last executing test programs: 4.72468572s ago: executing program 0 (id=24): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000ac0)=@newtaction={0x80, 0x30, 0x1, 0x0, 0x0, {}, [{0x6c, 0x1, [@m_ct={0x68, 0x1, 0x0, 0x0, {{0x7}, {0x40, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb, 0x0, 0xffffffffffffffff}}, @TCA_CT_MARK={0x8, 0x10, 0x80000000}, @TCA_CT_LABELS={0x14, 0x7, "0118aae167fe4bb4d318e45cb16cfc7a"}, @TCA_CT_ACTION={0x6, 0x3, 0x3}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000800) 4.6456592s ago: executing program 0 (id=25): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000012000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000001c0)={0xff}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x8, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) 4.622716161s ago: executing program 0 (id=26): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xffffffff}, 0x18) kexec_load(0x4, 0xa, 0x0, 0x0) r3 = creat(0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r0, @ANYRES8=r1, @ANYRES32, @ANYBLOB="628e5432", @ANYRESHEX=r4, @ANYRESHEX=r1, @ANYRES16=0x0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYRES8=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000400)='kfree\x00', r5}, 0x18) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000000)=0x4) ioctl$PPPIOCSACTIVE(r6, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) read(r6, 0x0, 0xff40) write$ppp(r6, &(0x7f0000000200)="bc72", 0x2) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000a80)={'ip6gre0\x00', 0x0, 0x2b, 0x4f, 0xff, 0x4, 0x16, @ipv4={'\x00', '\xff\xff', @multicast1}, @local, 0x10, 0x7, 0x100, 0x9}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_usb_connect(0x0, 0x2a9, &(0x7f00000006c0)={{0x12, 0x1, 0x210, 0x52, 0x7d, 0xab, 0x40, 0x93a, 0x2603, 0x8440, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x297, 0x1, 0xe, 0x5, 0xa0, 0xc, [{{0x9, 0x4, 0x91, 0x1a, 0xd, 0x68, 0xd9, 0xf9, 0xff, [@cdc_ecm={{0x6, 0x24, 0x6, 0x0, 0x0, '$'}, {0x5, 0x24, 0x0, 0x30}, {0xd, 0x24, 0xf, 0x1, 0x100, 0x0, 0xff, 0x9}, [@country_functional={0xc, 0x24, 0x7, 0xa2, 0x9, [0x1, 0x400, 0x9]}, @mbim_extended={0x8, 0x24, 0x1c, 0x9, 0xe, 0x100}]}], [{{0x9, 0x5, 0x4, 0x2, 0x5bf, 0x7, 0xd, 0x10, [@generic={0x1e, 0x8, "eb233d4d92160656d4fdd8f66668a83fcf6d5649761cf9d22a99bbcc"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x7f, 0x7ff}]}}, {{0x9, 0x5, 0xf, 0x10, 0x20, 0xb, 0x4f, 0x0, [@generic={0x22, 0x22, "1b7140692f5bd717630950eca52e9a0a9931de3d6c898a34f2835daebc47b6a2"}, @generic={0x7, 0x9, "c99a845364"}]}}, {{0x9, 0x5, 0x2, 0x2, 0x3ff, 0x7, 0x8, 0x10}}, {{0x9, 0x5, 0xa, 0x10, 0x10, 0xa, 0xaa, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x3, 0x7}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x6, 0x207}]}}, {{0x9, 0x5, 0x8a, 0x10, 0x20, 0xf, 0x0, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x82, 0x6}]}}, {{0x9, 0x5, 0x0, 0x3, 0x400, 0x0, 0x43, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x6, 0x3}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x9d}]}}, {{0x9, 0x5, 0x7, 0xc, 0x200, 0x7f, 0xc, 0xe7, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x7, 0x9}]}}, {{0x9, 0x5, 0xc, 0xc, 0x40, 0x9, 0x6, 0x8}}, {{0x9, 0x5, 0x7, 0x1f5cb390bd622936, 0x400, 0x2, 0x7, 0x7, [@generic={0x6f, 0x7, "e83fffb2f66f89240987dda9cf1d9e2d76fffd15ebf165c2cc0f9ff4c68bdc1195060692877652e589ed2de26b468e38b776a7bb95d35c43794ac228614c4394abe4154617d95ce70d15710aa52eba1fa172cfcef15f2971951830d841169aabf4fb17c0e845e942814d29a0c2"}, @generic={0x6, 0x10, "76a3289e"}]}}, {{0x9, 0x5, 0x3, 0x8, 0x3ff, 0x7, 0x7, 0xe}}, {{0x9, 0x5, 0xe, 0x10, 0x20, 0x7, 0x7, 0xd}}, {{0x9, 0x5, 0x4, 0x3, 0x3ff, 0xa, 0x3a, 0x68, [@generic={0x98, 0x1, "e4887dca70831e83920c7b619fdc685403efa458556c9045486b39ad2c4cab71d5193eb206fa1baa8aab8129bf20ae8e117fa8cc5f1108234cea5731de0fe4f86b6c02a8045e7b0d65e8e6882fe3724473b8763bc03ed61195ba860ca02b436a7fdcedb66d9fdcf98a9d7cebe43deca0cd8b67b1de53bd2a5818cb1357c31aa29e5f805b737207b778b522871b29203f039419033ebc"}]}}, {{0x9, 0x5, 0x80, 0x3, 0x200, 0x5, 0x5, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x81, 0x8}, @generic={0x58, 0x6, "81d8136a86fe088103cb332def5b4d433f5831fe50eff0ab897e607566c65865d1e906977af57fe7a9546fa92086d464236ba7551a2e595d7bd9c641c136b63be9422ea8124f5e1576f3bb87857136d20a6d7b6ab840"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000340)={0xa, 0x6, 0x310, 0xf, 0x7, 0xe, 0xff, 0xe0}, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x2, [{0x7e, &(0x7f0000000b00)=@string={0x7e, 0x3, "fbb14e3a3503e06b4f5f099ff6196144ab6079f7d4a7fbf6ec25e1cfc466c2f3fc9aff2fb89317982e8a1055328db313184e9141113cfabf5e4829252bc4e5db6b26d0c6ecfc9fd7921d179266d28186469ce3605bed92d97c20c9649e00bcf7a131b8c4f795286d74f01c57084d6304a312f3b80687f961212ad7e6"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x42d}}]}) sendmmsg$unix(r9, &(0x7f00000bd000), 0x318, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r9, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000600)={0xa0000013}) close_range(0xffffffffffffffff, r9, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000100004001ea1c003d37ceefc0300000a20000000000a05000000000000000000070000000900010073797a300000000044000000090a010400000000000000000700ffff08000a40000000030900020073797a31000000000900010073797a3000000000"], 0xe8}, 0x1, 0x0, 0x0, 0x20008050}, 0x24040050) close(r3) ioctl$PTP_PIN_GETFUNC2(r3, 0xc0603d0f, &(0x7f0000000000)={'\x00', 0x80000000, 0x3, 0xfffffffd}) fallocate(r0, 0x20, 0x0, 0x8000) 3.398004889s ago: executing program 2 (id=38): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@ifindex, 0xd, 0x0, 0x81, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300), 0x0}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='mm_page_free\x00', r1, 0x0, 0x800000000000002}, 0x18) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0xa}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a3100000000100003800c000080080003400000000214000000110001"], 0xa0}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r3, &(0x7f0000000100)={0x0, 0x20, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a010900000000000000000a0000010900020073797a31000000000900010073797a31"], 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) 3.27580824s ago: executing program 2 (id=40): r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x4, @loopback}], 0x1c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="183c6178dc6e44dfe10000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r2, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x1}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x265}, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYRES8=r0], 0xf0) r3 = socket(0x10, 0x3, 0x0) socket$kcm(0x10, 0x2, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) ioctl$HIDIOCGRDESCSIZE(r5, 0x80044801, &(0x7f0000000100)) write(r3, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x18) recvmmsg(r3, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) 2.879535362s ago: executing program 2 (id=42): syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000540)='./file0\x00', 0x1204018, &(0x7f0000000240)=ANY=[@ANYBLOB="6f76657272696465726f636b7065726d2c6e6f636f6d70726573732c686964652c73657373696f6e3d3078303030303030303030303030303032312c756e686964652c696f636861727365743d63703433372c6f76657272696465726f636b7065726d2c626c6f636b3d3078303030303030303030303030303430302c005fb50aab29cf1d32d24be5ab2a6506aa524c8f1cd5781842ee1c86bee627767fee958f25bb6db8e631262ed8a59d337d730b6698271aeb8c31c1902a7e236e5dd878e6c1352c0c799d8e80d7346f8d2870acebe617c694bbb925d3ab4fb01784c564c03d88c81d2f84f58e8c6ba18548f09fa6"], 0x1, 0x56f, &(0x7f0000000b00)="$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") mbind(&(0x7f00006ca000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000140)=0x2, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000009006000000000000000000000a44000000090a0000000000fa82a3fa211411fa0008000a40000000000900020073797a3100000000090001"], 0x6c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000100000000000000000000fc000a20000000000a03000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000001c08000640ffffff000800034000000028580000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000002c0003802800008008000340"], 0xec}}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5, 0x4, 0x8}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x1}, @IFLA_GENEVE_DF={0x5, 0xd, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x3, 0x1, 0x8000c62) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000000)) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 2.705319863s ago: executing program 1 (id=44): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES8=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000032500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000000f000000bf91000000000000b7020000002000008500000084000000b70000000000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000240), 0xfffffecc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000600)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x18) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000380)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0)="10", 0x1, 0x80, &(0x7f0000000140)={0x11, 0xf7, r5, 0x1, 0x0, 0x6, @local}, 0x14) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, 0x0, 0x40) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)={0x14, 0xd, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r8 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000000c0)=@chain) socket$netlink(0x10, 0x3, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x4c, 0x2, 0x6, 0x701, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) 2.670750513s ago: executing program 2 (id=45): r0 = socket(0xa, 0x3, 0x3a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010029bd7000000000001b0000000c00018008000100", @ANYRES32=r4, @ANYBLOB="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"], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket(0x1e, 0x4, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) mkdir(&(0x7f0000000140)='./control\x00', 0x5) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffa}]}) rmdir(&(0x7f0000000100)='./control\x00') setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x7813, 0x3, 0x2, 0x81, 0x1ff, 0x1, 0x1}, 0x1c) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x2, 0x6, 0x580, 0x0, 0x310, 0x0, 0x0, 0x1d8, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x6, 