810407c738 of 8 bytes by task 3687 on cpu 1: [ 43.393729][ T3687] ptrace_check_attach+0xaa/0x290 [ 43.398755][ T3687] __se_sys_ptrace+0xd3/0x2c0 [ 43.403437][ T3687] __x64_sys_ptrace+0x55/0x70 [ 43.408123][ T3687] x64_sys_call+0x2870/0x3000 [ 43.412815][ T3687] do_syscall_64+0xd2/0x200 [ 43.417336][ T3687] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.423236][ T3687] [ 43.425557][ T3687] value changed: 0x0000000000000000 -> 0x0000000008010000 [ 43.432663][ T3687] [ 43.434986][ T3687] Reported by Kernel Concurrency Sanitizer on: [ 43.441165][ T3687] CPU: 1 UID: 0 PID: 3687 Comm: syz.2.59 Not tainted syzkaller #0 PREEMPT(voluntary) [ 43.450715][ T3687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 43.460787][ T3687] ================================================================== [ 43.482553][ T3687] only policy match revision 0 supported [ 43.482565][ T3687] unable to load match [ 43.820049][ T3518] syz.3.9 (3518) used greatest stack depth: 9992 bytes left