0x0, {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @remote}, [0x0, 0xff, 0xff000000, 0xff000000], [0x0, 0xffffff00, 0xffffff00, 0xffffffff], 'gretap0\x00', 'batadv_slave_0\x00', {}, {0xff}, 0x2b, 0x5, 0x1, 0x18}, 0x0, 0xd0, 0xf8, 0x0, {0x7a00000010000000}, [@inet=@rpfilter={{0x28}, {0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0xfc, 0x6}}}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0xb4}, @initdev={0xfe, 0x88, '\x00', 0xfd, 0x0}, [0xff], [0xffffff00], '\x00', 'bond_slave_0\x00', {}, {0xff}}, 0x0, 0xf0, 0x138, 0x48000000, {}, [@common=@dst={{0x48}, {0xff, 0x4, 0x0, [0x1, 0x7a, 0xfffd, 0x3f4, 0x0, 0x3, 0x5, 0x0, 0x8, 0x30, 0xe5, 0x4, 0x1, 0x6, 0x0, 0x1], 0x6}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, 'ip6gre0\x00', {0x4}}}}, {{@ipv6={@remote, @dev={0xfe, 0x80, '\x00', 0xd}, [0x0, 0xffff00, 0xffffffff], [0xffffff00, 0xffffff00, 0xffffff00, 0xff000000], 'nr0\x00', 'vxcan1\x00', {}, {}, 0x62, 0x5, 0x3, 0x20}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0xf}}}, {{@ipv6={@mcast1, @private0, [0xff000000, 0xffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffff00, 0xff, 0xff000000], 'pim6reg1\x00', 'hsr0\x00', {}, {}, 0x6c, 0x80, 0x5, 0x61}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) syz_clone(0x21100, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r9, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x18) perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xee00, 0x0) 2.357789615s ago: executing program 4 (id=51): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x8, 0x94, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00'}, 0x18) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x100000000000000) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a3a0000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a310000000054000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d6163767461700000000800014000000005"], 0xf0}}, 0x0) 2.275713825s ago: executing program 4 (id=52): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0xf245a8f55ac9a66f) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000000c0)=@chain) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x4c, 0x2, 0x6, 0x701, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x4c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x5}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x140000}, 0x50) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="1c0000002000090002000000ffdbdf250200000008000800", @ANYRES32=r7], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x1c, 0x7, 0x6, 0x801, 0x0, 0x0, {0x1}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x48040) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000540)={[{@noblock_validity}, {}, {@sysvgroups}, {@errors_remount}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nolazytime}, {@quota}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f0000000c40)="$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") perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r10 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000180)=@secondary) 2.042489627s ago: executing program 2 (id=54): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000003c0)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x80000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$sg(&(0x7f0000000080), 0xffff0000, 0x40) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x60100100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000feffffff000000000000000071104b000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x602600, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r6, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x101, 0xffffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x31}, 0x94) r7 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001480)=ANY=[@ANYBLOB="38000000031401822cb7bd7000fcdb0000000800410073697700140033006c6f0000130000000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x8d0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="18000000041401002dbd7000fedbdf250800010000000000ba30b28e994c1a08d1ca4eb6b8b4889cdd4e786eb807e04eb88b935d785f3d3201c580"], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) 1.980282987s ago: executing program 3 (id=55): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), &(0x7f0000000140), 0x2, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="0000e63aa120"], 0x50) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802"], 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000ac0)=@newtaction={0x80, 0x30, 0x1, 0x0, 0x0, {}, [{0x6c, 0x1, [@m_ct={0x68, 0x1, 0x0, 0x0, {{0x7}, {0x40, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb, 0x0, 0xffffffffffffffff}}, @TCA_CT_MARK={0x8, 0x10, 0x80000000}, @TCA_CT_LABELS={0x14, 0x7, "0118aae167fe4bb4d318e45cb16cfc7a"}, @TCA_CT_ACTION={0x6, 0x3, 0x3}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000800) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r4}, 0x10) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) lseek(r5, 0x80000001, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r6 = mq_open(&(0x7f0000000000)='batadv_slave_1\x00', 0x8c2, 0x34, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) mq_getsetattr(r6, &(0x7f0000000240)={0x0, 0x80, 0x2, 0xfffe}, &(0x7f0000000280)) 1.748890519s ago: executing program 3 (id=56): setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x804) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20048000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000002240)=ANY=[@ANYRES32, @ANYBLOB="1c00"/12, @ANYBLOB="11"], 0x20) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0xa007ca, &(0x7f0000000240)={[{@init_itable_val}, {@journal_dev={'journal_dev', 0x3d, 0xff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x483, &(0x7f0000001040)="$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") sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf250b0000000e0001006e6574646576736e657464657673696d3000000800a40003000000"], 0x3c}}, 0x24000000) 1.56865823s ago: executing program 1 (id=57): r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r0}) socket$nl_xfrm(0x10, 0x3, 0x6) request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0) 1.435928561s ago: executing program 1 (id=58): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a3a0000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a310000000054000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400"], 0xf0}}, 0x0) 1.266861532s ago: executing program 0 (id=59): r0 = socket$inet_sctp(0x2, 0x5, 0x84) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) sendmmsg$inet6(r1, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r5, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400000200000200080001000300000005000200030000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) syz_read_part_table(0x60e, &(0x7f00000007c0)="$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") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0xd3eb, @remote, 0x1}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000840000000200000006000400280100000b008002", @ANYRES32=r13], 0x20, 0x6044}, 0x6) 1.231873632s ago: executing program 1 (id=60): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x10000800) 1.213254422s ago: executing program 4 (id=61): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="700000001000ffff27bd70100000000000000000", @ANYRES32=0x0, @ANYBLOB="31020500a38e05005000128008000100736974004400028008000100", @ANYRES32=0x0, @ANYBLOB="080014000000000006000e008100000008000100", @ANYRES32], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x20040040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$UHID_CREATE(r2, &(0x7f0000002a00)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000000c0)=""/43, 0x2b, 0x0, 0x0, 0x0, 0x0, 0xd4f8}}, 0x120) setreuid(0x0, 0xee00) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) rename(0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x29, 0xe3, 0xd6, 0x6, 0x34, @ipv4={'\x00', '\xff\xff', @local}, @private1, 0x40, 0x1, 0x9, 0x7}}) sendmsg$nl_route_sched_retired(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000002b40)=@delchain={0x1f74, 0x65, 0x800, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x6, 0xffff}, {0xffe0, 0x3}, {0x8, 0xfff2}}, [@f_rsvp={{0x9}, {0x430, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @broadcast}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x1}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x2, 0x9bc61c55615a060d}}, @TCA_RSVP_POLICE={0x414, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x6}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x6, 0x9ea0, 0x9f, 0x1, 0x201, 0xffff, 0x0, 0x8001, 0x5, 0x4, 0xfffffff8, 0x303, 0x7ff, 0x4, 0x5, 0xff, 0x4, 0x8000, 0x8, 0x2, 0x8, 0x8, 0x6, 0x8, 0xe1, 0x3, 0x1ff, 0x59, 0x4, 0x1, 0x9a, 0x1, 0x100, 0x985, 0x98, 0x4, 0x1, 0xe, 0x3, 0x5f5, 0x7, 0xb8a, 0x2, 0x6, 0x1, 0x1, 0x0, 0x5, 0x2400000, 0x6, 0xfffffff8, 0x7fff, 0x800, 0x80000001, 0xf60000, 0x6, 0x594, 0x2, 0x9, 0x2, 0x5e1, 0x4, 0x3, 0xb, 0x6, 0x80, 0x0, 0x9, 0x6, 0x7, 0x1eb73696, 0xc, 0x8646, 0x7, 0x2, 0x9, 0x7, 0x958, 0x6, 0x4, 0x9, 0xdea, 0x1, 0x2, 0x87f, 0xc9c, 0x1ff, 0x6, 0xba, 0xe7, 0xffff, 0x799e5426, 0x55, 0x6, 0x0, 0xd1e, 0x8001, 0x2, 0x2, 0x6, 0x2, 0x5, 0x400, 0x40, 0xfffffff7, 0xffff8b33, 0x79e, 0x9, 0x7, 0x3, 0x4, 0xfffffff8, 0xfffffffc, 0x8, 0x1, 0x1, 0x3, 0x2, 0x9, 0x3ff, 0xfffffffa, 0x7, 0x40, 0x3, 0x4, 0x4, 0xfff, 0x51f4, 0x2e, 0x9, 0x3, 0x7, 0x5, 0x5, 0x16a89525, 0x2c, 0x3, 0x8000, 0x800, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, 0x4, 0x4, 0x0, 0x5, 0xe, 0x2, 0xa3cb, 0x8, 0x9, 0x5ca35c30, 0x8001, 0x2cc, 0x80000000, 0xc, 0x1, 0x0, 0xd, 0x3, 0x9, 0x6, 0x4, 0x7, 0x7, 0x7f, 0xffff, 0x7, 0xb, 0x0, 0x9, 0x8, 0x0, 0x5, 0x9, 0x4, 0x4, 0x7f, 0x40, 0x8, 0xfffffff0, 0xfffffffd, 0x8dd8, 0x0, 0x3, 0x0, 0x7fff, 0x3, 0x1, 0x9, 0x0, 0xfffff801, 0xc33, 0xfffff27d, 0x3, 0x4, 0x6, 0x2, 0x9, 0x9b3d, 0xfffffff8, 0x6, 0xd285, 0xfffffffd, 0x7, 0x408000, 0x9, 0x6, 0x6, 0x5, 0x1000, 0xc, 0x4, 0x8, 0x9, 0x0, 0x8001, 0x3, 0x80000001, 0x100, 0x1, 0x0, 0xffffffff, 0x7, 0xcf, 0x6, 0xffffbeee, 0x200, 0x98, 0x9, 0x1af1, 0xfffffffb, 0x15a, 0x3e, 0xf, 0x4, 0x442e, 0x9, 0x0, 0x9, 0x0, 0x7, 0x6, 0x5, 0x2, 0x8000, 0x3, 0x7, 0x7, 0x7, 0x9, 0x5c3]}]}]}}, @f_rsvp={{0x9}, {0x1b08, 0x2, [@TCA_RSVP_SRC={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_RSVP_POLICE={0x8a8, 0x5, [@TCA_POLICE_TBF={0x3c, 0x1, {0x10, 0x5, 0x0, 0x80000000, 0xfffffbff, {0x1, 0x0, 0xf55a, 0x1, 0x7, 0x7}, {0x0, 0x2, 0x3, 0x9, 0x8, 0x4}, 0x5, 0x7, 0x16}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x3ff}, @TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x3, 0x10000, 0x1, 0x6, 0x9, 0x9, 0x0, 0x1, 0x5, 0x4, 0x3, 0x9, 0x0, 0x5f, 0x5, 0x0, 0x6, 0x20, 0x7, 0x3, 0x4, 0x1982000, 0xff, 0x3ff, 0x10, 0x6, 0x6, 0x2ea, 0x6, 0xc, 0x8, 0x20000, 0x441e, 0x9, 0xffff, 0xfff, 0xffff, 0xe401, 0x2, 0x8ab1, 0x7, 0x8, 0xb5, 0x24d, 0x5, 0x5, 0xfffffa35, 0x6, 0xfffffffc, 0x10001, 0xea2e, 0x9b1, 0x7bef, 0x7, 0x9f0b, 0x3, 0x7fff, 0x6d6, 0x40000, 0x7, 0x2, 0x3, 0x10000000, 0x9, 0x0, 0x3, 0xfffffc01, 0x7, 0x9, 0x5, 0x9, 0x6, 0x1, 0x8001, 0x6, 0x8, 0x1, 0xff, 0x5, 0x9, 0x3, 0x7, 0x3, 0x65fa, 0x5, 0x4, 0xfffffffc, 0xc59c, 0x2, 0x3, 0x4, 0xa9c, 0x5, 0x459f41f6, 0x3ff, 0x3ff, 0x7ff, 0x7, 0xb9e, 0x400, 0x6, 0x100, 0x2, 0x3, 0x7, 0x1ff, 0x10000000, 0x6, 0x0, 0x5, 0xffffffff, 0xc2b8, 0x3, 0x8, 0x5f2, 0x8, 0xacf0, 0x76, 0x2, 0x3, 0x0, 0xb, 0x4, 0x3, 0x2, 0x9, 0x8000, 0x41, 0x400, 0xab6, 0x101, 0x2, 0xaca, 0x4, 0xfffffff9, 0x6, 0x668, 0x0, 0x4efa, 0x688, 0x7fff, 0x7, 0x9, 0x7, 0x2, 0xf, 0xffffff66, 0x80000001, 0xf, 0x1ff, 0xfffffffd, 0xa21, 0x2, 0xe, 0x4, 0x1, 0x3, 0x2, 0x8, 0x8, 0x4, 0xfffffffc, 0x3, 0x6, 0x0, 0xdec, 0xffff, 0x7, 0x9, 0x5, 0x9, 0x7, 0x5, 0x8, 0x5, 0x2, 0x8a, 0x6, 0x7, 0x7, 0x3ff, 0x1, 0x60000000, 0x2, 0x9, 0x2, 0x5, 0x7, 0xffffffff, 0x0, 0x4, 0x6, 0x5, 0x9, 0x3, 0x4, 0x0, 0x0, 0x80, 0xd255, 0x7, 0x0, 0xffffff7f, 0x3, 0xdd78, 0x0, 0xace6, 0x0, 0x6, 0xe, 0x7, 0x429, 0xc6a0, 0x4, 0x3, 0x7, 0x6, 0xf9, 0x80000000, 0x7, 0x7fffffff, 0x6, 0xd5, 0x5b2, 0xbc6, 0x1, 0x3, 0x6, 0x1, 0x7, 0x3, 0x7ff, 0x0, 0x7, 0x7ff, 0xf, 0xae7f, 0x80, 0x8, 0xffff, 0x81d, 0x6, 0xffff, 0x4, 0x4, 0x4e3f, 0x6, 0xff, 0x4386cf03, 0x7, 0xffffffff, 0x800, 0x5, 0x80000001, 0x1]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x10000000, 0x8, 0x9, 0x9, {0x4, 0x2, 0x1ff, 0xa8, 0x200, 0x10001}, {0x7, 0x1, 0xff, 0x7, 0x8, 0x5}, 0x6, 0x3, 0x3}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6a}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x919, 0x10, 0x2, 0x5, 0x6, 0x1, 0x1000, 0xfffff8e3, 0x4, 0x8, 0x5, 0x6, 0x7, 0x9, 0x8, 0x5d5f, 0x80000001, 0x3c, 0x3, 0xffffffff, 0x6, 0xbc7, 0x0, 0x743, 0x400, 0x2877, 0x5, 0x1000, 0x7, 0x3, 0x7, 0x1, 0x8, 0x8, 0x1ff, 0x3, 0x9704, 0x77, 0x4, 0xb, 0x6, 0x28000, 0xfffffff8, 0x401, 0xfffff0de, 0x1, 0x6, 0x3ff, 0xfffffffb, 0x2, 0xf990, 0x3, 0x8, 0x40, 0x35c2, 0x5, 0x7, 0x9, 0x9, 0x3, 0x6, 0x6, 0x7, 0x0, 0x8, 0x2, 0xd4, 0xc3, 0x7cb, 0x8, 0x2, 0x6, 0xffff, 0x101, 0x9, 0x5, 0x6, 0x3, 0xf, 0x0, 0x3ff, 0x2, 0xe, 0x578d, 0x2, 0x3ff, 0x3, 0x0, 0x8, 0x10000, 0x9, 0x7, 0x8, 0xbe, 0xffffffa7, 0x7, 0x4, 0xffffffff, 0x9, 0x5, 0x0, 0x1, 0x9, 0x94, 0x2, 0x7ff, 0x7, 0x37, 0x6, 0x3, 0x5, 0x8, 0x9, 0x8, 0x71, 0x7, 0x8, 0xffffffd3, 0xfffffffc, 0x100, 0xffffffb8, 0xb5, 0x6, 0x485, 0xfffffff9, 0x1, 0x1, 0x0, 0x7, 0x7, 0x0, 0x6fee, 0xbea1, 0x7, 0x80000001, 0x8, 0x7, 0x9338, 0x6, 0xffffffff, 0xb0, 0xf7, 0x38, 0x1, 0x7, 0x5, 0x80000001, 0x3, 0x60, 0xffff, 0x8, 0x0, 0x400, 0x80000000, 0x1000, 0xb30, 0x5, 0x4, 0x5, 0x6, 0x4, 0x10001, 0x1, 0xffff, 0x1d6, 0x5, 0x10001, 0x7fff, 0x8, 0x6, 0xffff, 0xfffffff8, 0x9, 0x800, 0x200, 0x7, 0x1, 0xca, 0x5, 0x7fffffff, 0x2, 0x9, 0x0, 0x67f1, 0x1, 0x5, 0x6c51, 0x4, 0x7f, 0x4, 0x40, 0x5, 0x800, 0x8ea3, 0x100, 0xffffffcf, 0xff, 0x9, 0x5, 0x80, 0x11c1, 0x6, 0x401, 0xe7d, 0x80, 0x5, 0x2, 0x3, 0x0, 0x5, 0x9, 0xffff, 0x6, 0x8, 0x2, 0xb73, 0x4, 0x3, 0x8a4, 0x0, 0xc68b, 0x3, 0x6, 0xf, 0x80000001, 0x8, 0x8, 0xa, 0x5, 0x9, 0x4, 0xffffffff, 0x0, 0x6, 0x4, 0x7, 0x400, 0x1000, 0xffffffff, 0xffff8001, 0x1f3, 0x1000, 0x1, 0x7fff, 0x5, 0x4, 0x7fff, 0x3, 0x1, 0x8, 0x44, 0x9, 0xf, 0x7, 0xfffffffe]}]}, @TCA_RSVP_ACT={0x1254, 0x6, [@m_simple={0xa0, 0xa, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x14, 0x3, 'kmem_cache_free\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0xe53, 0x2, 0xffffffffffffffff, 0xff, 0x2}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x3, 0x2, 0x3b}}]}, {0x2f, 0x6, "ab6d0bd8ba5b639b2e76e738e14ec5d1d277b3e8d11d61ff351f6b8bcee1eb7ce8c53602c725ca936f417b"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_skbmod={0xe4, 0xa, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x6, 0x0, 0x3, 0xfff, 0x2}, 0xb}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x8, 0x8001, 0x5, 0x8, 0x5}, 0x7}}]}, {0x67, 0x6, "aa68878536b218b86de08dc5b64dd486f1b739a36b6fe0a5219d09f0b1f4be7267317f05170f83555c8e3185656c50ded05263d7111348d1633d13bba14155c71b939c035669b028087fc8dec25d6a197289b689b77520c5ba63fece111ac6e67b545a"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_police={0x10cc, 0x16, 0x0, 0x0, {{0xb}, {0x1070, 0x2, 0x0, 0x1, [[@TCA_POLICE_AVRATE={0x8, 0x4, 0x4800}, @TCA_POLICE_TBF={0x3c, 0x1, {0xc0, 0x4, 0x5, 0x0, 0x5, {0x8, 0x2, 0x8, 0x3, 0x5}, {0x7, 0x1, 0xb20c, 0x3, 0x7f}, 0x0, 0x4aa2, 0x8000}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0xa98, 0xf, 0x4, 0x1, 0x1, 0xa1b5, 0x9, 0x8, 0xfffffa44, 0x3, 0x7, 0x1, 0x10000, 0x6, 0x6, 0x7, 0x2, 0xa, 0x59039f51, 0x40, 0xb, 0x6, 0x3, 0x8, 0x0, 0x1, 0x8, 0x8, 0xfffffff7, 0xff, 0x0, 0x9, 0xcc82, 0x6, 0x7f, 0xf5db, 0x2, 0x0, 0x6, 0x5, 0x1, 0x9, 0x80000000, 0x7, 0x7, 0x6, 0x8, 0x7f, 0x2, 0x42, 0x3, 0x7, 0x2, 0x8, 0x4, 0xd576, 0x2, 0x9, 0xe, 0x3, 0x4, 0x6, 0x23ac, 0x4, 0x3, 0x10, 0x8, 0x786, 0x401, 0x3, 0xffffae4d, 0x8, 0xf, 0x0, 0x1, 0x9, 0x7, 0x7fff, 0x68, 0x3, 0x9, 0x3, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x3, 0x6, 0x3, 0x9, 0x200, 0x7, 0x7, 0x4, 0x1, 0x5, 0x3, 0x14, 0x3, 0x3, 0x9, 0x1, 0x3, 0xa, 0x6, 0x6, 0x80, 0x7, 0x7fffffff, 0x7, 0x0, 0xe25b, 0xfffffffc, 0xa6, 0x2, 0xd, 0x3, 0x7ff, 0x4, 0x7, 0xfc, 0xee, 0x800, 0x3, 0x1, 0x80000000, 0x93, 0x10001, 0x85b, 0xfff, 0x4, 0x80000000, 0x1, 0x1, 0xfff, 0x5, 0x801, 0x1, 0xecf, 0x5, 0x7, 0x7f, 0x8, 0x10f9, 0x1, 0x6, 0x3, 0x2, 0xffffffff, 0x1, 0x8a, 0xfffffe01, 0x4, 0x4, 0x0, 0x400, 0x2, 0xf, 0xcdc1, 0x0, 0x5, 0x7, 0xffffffdb, 0x0, 0x65, 0x10001, 0x1000, 0x5, 0x9, 0x0, 0x8, 0x2, 0x6, 0x4, 0x7, 0x2, 0x8, 0x4, 0x3ff, 0x5, 0x81, 0xffff, 0x6, 0x3, 0x6, 0x8, 0x0, 0x7, 0x9, 0x7, 0x7, 0x8, 0x8, 0x3, 0xfffffffa, 0x45d, 0x8e, 0x1, 0x80000000, 0x10, 0x6, 0x26c, 0x1, 0x99, 0x418, 0xcf, 0x9, 0x0, 0x7, 0x5, 0x7, 0x6, 0x6, 0x3, 0x6, 0x7, 0x4, 0xffffffff, 0x6, 0xffffffea, 0x4e, 0x9, 0x0, 0x7fffffff, 0x4, 0x7ff, 0x1000, 0xfe4, 0x8, 0xbd, 0x3, 0x8, 0x0, 0x80000001, 0x5, 0x7ff, 0x0, 0x6, 0xb, 0x6, 0x1, 0x7, 0x401, 0x877, 0x6, 0xd0, 0x3, 0x4, 0x8001, 0x1, 0x1ff, 0x5, 0x8, 0xe4]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x1, 0xd, 0xfffffff5, 0xb, 0xa, 0x2c4452d7, 0x8, 0x8001, 0x400, 0x8, 0x3ac, 0x3f52, 0x5, 0x8, 0x8, 0x1, 0x6, 0x0, 0x3, 0x9, 0x2ac6, 0x1, 0xdfb2, 0x7, 0x7604, 0xfffffff8, 0x2, 0x2bc, 0x20, 0xc4, 0xd2c6, 0x5, 0x8, 0x4, 0x0, 0x2, 0xfffffff9, 0x1, 0x3, 0x9, 0x7f, 0x7fffffff, 0x2028, 0x6, 0x1, 0x1, 0xd4a00, 0x7a, 0xf, 0x9, 0x8, 0x1, 0x7, 0x5, 0xa, 0x557, 0x8, 0xfffffffd, 0x8, 0xb7d, 0xc7fd279, 0x8, 0x8, 0x7ff, 0xb, 0x6, 0x3, 0x6, 0xebdf, 0xff, 0x0, 0x7, 0x5, 0x8, 0x7, 0x13cc, 0x0, 0x8, 0x4, 0x8, 0x3d, 0x75f, 0x6, 0x8, 0x6, 0x3, 0x4, 0x0, 0xff, 0x2, 0x101, 0xb, 0xffffffd4, 0x9, 0x10000, 0x9, 0x1, 0x5, 0x1, 0x8001, 0x3, 0x4, 0xfffffffa, 0x9, 0x0, 0x3ce4, 0x6, 0x3, 0x10001, 0x4, 0x2, 0x67e1, 0x6, 0x636f, 0x401, 0x401, 0x5, 0xc, 0x1, 0xc, 0x302, 0x8, 0x32, 0xe4, 0xbfc, 0x9, 0x4d, 0x8, 0x7fffffff, 0x5, 0x7fff, 0xed, 0xfffffff8, 0x8, 0x7, 0xe68b, 0x7, 0x0, 0x9, 0x0, 0x2, 0xfff, 0x80000001, 0x8, 0x4, 0xc0, 0x9, 0xfffffffb, 0x4, 0x3, 0x1, 0x2, 0xfffffffb, 0x5, 0xfffffffa, 0x2, 0x5, 0xfffffff8, 0xfffffffe, 0x9, 0xe3, 0x6, 0x2, 0x8fdd, 0x9309, 0x9, 0x0, 0x2, 0x9, 0x556fd091, 0x6, 0x0, 0x90, 0x2, 0x0, 0x1, 0x6, 0x5, 0x7ff, 0x8, 0x6, 0x7af, 0xe, 0x4, 0xffffffff, 0x63, 0xffff0001, 0x7fff, 0x5a, 0x40, 0x800, 0x651, 0x401, 0x0, 0x5, 0x10001, 0x8, 0x33, 0x5, 0x1bb4, 0x101, 0x8, 0x6, 0x40000000, 0x3, 0x81, 0x2, 0xdd, 0x4500000, 0x4, 0x4, 0xb, 0x9, 0x4, 0x4, 0x9, 0x100, 0x4, 0x6, 0x4, 0x1, 0x13, 0xfffffffc, 0xff, 0xffffffff, 0x48, 0x4, 0xff, 0x1439, 0x8000, 0x7ff, 0x5, 0x4, 0x3, 0xffffffbb, 0x6b, 0x98, 0x2, 0x9, 0x826c, 0x8000000, 0xf26, 0x7, 0x8, 0x10, 0x6, 0xbf62, 0x8, 0x1, 0x9, 0x0, 0x0, 0x8, 0x7596]}, @TCA_POLICE_RATE64={0xc, 0x8, 0xa}], [@TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x1, 0x3, 0x5, 0x28, 0x8, 0x4, 0x4, 0x8000, 0x0, 0xffff, 0x4, 0x1, 0x5, 0x436, 0x7, 0x1ff, 0x5, 0x2, 0x1ff, 0x0, 0x8, 0x8, 0x3, 0x8, 0x2, 0xa, 0x8, 0x6, 0xb, 0x971, 0x0, 0x5, 0x0, 0x7, 0x5, 0x7, 0xcb, 0x692, 0x7, 0xd, 0x3, 0x5, 0xac83, 0x8e, 0x9, 0xd, 0x60000, 0x4, 0x7fff, 0xba, 0x4, 0xd825, 0x8, 0x5, 0x2, 0x1, 0x9, 0xf, 0x3cab, 0x3, 0x510, 0x1, 0x5, 0x8000, 0x0, 0x9, 0xe967, 0x7f, 0x1, 0x3b95, 0xe5f, 0x5, 0x6b, 0x9, 0x101, 0x4, 0x0, 0x76, 0x80000001, 0x9, 0x7ff, 0x656, 0x2, 0x7, 0x8, 0x5, 0x1ff, 0xd, 0x6, 0x6, 0x80000000, 0x7, 0x60000000, 0x3, 0x0, 0x98, 0x6, 0x1, 0x2, 0x4, 0x4, 0x2, 0x3, 0x3ff, 0x7a14, 0x400, 0x9d14, 0x15, 0x85, 0x10, 0x6, 0x200, 0xb, 0xa9eb, 0x4, 0xb, 0xefb7, 0xff, 0x37a, 0x7ff, 0x4, 0xffffffff, 0x10, 0x7fffffff, 0x9, 0x8, 0xffffffd7, 0x7000000, 0x2, 0x2, 0x7, 0x9, 0x26e, 0x2, 0x40, 0x5, 0x1, 0x2, 0x1ae9, 0x2, 0x3, 0xd, 0x10, 0x5, 0xfffffff9, 0x5, 0x1ff, 0x444, 0x7, 0x5, 0x40, 0x4, 0x6, 0x80, 0x1, 0x7ff, 0xfda2, 0x8, 0x1ff, 0x1, 0x4, 0x9, 0x800, 0x7, 0x4, 0x6, 0xfffffffe, 0x53, 0x7, 0x6, 0x0, 0x2, 0x7233, 0x53, 0xd, 0x4, 0x1, 0x1, 0xe9, 0x1, 0x7, 0x9, 0x8, 0x1, 0xa, 0x5, 0x2, 0x2, 0x8, 0x3, 0x10000, 0x30000000, 0x9, 0x1000, 0x6, 0x5, 0x2, 0xe8e4, 0x80000000, 0xfff, 0x87, 0x7d5, 0x1, 0x7, 0x401, 0x8, 0x3, 0x3, 0xe, 0x8, 0x0, 0x18000000, 0x6, 0x1, 0x9, 0x8, 0x80000001, 0x0, 0x10000, 0xeb, 0x2, 0x602, 0xc6, 0x1f628b8, 0x6, 0x3, 0x5, 0x5, 0x1a, 0x2, 0xd, 0x3, 0x1, 0x8, 0x7, 0x5, 0x5, 0x6, 0x2, 0x0, 0x1, 0x3, 0x8, 0xfffff000, 0xbca, 0x7f, 0x200, 0x1, 0x3, 0x8000, 0x7, 0x0, 0x0, 0x2, 0x24a3]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x2, 0x2, 0xb861, 0x8, 0x2, 0x6, 0xfff, 0x6, 0x3, 0x2, 0x1, 0x10, 0x9, 0x3, 0x2800, 0x7ff, 0x200, 0x7, 0xf, 0x70, 0xf, 0x8001, 0x1, 0xb, 0xc, 0x5, 0x0, 0x2, 0x2ac, 0xb4, 0x7, 0x7, 0x10, 0x80000001, 0x2, 0x0, 0xc, 0xf8, 0x9, 0x7, 0x24, 0x2, 0x3d12, 0x1b9e, 0x10001, 0x0, 0x101, 0x81, 0xb, 0xb, 0x0, 0x3, 0x10001, 0x8b, 0xffffffff, 0x8, 0x80, 0x4, 0x470, 0x8, 0xffffffff, 0x9, 0x7c, 0xdef, 0x3, 0xb, 0x9, 0x9cd, 0x0, 0x4, 0x1, 0x8, 0x4c2, 0x0, 0x8, 0xfffffffe, 0x5, 0x400, 0x88, 0x200000, 0x7, 0x6, 0x1, 0x2, 0x2, 0x9, 0x4, 0x0, 0x5, 0xe, 0x0, 0xbd31, 0x8, 0xfffffff8, 0x10000, 0x8f7, 0x5, 0x100, 0x75, 0x7, 0x1, 0xc4a, 0x6, 0x1, 0x5, 0xde, 0x217, 0x0, 0x7, 0x8000, 0xfffffe00, 0x3ff, 0x1, 0x4, 0x80, 0xa60, 0x2, 0x7fff, 0x4, 0x7, 0x0, 0x3, 0x4, 0x2, 0x1, 0x7fffffff, 0x7f, 0x4, 0x6, 0x1000, 0x6, 0xf77, 0x9, 0x0, 0x8, 0x1, 0xfffffffd, 0xfffffff8, 0x7ff, 0xe573, 0x7, 0x7ff, 0xfffffffc, 0x4, 0x5, 0xe, 0x8da5, 0x9, 0xd, 0x2, 0x7ff, 0x6, 0x8, 0x7f, 0x400, 0x2, 0x10, 0xa, 0x5, 0x1, 0xfffffff9, 0x7, 0xfffffffa, 0x80000000, 0x2, 0x2, 0x3, 0x75d, 0x10001, 0x6bd3ebf3, 0x7, 0x9, 0x6, 0x6c9, 0x4, 0x18402def, 0x4, 0x1, 0x3, 0x6, 0x9e, 0x8000, 0x9, 0x0, 0x43, 0x1, 0x5, 0x7df0, 0x9, 0x3, 0x40, 0xa, 0x7f, 0xdef, 0xe, 0x7, 0x7, 0x8, 0x7, 0x101, 0x9, 0x8e7, 0x0, 0x0, 0x6, 0x1000, 0xcb, 0x7f, 0x0, 0x200, 0xcd9d, 0x1d3, 0x4, 0xfffffff7, 0x6, 0x3, 0x9, 0x8, 0x10000, 0x7fffffff, 0xffffff7f, 0x7, 0x2, 0x7, 0x8001, 0x4, 0x7, 0xfffffff9, 0x7, 0xfffffffc, 0x2, 0x0, 0x9, 0x9, 0x8, 0x7, 0x9, 0x4, 0x2, 0x8, 0xfff, 0x1, 0x4, 0x0, 0x6, 0x4, 0x101, 0x5, 0x0, 0x0, 0x5, 0xfff, 0x9, 0x3827]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x40}]]}, {0x32, 0x6, "5a348ebd45ba0bd8606a878cd0ad97856c888080f7ac3a4a130eedecc2aaa51c946f6c87e1e4ce141a430ed4d91d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}]}]}}]}, 0x1f74}, 0x1, 0x0, 0x0, 0x80}, 0x20044010) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x40040000) r6 = syz_pidfd_open(r3, 0x0) process_madvise(r6, 0x0, 0x0, 0x14, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r7, 0x1276, 0x0) 1.037402474s ago: executing program 1 (id=62): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000340)=ANY=[@ANYRES32=r2], 0xdc}, 0x1, 0x0, 0x0, 0x40850}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000027c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x0, 0x200080d1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000000)=0x13) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000040)=0x5) ioctl$TCSETSW2(r6, 0x402c542c, &(0x7f0000000200)={0xffbfff40, 0x4000403, 0x8, 0x63ba, 0x9, "ffffff7f87680000000000001000007fcb3678", 0x0, 0x40403}) r7 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000640)='ext4_es_lookup_extent_enter\x00', r9, 0x0, 0x80}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/diskstats\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x841001, &(0x7f0000000200), 0x1, 0x4bc, &(0x7f0000000a40)="$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") fchdir(r8) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x88) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000140)=0xa) bind$unix(r5, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e) recvmmsg(r4, &(0x7f0000000d40), 0x40000000000038f, 0x10020, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 1.023070464s ago: executing program 2 (id=63): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x12, r2, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x80, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0xf) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000100003052cbd", @ANYRES32=0x0, @ANYBLOB="0000000000080400240012800b0001006d61637365630000140002800500060000000000050007000000000008000500", @ANYRES32=r6], 0x4c}}, 0x0) ioctl$TCFLSH(r4, 0x400455c8, 0x0) syz_usb_connect(0x2, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000140)=0x1b) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r9}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r8}, &(0x7f0000000000), &(0x7f00000005c0)=r9}, 0x20) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003800)=@newtaction={0x10fc, 0x30, 0x12f, 0x0, 0x0, {}, [{0x10e8, 0x1, [@m_police={0x10e4, 0x1, 0x0, 0x0, {{0xb}, {0x10b8, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x8001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xb, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff35, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x1]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x6, 0xffffffff, 0x7f, 0x401, 0x2, 0x0, 0x2, 0x80000000, 0x4, 0x5, 0x8, 0x0, 0x7fff, 0x75ba, 0x7fffffff, 0x5, 0xffffffff, 0x7ff, 0x2, 0x9, 0x2, 0x0, 0x1000, 0x1, 0x3, 0x6, 0x0, 0xfa, 0x4, 0x0, 0xf, 0x80000001, 0x7, 0xfffffffb, 0x1, 0x20, 0x5, 0xb, 0x1, 0x2f2, 0x7fff, 0x0, 0x81, 0x206, 0x1ff, 0x7, 0x3, 0x5, 0x3, 0x9, 0x1000, 0x401, 0x1, 0x6, 0x7, 0x2, 0x4, 0x7f, 0x5, 0xfffffffb, 0x1, 0x4, 0x5, 0x8, 0x2000009, 0x9, 0x10, 0x9, 0x7, 0xffffff00, 0x97, 0x0, 0x4, 0x8, 0x8, 0x1, 0x958, 0x1fe, 0x4, 0x6, 0x7, 0x80, 0x5, 0xe53, 0x0, 0xfffffffe, 0x4, 0x8, 0x9, 0x7fff, 0x30, 0x8, 0xfffffff7, 0x4, 0x9, 0x1, 0x4, 0x7, 0x9, 0x5, 0x7, 0x6, 0x0, 0x5, 0x2, 0x7, 0x3, 0xcdd, 0x2, 0xd67, 0x7, 0x4, 0x25, 0x9dc5, 0x7, 0xfffffff7, 0x2, 0x400, 0x8, 0x0, 0x7, 0x5, 0x9, 0xa, 0xa, 0x9, 0x5, 0xdb5, 0x101, 0x4, 0x74e4, 0x7fff, 0x7, 0x7ff, 0x1, 0xd70, 0x1, 0x8, 0xa, 0x7, 0x1, 0x82, 0x52e, 0x7, 0x1, 0x5, 0x26, 0x1, 0x1b2a, 0x81, 0x9, 0x1c, 0x767, 0x7, 0x9, 0x10, 0xc2a, 0xff, 0x7, 0x6, 0x7, 0x3, 0xfffffff4, 0x8, 0x3, 0xfff, 0x8, 0x2, 0x5, 0x6, 0x3, 0xd7c3, 0x2, 0x10000, 0x7fff, 0x5, 0x5, 0x0, 0xfffffff7, 0x4, 0x2, 0x0, 0x6ee1847d, 0x10001, 0x7ff, 0x1, 0xf0, 0x7, 0x2, 0x7, 0x4, 0x6, 0x4, 0x7, 0x2, 0x0, 0x1, 0x4, 0x3, 0xfff, 0x80000001, 0x7, 0x676, 0x3, 0x9, 0x2, 0x4, 0x7fff, 0x4a5, 0x23, 0x4, 0x9, 0x8, 0x0, 0x8000, 0xa, 0x9, 0xca000000, 0x2, 0xfffffffa, 0x3, 0x7, 0x9, 0x7, 0x65fe, 0x9, 0x6, 0x4, 0x80000000, 0x5, 0x801, 0xb848, 0x6, 0x6, 0x800, 0x7, 0x1, 0xb, 0x80, 0x2, 0x3, 0x7e54, 0x9, 0x4, 0x4, 0xc, 0x80000001, 0x5, 0x5, 0x10000002, 0xb, 0x7, 0x5, 0x2, 0x4]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x1, 0x7, 0x4, 0x1, {0x7, 0x0, 0x3, 0x7, 0x7, 0x80000001}, {0x4, 0x2, 0x2, 0xa, 0x1ff, 0x1c0000}, 0x9, 0xbc, 0xdf72c67}}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x100000001}, @TCA_POLICE_RATE={0x404, 0x2, [0x6, 0x1, 0x1, 0x8, 0xe84, 0x7fff, 0x6, 0x4, 0x0, 0x4c, 0xac9, 0x7fff, 0x8, 0x2, 0x7fffffff, 0x9, 0x6, 0x6, 0x7fff, 0xfffffe00, 0xad, 0x92c, 0x6, 0x9c6, 0x401, 0x85c, 0x4, 0x772, 0x7f1e, 0x5, 0x10000, 0x8, 0x0, 0x5, 0x3, 0x8, 0x9, 0x7, 0x2, 0x7f, 0x1000, 0x7, 0x81, 0x7fff, 0x4, 0x81, 0x2, 0x7, 0x79, 0x3, 0x1, 0x2, 0xf8f1, 0x62, 0x6, 0x64e, 0x6, 0x9, 0x9, 0x7, 0x40, 0x6, 0xfffffffb, 0xd5, 0xf8, 0x0, 0x8, 0x3, 0x7, 0x100, 0x9, 0x7, 0x0, 0x2, 0x9, 0xb79, 0x6, 0x6, 0x7, 0x8, 0xffffffff, 0x7, 0xffff, 0xe, 0xfffffffe, 0x3, 0x7, 0x8, 0xfff, 0x3, 0x1, 0xffffffff, 0x3, 0x7f, 0x7, 0x4, 0x7f, 0x8, 0x9, 0x8, 0x4, 0x4, 0x5, 0x9, 0x0, 0x32e, 0xde41, 0x0, 0x100, 0x5, 0xef835bd0, 0x7, 0x3, 0x61b, 0x9, 0x4, 0xa, 0xe9, 0x2, 0x8, 0x7, 0x9, 0x9, 0x1000, 0x5, 0x2, 0x9, 0x4, 0x7, 0xc, 0xffffffff, 0x5, 0x4, 0x4, 0x8, 0x6, 0x0, 0x6, 0x7, 0x6e12, 0x1, 0x1, 0x9, 0x7, 0x3d, 0x200, 0xffffffff, 0x0, 0x7, 0x5, 0x9, 0x1, 0x2, 0x7, 0x9, 0xfffffffd, 0x9d, 0x10001, 0x9, 0xe, 0x1, 0x1b, 0xa0, 0x7fff, 0x0, 0x3, 0x1ff, 0x4, 0x100, 0x80000000, 0x3, 0x440, 0x7, 0x2, 0x39dd, 0x1, 0x9, 0xf92b, 0x3ff, 0x6ec52f90, 0x8, 0x1, 0x0, 0x7f, 0x69f, 0x3, 0x6, 0x1, 0x6, 0x1, 0xf6, 0x7, 0x5, 0xff, 0x9ad0, 0x0, 0x7d, 0x4, 0x552, 0x2, 0x7, 0xff, 0x9, 0x5, 0x40, 0x3, 0x1, 0x9, 0xffff, 0x2, 0x8000, 0x3, 0x5, 0x7, 0x7, 0x3, 0x0, 0x7, 0x81, 0x800, 0x9, 0x2, 0x3, 0xd, 0x80000001, 0x3e, 0x9, 0x7fffffff, 0x5, 0x98bb, 0xfffffffc, 0x6, 0xfffffffc, 0x1, 0x5, 0x400, 0xfffffff7, 0x3, 0x7fff, 0x8, 0x5, 0x5, 0x800, 0x8, 0xfffffffc, 0x5, 0xff, 0xba7f, 0x6, 0x5, 0x1, 0x3, 0x5, 0x7, 0xfd2, 0x6]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xffffffffffff22ff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x94}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x20000000, 0xd, 0x1, 0x2, {0xa8, 0x1, 0xd12, 0x7ff, 0x2, 0x697e}, {0x4, 0x1, 0x66b, 0x9d22, 0x1460, 0x7df4}, 0x5, 0x2, 0x6}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x10001, 0x7, 0xf690, 0x2, 0x4, 0xfffffffc, 0x0, 0x8000, 0x0, 0x1, 0x7, 0x200, 0x4, 0xc, 0xd, 0x9, 0x400, 0x2, 0x3, 0x80000000, 0xc8, 0x7, 0x6df9, 0xfd, 0x9, 0x8, 0x9, 0x3, 0x101, 0xff, 0x7, 0xffff, 0x91e, 0x8, 0xc, 0x2, 0x91e, 0x6, 0x2, 0x401, 0x1, 0x7e2613e9, 0x1000, 0x605402fb, 0x7e, 0x263, 0xffffffff, 0x9, 0x2, 0x10001, 0x6, 0x80000000, 0x62, 0x0, 0x5, 0xd, 0xe7, 0x10, 0x8, 0x7fff, 0x4, 0x55, 0x1, 0xc0, 0x2, 0x5, 0xcf05, 0x9, 0x4, 0x9, 0xffffffff, 0x80000001, 0x1ff, 0x8, 0x6, 0x3, 0x2, 0x81, 0x5, 0x22, 0x8, 0x5, 0x6, 0x3, 0x7, 0x60156675, 0xf, 0x1000, 0x7, 0xfffffff8, 0xb, 0x0, 0x5b45, 0x101, 0x6, 0x6, 0x1, 0x3, 0x0, 0x2, 0x1000, 0xffffffff, 0x6, 0x4, 0x10000, 0x4, 0x336, 0x3, 0x9, 0xc, 0x5, 0x0, 0x6, 0x3, 0x1, 0x7, 0x8, 0xfffffffc, 0x8, 0x7fffffff, 0x7, 0x3, 0xfffffff7, 0x6745338b, 0xe26, 0x4, 0x400, 0xa, 0x1, 0xd82, 0x6, 0x180, 0x5, 0x5, 0xda0, 0x7, 0x1, 0x2, 0xce, 0x5, 0x2, 0x27, 0x4, 0x3, 0xff, 0x8, 0xfffffeff, 0x2, 0xff, 0x1, 0x8e2, 0x2, 0x9, 0x95c9, 0x0, 0x1, 0x583c, 0x1, 0x3, 0x9, 0xc, 0x1ff, 0x60000, 0x80, 0xa, 0x8, 0x8, 0x9, 0x1, 0x6, 0xaea, 0xe493, 0x3, 0x7, 0x0, 0x0, 0x498, 0xffff8001, 0x2, 0x1000, 0x8, 0xea, 0x800, 0xbb, 0x6ed901c9, 0x700, 0x8000, 0x81, 0x0, 0xc, 0x7, 0x8, 0x857, 0x7f, 0x1, 0x0, 0x6, 0x6, 0x1, 0x1, 0x3, 0x2, 0x5, 0x81, 0x3, 0x6, 0x4, 0x1, 0x0, 0x9, 0x1000, 0x4, 0x101, 0x1, 0x1, 0x9, 0x4, 0x9, 0x0, 0x0, 0x4, 0xbe359504, 0x81, 0x400, 0x2, 0x3a, 0x3ff, 0x9, 0xa0, 0x9, 0x3, 0x1000000, 0x81, 0x5, 0x5, 0x707f, 0xfffffffa, 0x5, 0x3, 0x9, 0xe, 0x2, 0xfffffff9, 0x4, 0x8, 0x1, 0xfffffff7, 0x16f, 0xff, 0xed9, 0x6, 0x3, 0x0, 0x9, 0x1, 0x8001]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x10fc}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r3, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r11, 0x0, 0xffffffffffffffff}, 0xffffffe5) keyctl$search(0xa, 0x0, &(0x7f0000000400)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0) 919.636724ms ago: executing program 3 (id=64): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='ext4_mballoc_alloc\x00', r0}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000286dd600a843500140601fe80000000000000000000000000bbfe80000000000e0000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a08000009078000013128e9bd1bcfa9a44cc18c7c11b454d80600000"], 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0xc2f00, 0x4d, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f0000000280)={[], [{@smackfshat={'smackfshat', 0x3d, '(-&'}}]}, 0x3, 0x4e2, &(0x7f0000001c80)="$eJzs3d9rXFkdAPDvnSRt0qYmVR9q0Vq0khbtTNLYNvhQI4g+Faz1PcZkEkImmZCZtE0okuIfIIi/0CeffBF8FkH6J6hQ0HcRUYrbdh92YXdnmcmdbZudSSbb+dEmnw+c3HPuvZPv98wwZ+bcudwbwJF1PiKmI6IvIi5FxEi6PpOW2N4p1f2ePrk/Vy1JVCq3/59Ekq6r/68kXZ5MHzYYEd//bsSPko/HLW1uLc8WCvn1tJ0rr6zlSptbl5dWZhfzi/nV6cmJa1PXp65Ojbetrze+/Z9f/vT337nxl6/d/dfM/y7+uJrWcByrbXuxH63YbnG/na4P1J6Luv6IWD9IsNdYX9qfgV4nAgBAS6rf8T8dEV+KiGe/6XU2AAAAQCdUvjkc7yURFQAAAODQytTOgU0y2fRcgOHIZLLZnXN4PxsnMoViqfzVheLG6nx1W8RoDGQWlgr58fRc4dEYSKrtiVr9efvKrvZkRJyOiJ+PDNXa2bliYb7XBz8AAADgiDi5a/7/9sjO/B8AAAA4ZEZ7nQAAAADQceb/AAAAcPg1nf8n/d1NBAAAAOiE7928WS2V+v2v5+9sbiwX71yez5eWsysbc9m54vpadrFYXKxds29lv/9XKBbXvh6rG/dy5XypnCttbs2sFDdWyzO1+3rP5N0nGgAAALrv9Bcf/jOJiO1vDNVK1bF0Wwtz9enOZgd0UuZguyedygPovr5eJwD0zD4n+P7t891KBOg6v8cD+0zsf7GrfcDDBgAAwOtg7HOv9Pu/3wPhDWYiD0dX357NJk51Jhegu1zgC46upnN8EwM4Go7vv8tgsw1/bXMuAABAxwzXSpLJplP+4chkstmdQ/yjMZAsLBXy4xHxqYj4x8jA8Wp7otdJAwAAAAAAAAAAAAAAAAAAAAAAAMAbplJJogIAAAAcahGZ/ybpjfzHRi4M7z4+cCx5Z6S2jIi7v739q3uz5fL6RHX9Wx+tL/86XX+lF0cwAAAAgN3q8/T6PB4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2unpk/tz9dLNuI+/FRGjjeL3x2BtOfinkYg48SyJ/hcel0REXxvibz+IiDON4ifVtGI0zWJ3/ExEDLUj/uAnj3+yDfHhKHtYHX+mG73/MnG+tmz8/utPy6t6fL7Z+Jepj3+1ca7R+HeqxRhnH/0x1zT+g4iz/Y3Hn3r85BXH3x/+YGur2bbK7yLGGn7+JC/FypVX1nKlza3LSyuzi/nF/Ork5MS1qetTV6fGcwtLhXz6t2GMn33hzx/s1f8TTeKP7tP/Cy32//1H9558Zo/4F7+8O/67tdf/zB7xq8/9V9LPger2sXp9e6f+onN/+Pu5vfo/36T/+73+F1vs/6VbP/l3i7sCAF1Q2txani0U8usqb2RlwCvY5spQvBZptKtyK32jH/jhPR6YAACAtnv+pb/XmQAAAAAAAAAAAAAAAAAAAMDR1fGLkB1/+coCg73rKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAnj4MAAD//1Q90vA=") r2 = msgget$private(0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000400)={0x3, &(0x7f0000000340)=[{0x26, 0x0, 0x56, 0x8}, {0x1, 0x4, 0x4, 0x1}, {0x192, 0x1, 0xf, 0xff}]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) shutdown(r4, 0x1) splice(r4, 0x0, r3, 0x0, 0x2, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffde}, 0x94) msgsnd(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC], 0x2000, 0x0) io_uring_setup(0x4536, &(0x7f0000000040)={0x0, 0x81fc, 0xc0a0, 0x3, 0x48}) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000540)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x1b8, 0x7}, 0x0, 0x0, 0x6, 0x2, 0xffffffff, 0xd5, 0x6, 0x2, 0xfffe, 0x9}) 769.725785ms ago: executing program 4 (id=65): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x8, 0x94, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r1}, 0x18) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x100000000000000) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a3a0000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a310000000054000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d6163767461700000000800014000000005"], 0xf0}}, 0x0) 640.931206ms ago: executing program 4 (id=66): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a3a0000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a310000000054000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d61637674"], 0xf0}}, 0x0) 545.010297ms ago: executing program 4 (id=67): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES8=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000032500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000000f000000bf91000000000000b7020000002000008500000084000000b70000000000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000240), 0xfffffecc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000600)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x18) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000380)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r4, &(0x7f00000003c0)="10", 0x1, 0x80, &(0x7f0000000140)={0x11, 0xf7, r5, 0x1, 0x0, 0x6, @local}, 0x14) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, 0x0, 0x40) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)={0x14, 0xd, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r8 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000000c0)=@chain) socket$netlink(0x10, 0x3, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x4c, 0x2, 0x6, 0x701, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) 489.897686ms ago: executing program 3 (id=68): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[], 0x48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='mm_page_free\x00', r1, 0x0, 0x800000000000002}, 0x18) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0xa}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a3100000000100003800c000080080003400000000214000000110001"], 0xa0}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r3, &(0x7f0000000100)={0x0, 0x20, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a010900000000000000000a0000010900020073797a31000000000900010073797a31"], 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) 365.754358ms ago: executing program 3 (id=69): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000580)={0x0, 0x7, [0xfffffffffffffffe, 0x1, 0x3, 0x3, 0x1, 0x2]}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000007000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x9}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000050000000000000000000071101b000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) shmdt(0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_gettime(r5, &(0x7f0000000540)) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'gretap0\x00', 0x0}) sendto$packet(r6, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x88a8, r7}, 0x14) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r8, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, r9, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x44080}, 0x4000001) 286.535948ms ago: executing program 1 (id=70): r0 = socket$inet_sctp(0x2, 0x5, 0x84) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) sendmmsg$inet6(r1, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r5, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400000200000200080001000300000005000200030000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) syz_read_part_table(0x60e, &(0x7f00000007c0)="$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") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0xd3eb, @remote, 0x1}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000840000000200000006000400280100000b008002", @ANYRES32=r13], 0x20, 0x6044}, 0x6) 128.977069ms ago: executing program 0 (id=71): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x28, 0x209, 0x0, 0x2000, {0x2}}, 0x14}}, 0x0) 81.35033ms ago: executing program 3 (id=72): r0 = socket$inet_sctp(0x2, 0x5, 0x84) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) sendmmsg$inet6(r1, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r5, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400000200000200080001000300000005000200030000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) syz_read_part_table(0x60e, &(0x7f00000007c0)="$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") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0xd3eb, @remote, 0x1}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000840000000200000006000400280100000b008002", @ANYRES32=r13], 0x20, 0x6044}, 0x6) 0s ago: executing program 0 (id=73): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) r2 = socket(0x10, 0x80003, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r3, 0x6, &(0x7f0000000000)={0x1, 0x0, 0x8000000008, 0x7}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) pread64(r4, &(0x7f0000001440)=""/126, 0x7e, 0x41) close_range(r2, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) openat$sysfs(0xffffff9c, 0x0, 0x0, 0x0) r5 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.221' (ED25519) to the list of known hosts. [ 32.756276][ T29] audit: type=1400 audit(1762712753.291:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 32.779305][ T29] audit: type=1400 audit(1762712753.311:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.780316][ T3302] cgroup: Unknown subsys name 'net' [ 32.807137][ T29] audit: type=1400 audit(1762712753.341:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.956592][ T3302] cgroup: Unknown subsys name 'cpuset' [ 32.963051][ T3302] cgroup: Unknown subsys name 'rlimit' [ 33.065031][ T29] audit: type=1400 audit(1762712753.591:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.088481][ T29] audit: type=1400 audit(1762712753.601:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.109023][ T29] audit: type=1400 audit(1762712753.601:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.129448][ T29] audit: type=1400 audit(1762712753.601:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.149835][ T29] audit: type=1400 audit(1762712753.611:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.159019][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.174642][ T29] audit: type=1400 audit(1762712753.611:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.206552][ T29] audit: type=1400 audit(1762712753.721:71): avc: denied { relabelto } for pid=3306 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.234248][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.302619][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 35.321545][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 35.389554][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.396682][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.403921][ T3312] bridge_slave_0: entered allmulticast mode [ 35.410465][ T3312] bridge_slave_0: entered promiscuous mode [ 35.435462][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.442615][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.449930][ T3312] bridge_slave_1: entered allmulticast mode [ 35.456451][ T3312] bridge_slave_1: entered promiscuous mode [ 35.501797][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.518500][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 35.530229][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.546221][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 35.562574][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 35.582732][ T3312] team0: Port device team_slave_0 added [ 35.588574][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.595743][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.602880][ T3314] bridge_slave_0: entered allmulticast mode [ 35.609247][ T3314] bridge_slave_0: entered promiscuous mode [ 35.632604][ T3312] team0: Port device team_slave_1 added [ 35.643783][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.650867][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.658082][ T3314] bridge_slave_1: entered allmulticast mode [ 35.664484][ T3314] bridge_slave_1: entered promiscuous mode [ 35.701893][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.714793][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.727369][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.734343][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.760332][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.783557][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.790582][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.816782][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.864167][ T3314] team0: Port device team_slave_0 added [ 35.884895][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.892092][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.899281][ T3324] bridge_slave_0: entered allmulticast mode [ 35.905542][ T3324] bridge_slave_0: entered promiscuous mode [ 35.912825][ T3314] team0: Port device team_slave_1 added [ 35.918596][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.925755][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.932949][ T3322] bridge_slave_0: entered allmulticast mode [ 35.939535][ T3322] bridge_slave_0: entered promiscuous mode [ 35.948023][ T3312] hsr_slave_0: entered promiscuous mode [ 35.954075][ T3312] hsr_slave_1: entered promiscuous mode [ 35.960336][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.967453][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.974558][ T3320] bridge_slave_0: entered allmulticast mode [ 35.981178][ T3320] bridge_slave_0: entered promiscuous mode [ 35.987724][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.994911][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.002278][ T3324] bridge_slave_1: entered allmulticast mode [ 36.008709][ T3324] bridge_slave_1: entered promiscuous mode [ 36.019879][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.026970][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.034101][ T3322] bridge_slave_1: entered allmulticast mode [ 36.040676][ T3322] bridge_slave_1: entered promiscuous mode [ 36.057995][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.065076][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.072451][ T3320] bridge_slave_1: entered allmulticast mode [ 36.079029][ T3320] bridge_slave_1: entered promiscuous mode [ 36.095705][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.102716][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.128628][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.139901][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.146934][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.172941][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.184849][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.211938][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.234786][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.265188][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.275331][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.291355][ T3314] hsr_slave_0: entered promiscuous mode [ 36.297322][ T3314] hsr_slave_1: entered promiscuous mode [ 36.303193][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 36.308962][ T3314] Cannot create hsr debugfs directory [ 36.318565][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.346772][ T3322] team0: Port device team_slave_0 added [ 36.355566][ T3322] team0: Port device team_slave_1 added [ 36.372643][ T3324] team0: Port device team_slave_0 added [ 36.381316][ T3324] team0: Port device team_slave_1 added [ 36.401026][ T3320] team0: Port device team_slave_0 added [ 36.409437][ T3320] team0: Port device team_slave_1 added [ 36.440122][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.447138][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.473118][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.499621][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.506632][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.532615][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.543549][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.550532][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.576530][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.591916][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.599032][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.624989][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.638745][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.645751][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.671711][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.682735][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.689861][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.715863][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.762889][ T3322] hsr_slave_0: entered promiscuous mode [ 36.768956][ T3322] hsr_slave_1: entered promiscuous mode [ 36.774824][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 36.780580][ T3322] Cannot create hsr debugfs directory [ 36.803589][ T3324] hsr_slave_0: entered promiscuous mode [ 36.809724][ T3324] hsr_slave_1: entered promiscuous mode [ 36.815867][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 36.821613][ T3324] Cannot create hsr debugfs directory [ 36.856525][ T3320] hsr_slave_0: entered promiscuous mode [ 36.862640][ T3320] hsr_slave_1: entered promiscuous mode [ 36.868628][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 36.874359][ T3320] Cannot create hsr debugfs directory [ 36.950587][ T3312] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.974518][ T3312] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.985309][ T3312] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.013103][ T3312] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.047644][ T3314] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.058403][ T3314] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.068160][ T3314] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.077089][ T3314] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.120540][ T3324] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.129410][ T3324] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.139196][ T3324] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.156739][ T3324] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.189279][ T3322] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.198268][ T3322] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.216172][ T3322] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.228311][ T3322] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.242379][ T3320] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.253504][ T3320] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.262944][ T3320] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.273755][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.285223][ T3320] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.312432][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.324424][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.344137][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.351302][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.360039][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.367192][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.395836][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.416643][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.423734][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.450045][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.457200][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.473236][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.512435][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.529079][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.547712][ T2941] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.554812][ T2941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.564912][ T2941] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.572043][ T2941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.584016][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.599340][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.619016][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.631955][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.645493][ T3324] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.655948][ T3324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.670153][ T2941] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.677385][ T2941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.692365][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.700974][ T2941] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.708145][ T2941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.722327][ T2941] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.729451][ T2941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.769538][ T2941] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.776646][ T2941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.848641][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.859092][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.884012][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.900474][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.923692][ T3312] veth0_vlan: entered promiscuous mode [ 37.936753][ T3312] veth1_vlan: entered promiscuous mode [ 37.976738][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.009312][ T3312] veth0_macvtap: entered promiscuous mode [ 38.023323][ T3312] veth1_macvtap: entered promiscuous mode [ 38.053665][ T3314] veth0_vlan: entered promiscuous mode [ 38.069816][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.081616][ T3314] veth1_vlan: entered promiscuous mode [ 38.106813][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.122641][ T3322] veth0_vlan: entered promiscuous mode [ 38.138212][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.148267][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.160517][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.171815][ T3324] veth0_vlan: entered promiscuous mode [ 38.179040][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.199180][ T3324] veth1_vlan: entered promiscuous mode [ 38.209222][ T3322] veth1_vlan: entered promiscuous mode [ 38.214820][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 38.214831][ T29] audit: type=1400 audit(1762712758.741:81): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.wJflBY/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.225013][ T3322] veth0_macvtap: entered promiscuous mode [ 38.245271][ T29] audit: type=1400 audit(1762712758.741:82): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.264248][ T3322] veth1_macvtap: entered promiscuous mode [ 38.272833][ T29] audit: type=1400 audit(1762712758.741:83): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.wJflBY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.288223][ T3324] veth0_macvtap: entered promiscuous mode [ 38.303696][ T29] audit: type=1400 audit(1762712758.741:84): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.317467][ T3314] veth0_macvtap: entered promiscuous mode [ 38.331228][ T29] audit: type=1400 audit(1762712758.741:85): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.wJflBY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 38.339976][ T3320] veth0_vlan: entered promiscuous mode [ 38.363453][ T29] audit: type=1400 audit(1762712758.741:86): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.wJflBY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 38.380700][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.396232][ T29] audit: type=1400 audit(1762712758.741:87): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.425038][ T29] audit: type=1400 audit(1762712758.961:88): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 38.426632][ T3324] veth1_macvtap: entered promiscuous mode [ 38.447876][ T29] audit: type=1400 audit(1762712758.961:89): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="gadgetfs" ino=4391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 38.472469][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.486354][ T3320] veth1_vlan: entered promiscuous mode [ 38.487270][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.505471][ T3320] veth0_macvtap: entered promiscuous mode [ 38.514504][ T3314] veth1_macvtap: entered promiscuous mode [ 38.522672][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.533420][ T3320] veth1_macvtap: entered promiscuous mode [ 38.541867][ T29] audit: type=1400 audit(1762712759.071:90): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 38.548798][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.576434][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.596640][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.612075][ T2941] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.625919][ T2941] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.646290][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.658982][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.676788][ T2941] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.686002][ T2941] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.694856][ T2941] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.729626][ T3491] loop0: detected capacity change from 0 to 128 [ 38.762876][ T2941] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.803517][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.852106][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.863787][ T3501] Zero length message leads to an empty skb [ 38.901709][ T52] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.945006][ T52] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.011661][ T3509] netlink: 16 bytes leftover after parsing attributes in process `syz.0.9'. [ 39.092345][ T3509] netlink: 'syz.0.9': attribute type 3 has an invalid length. [ 39.528778][ T52] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.537745][ T52] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.555103][ T52] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.645441][ T3526] loop4: detected capacity change from 0 to 1024 [ 39.655800][ T52] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.664542][ T52] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.688391][ T52] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.697654][ T3528] lo speed is unknown, defaulting to 1000 [ 39.716049][ T3528] lo speed is unknown, defaulting to 1000 [ 39.722130][ T3526] ======================================================= [ 39.722130][ T3526] WARNING: The mand mount option has been deprecated and [ 39.722130][ T3526] and is ignored by this kernel. Remove the mand [ 39.722130][ T3526] option from the mount to silence this warning. [ 39.722130][ T3526] ======================================================= [ 39.744696][ T3528] lo speed is unknown, defaulting to 1000 [ 39.850778][ T3528] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 39.851336][ T3528] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 39.898186][ T3526] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.906826][ T3528] lo speed is unknown, defaulting to 1000 [ 39.907162][ T3528] lo speed is unknown, defaulting to 1000 [ 39.907483][ T3528] lo speed is unknown, defaulting to 1000 [ 39.907845][ T3528] lo speed is unknown, defaulting to 1000 [ 39.908122][ T3528] lo speed is unknown, defaulting to 1000 [ 40.003227][ T3528] loop1: detected capacity change from 0 to 512 [ 40.018424][ T3526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 40.018615][ T3526] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 40.051599][ T3528] EXT4-fs warning (device loop1): ext4_xattr_inode_get:560: inode #11: comm syz.1.16: EA inode hash validation failed [ 40.051644][ T3528] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2853: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 40.051782][ T3528] EXT4-fs error (device loop1): ext4_do_update_inode:5632: inode #15: comm syz.1.16: corrupted inode contents [ 40.051955][ T3528] EXT4-fs error (device loop1): ext4_dirty_inode:6517: inode #15: comm syz.1.16: mark_inode_dirty error [ 40.052053][ T3528] EXT4-fs error (device loop1): ext4_do_update_inode:5632: inode #15: comm syz.1.16: corrupted inode contents [ 40.052144][ T3528] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2996: inode #15: comm syz.1.16: mark_inode_dirty error [ 40.052232][ T3528] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2999: inode #15: comm syz.1.16: mark inode dirty (error -117) [ 40.052346][ T3528] EXT4-fs warning (device loop1): ext4_evict_inode:274: xattr delete (err -117) [ 40.052389][ T3528] EXT4-fs (loop1): 1 orphan inode deleted [ 40.053026][ T3528] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.054078][ T3528] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.070283][ T3540] netlink: 16 bytes leftover after parsing attributes in process `syz.4.15'. [ 40.251469][ T3547] loop1: detected capacity change from 0 to 512 [ 40.255500][ T3547] EXT4-fs warning (device loop1): ext4_xattr_inode_get:560: inode #11: comm syz.1.19: EA inode hash validation failed [ 40.255765][ T3547] EXT4-fs error (device loop1): ext4_do_update_inode:5632: inode #15: comm syz.1.19: corrupted inode contents [ 40.271586][ T3547] EXT4-fs error (device loop1): ext4_dirty_inode:6517: inode #15: comm syz.1.19: mark_inode_dirty error [ 40.276309][ T3547] EXT4-fs error (device loop1): ext4_do_update_inode:5632: inode #15: comm syz.1.19: corrupted inode contents [ 40.276528][ T3547] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2996: inode #15: comm syz.1.19: mark_inode_dirty error [ 40.276721][ T3547] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2999: inode #15: comm syz.1.19: mark inode dirty (error -117) [ 40.276935][ T3547] EXT4-fs warning (device loop1): ext4_evict_inode:274: xattr delete (err -117) [ 40.276989][ T3547] EXT4-fs (loop1): 1 orphan inode deleted [ 40.277446][ T3547] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.278594][ T3547] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.353939][ T3552] loop1: detected capacity change from 0 to 512 [ 40.365242][ T3552] EXT4-fs error (device loop1): ext4_xattr_inode_iget:446: comm syz.1.21: error while reading EA inode 32 err=-116 [ 40.377711][ T3552] EXT4-fs (loop1): Remounting filesystem read-only [ 40.377798][ T3552] EXT4-fs warning (device loop1): ext4_evict_inode:257: couldn't mark inode dirty (err -30) [ 40.377828][ T3552] EXT4-fs (loop1): 1 orphan inode deleted [ 40.378343][ T3552] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.464167][ T3322] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.571966][ T3555] lo speed is unknown, defaulting to 1000 [ 40.891157][ T3544] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 40.904109][ T3544] Cannot find add_set index 0 as target [ 40.945299][ T3570] loop0: detected capacity change from 0 to 1024 [ 40.973148][ T3570] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.046483][ T3570] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 41.056692][ T3570] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 41.093850][ T3577] loop3: detected capacity change from 0 to 512 [ 41.115974][ T3574] netlink: 16 bytes leftover after parsing attributes in process `syz.0.26'. [ 41.128647][ T3577] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.141931][ T3577] ext4 filesystem being mounted at /2/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 41.154663][ T3577] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.28: bg 0: block 217: padding at end of block bitmap is not set [ 41.167698][ T3578] loop2: detected capacity change from 0 to 2048 [ 41.169254][ T3577] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6667: Corrupt filesystem [ 41.210917][ T3578] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.212851][ T3577] syz.3.28 (3577) used greatest stack depth: 10640 bytes left [ 41.225579][ T3578] ext4 filesystem being mounted at /4/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.239749][ T3320] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.333122][ T3587] netlink: 'syz.1.30': attribute type 10 has an invalid length. [ 41.340918][ T3587] netlink: 40 bytes leftover after parsing attributes in process `syz.1.30'. [ 41.387657][ T3587] batman_adv: batadv0: Adding interface: veth1_vlan [ 41.394303][ T3587] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 41.439163][ T3589] loop1: detected capacity change from 0 to 512 [ 41.466517][ T3589] ext4: Unknown parameter 'smackfshat' [ 41.490409][ T3587] batman_adv: batadv0: Interface activated: veth1_vlan [ 41.580085][ T3593] netlink: 'syz.1.32': attribute type 10 has an invalid length. [ 41.587845][ T3593] netlink: 40 bytes leftover after parsing attributes in process `syz.1.32'. [ 41.604061][ T3593] loop1: detected capacity change from 0 to 512 [ 41.610768][ T3593] ext4: Unknown parameter 'smackfshat' [ 41.698469][ T3594] lo speed is unknown, defaulting to 1000 [ 41.980424][ T3324] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.005826][ T3605] loop1: detected capacity change from 0 to 128 [ 42.012972][ T3605] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 42.177964][ T3605] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 42.199544][ T3611] netlink: 20 bytes leftover after parsing attributes in process `syz.2.38'. [ 42.311683][ T3401] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 42.326219][ T3401] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 42.341778][ T3613] loop1: detected capacity change from 0 to 2048 [ 42.406172][ T3500] loop1: p1 < > p4 [ 42.418076][ T3500] loop1: p4 size 8388608 extends beyond EOD, truncated [ 42.443662][ T3613] loop1: p1 < > p4 [ 42.454608][ T3618] lo speed is unknown, defaulting to 1000 [ 42.461934][ T3613] loop1: p4 size 8388608 extends beyond EOD, truncated [ 42.491840][ T3620] netlink: 44 bytes leftover after parsing attributes in process `syz.3.41'. [ 42.491868][ T3500] udevd[3500]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 42.511917][ T3532] udevd[3532]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 42.535018][ T3500] udevd[3500]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 42.535219][ T3532] udevd[3532]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 42.556911][ T44] Bluetooth: hci0: sending frame failed (-49) [ 42.563109][ T3560] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 42.680489][ T3642] loop2: detected capacity change from 0 to 164 [ 42.690599][ T3642] ISOFS: unable to read i-node block [ 42.701954][ T3642] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 42.715324][ T3642] netlink: 16 bytes leftover after parsing attributes in process `syz.2.42'. [ 42.724186][ T3642] netlink: 16 bytes leftover after parsing attributes in process `syz.2.42'. [ 42.767033][ T3643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2560 sclass=netlink_route_socket pid=3643 comm=syz.2.42 [ 42.779603][ T3643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2569 sclass=netlink_route_socket pid=3643 comm=syz.2.42 [ 42.792142][ T3643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2572 sclass=netlink_route_socket pid=3643 comm=syz.2.42 [ 42.807793][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.901247][ T3649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=3649 comm=syz.4.46 [ 42.901764][ T3649] raw_sendmsg: syz.4.46 forgot to set AF_INET. Fix it! [ 42.954840][ T3658] nfs4: Bad value for 'source' [ 43.008582][ T3658] netlink: 60 bytes leftover after parsing attributes in process `syz.4.48'. [ 43.017712][ T3658] unsupported nlmsg_type 40 [ 43.237259][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 43.237276][ T29] audit: type=1400 audit(1762712763.771:208): avc: denied { ioctl } for pid=3652 comm="syz.2.45" path="socket:[5560]" dev="sockfs" ino=5560 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 43.304865][ T29] audit: type=1326 audit(1762712763.811:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.304994][ T29] audit: type=1326 audit(1762712763.811:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305123][ T29] audit: type=1326 audit(1762712763.811:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=84 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305148][ T29] audit: type=1326 audit(1762712763.811:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305173][ T29] audit: type=1326 audit(1762712763.811:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305262][ T29] audit: type=1326 audit(1762712763.811:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305295][ T29] audit: type=1326 audit(1762712763.831:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305372][ T29] audit: type=1326 audit(1762712763.831:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.305417][ T29] audit: type=1326 audit(1762712763.831:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3652 comm="syz.2.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f31ab55f6c9 code=0x7ffc0000 [ 43.330917][ T3661] SET target dimension over the limit! [ 43.451546][ T3671] loop4: detected capacity change from 0 to 1024 [ 43.451920][ T3671] EXT4-fs: Ignoring removed orlov option [ 43.452023][ T3671] EXT4-fs: Ignoring removed nomblk_io_submit option [ 43.589713][ T3671] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.779019][ T3682] siw: device registration error -23 [ 43.786934][ T3682] loop3: detected capacity change from 0 to 512 [ 43.819555][ T3682] EXT4-fs warning (device loop3): ext4_xattr_inode_get:560: inode #11: comm syz.3.56: EA inode hash validation failed [ 43.819733][ T3682] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #15: comm syz.3.56: corrupted inode contents [ 43.819915][ T3682] EXT4-fs error (device loop3): ext4_dirty_inode:6517: inode #15: comm syz.3.56: mark_inode_dirty error [ 43.820080][ T3682] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #15: comm syz.3.56: corrupted inode contents [ 43.820187][ T3682] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2996: inode #15: comm syz.3.56: mark_inode_dirty error [ 43.820331][ T3682] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2999: inode #15: comm syz.3.56: mark inode dirty (error -117) [ 43.901666][ T3684] lo speed is unknown, defaulting to 1000 [ 44.140261][ T3689] __nla_validate_parse: 1 callbacks suppressed [ 44.140282][ T3689] netlink: 8 bytes leftover after parsing attributes in process `syz.1.58'. [ 44.155215][ T3689] netlink: 8 bytes leftover after parsing attributes in process `syz.1.58'. [ 44.188986][ T3682] EXT4-fs warning (device loop3): ext4_evict_inode:274: xattr delete (err -117) [ 44.200328][ T3682] EXT4-fs (loop3): 1 orphan inode deleted [ 44.207935][ T3682] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.264624][ T3682] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.279340][ T3312] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.331575][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.548939][ T3700] netlink: 32 bytes leftover after parsing attributes in process `syz.4.61'. [ 44.573918][ T3699] netlink: 44 bytes leftover after parsing attributes in process `syz.2.63'. [ 44.606905][ T3697] netlink: 168 bytes leftover after parsing attributes in process `syz.0.59'. [ 44.649255][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.656193][ T3704] netlink: 'syz.3.64': attribute type 10 has an invalid length. [ 44.656883][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.664418][ T3704] netlink: 40 bytes leftover after parsing attributes in process `syz.3.64'. [ 44.671830][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.671866][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.671889][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.671916][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.710589][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.718137][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.725596][ T36] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 44.763329][ T3706] loop0: detected capacity change from 0 to 2048 [ 44.776463][ T36] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 [ 44.795293][ T3709] loop3: detected capacity change from 0 to 512 [ 44.797476][ T3704] batman_adv: batadv0: Adding interface: veth1_vlan [ 44.808374][ T3704] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 44.844570][ T3533] loop0: p1 < > p4 [ 44.849630][ T3704] batman_adv: batadv0: Interface activated: veth1_vlan [ 44.865310][ T3533] loop0: p4 size 8388608 extends beyond EOD, truncated [ 44.872875][ T3709] ext4: Unknown parameter 'smackfshat' [ 44.908075][ T3715] netlink: 8 bytes leftover after parsing attributes in process `syz.4.66'. [ 44.916902][ T3715] netlink: 8 bytes leftover after parsing attributes in process `syz.4.66'. [ 44.970919][ T3706] loop0: p1 < > p4 [ 44.974587][ T3532] udevd[3532]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 44.976791][ T3706] loop0: p4 size 8388608 extends beyond EOD, truncated [ 45.028562][ T3694] loop1: detected capacity change from 0 to 512 [ 45.275034][ T3729] netlink: 168 bytes leftover after parsing attributes in process `syz.1.70'. [ 45.392212][ T3729] loop1: detected capacity change from 0 to 2048 [ 45.420188][ T3532] loop1: p1 < > p4 [ 45.420783][ T3532] loop1: p4 size 8388608 extends beyond EOD, truncated [ 45.433644][ T3729] loop1: p1 < > p4 [ 45.434377][ T3729] loop1: p4 size 8388608 extends beyond EOD, truncated [ 45.463835][ T3003] loop1: p1 < > p4 [ 45.464557][ T3003] loop1: p4 size 8388608 extends beyond EOD, truncated [ 45.480784][ T3732] netlink: 168 bytes leftover after parsing attributes in process `syz.3.72'. [ 45.494282][ T3003] ================================================================== [ 45.494313][ T3003] BUG: KCSAN: data-race in d_delete / step_into [ 45.494351][ T3003] [ 45.494358][ T3003] read-write to 0xffff8881006c5a80 of 4 bytes by task 3303 on cpu 1: [ 45.494378][ T3003] d_delete+0x15a/0x180 [ 45.494399][ T3003] d_delete_notify+0x32/0x100 [ 45.494429][ T3003] vfs_unlink+0x30b/0x420 [ 45.494458][ T3003] do_unlinkat+0x24e/0x480 [ 45.494488][ T3003] __x64_sys_unlink+0x2e/0x40 [ 45.494516][ T3003] x64_sys_call+0x2dcf/0x3000 [ 45.494539][ T3003] do_syscall_64+0xd2/0x200 [ 45.494564][ T3003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.494590][ T3003] [ 45.494596][ T3003] read to 0xffff8881006c5a80 of 4 bytes by task 3003 on cpu 0: [ 45.494616][ T3003] step_into+0xe3/0x7f0 [ 45.494651][ T3003] walk_component+0x162/0x220 [ 45.494687][ T3003] path_lookupat+0xfe/0x2a0 [ 45.494725][ T3003] filename_lookup+0x147/0x340 [ 45.494763][ T3003] do_readlinkat+0x7d/0x320 [ 45.494781][ T3003] __x64_sys_readlink+0x47/0x60 [ 45.494799][ T3003] x64_sys_call+0x28de/0x3000 [ 45.494827][ T3003] do_syscall_64+0xd2/0x200 [ 45.494852][ T3003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.494878][ T3003] [ 45.494882][ T3003] value changed: 0x00300180 -> 0x00004080 [ 45.494896][ T3003] [ 45.494900][ T3003] Reported by Kernel Concurrency Sanitizer on: [ 45.494928][ T3003] CPU: 0 UID: 0 PID: 3003 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 45.494964][ T3003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 45.494980][ T3003] ================================================================== [ 45.625410][ T3736] loop3: detected capacity change from 0 to 2048 [ 45.671993][ T3736] loop3: p1 < > p4 [ 45.672946][ T3736] loop3: p4 size 8388608 extends beyond EOD, truncated [ 46.635780][ T3560] Bluetooth: hci0: Opcode 0x1003 failed: -110