h could impact the performance. Setting the MTU to 1560 would solve the problem. [ 909.039022][T26153] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 909.051791][T26153] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 909.059260][T26153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 909.088267][T26153] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 909.132251][T26153] device hsr_slave_0 entered promiscuous mode [ 909.140289][T26153] device hsr_slave_1 entered promiscuous mode [ 909.147411][T26153] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 909.155157][T26153] Cannot create hsr debugfs directory [ 909.824603][T26180] chnl_net:caif_netlink_parms(): no params data found [ 909.985886][T26153] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 910.000987][T26180] bridge0: port 1(bridge_slave_0) entered blocking state [ 910.008720][T26180] bridge0: port 1(bridge_slave_0) entered disabled state [ 910.022245][T26180] device bridge_slave_0 entered promiscuous mode [ 910.033465][T26180] bridge0: port 2(bridge_slave_1) entered blocking state [ 910.041448][T26180] bridge0: port 2(bridge_slave_1) entered disabled state [ 910.051101][T26180] device bridge_slave_1 entered promiscuous mode [ 910.059066][T26153] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 910.075416][T16182] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 910.102014][T26153] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 910.122493][T26180] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 910.132236][T26153] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 910.158331][T26180] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 910.187991][T16182] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 910.218086][T26180] team0: Port device team_slave_0 added [ 910.228475][T26180] team0: Port device team_slave_1 added [ 910.264587][T16182] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 910.284406][T26180] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 910.291353][T26180] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 910.319188][T26180] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 910.343078][ T3874] Bluetooth: hci0: command 0x0409 tx timeout [ 910.343769][T26180] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 910.357589][T26180] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 910.384872][T26180] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 910.403223][T16182] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 910.505712][T26153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 910.533637][T26180] device hsr_slave_0 entered promiscuous mode [ 910.542579][T26180] device hsr_slave_1 entered promiscuous mode [ 910.550211][T26180] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 910.559476][T26180] Cannot create hsr debugfs directory [ 910.628108][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 910.636435][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 910.666441][T26153] 8021q: adding VLAN 0 to HW filter on device team0 [ 910.691547][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 910.703453][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 910.711976][T20627] bridge0: port 1(bridge_slave_0) entered blocking state [ 910.719112][T20627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 910.785415][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 910.793670][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 910.802271][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 910.811659][T20631] bridge0: port 2(bridge_slave_1) entered blocking state [ 910.818931][T20631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 910.830152][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 910.838902][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 910.881210][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 910.891173][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 910.938360][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 910.951318][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 910.971179][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 910.989361][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 910.999272][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 911.031841][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 911.040898][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 911.070186][T26153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 911.234196][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 911.242196][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 911.265670][T26153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 911.331636][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 911.341643][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 911.421838][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 911.433520][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 911.444816][T26153] device veth0_vlan entered promiscuous mode [ 911.459209][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 911.467894][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 911.481856][T26153] device veth1_vlan entered promiscuous mode [ 911.532753][ T6872] Bluetooth: hci5: command 0x0409 tx timeout [ 911.603310][T26153] device veth0_macvtap entered promiscuous mode [ 911.610681][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 911.621099][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 911.630255][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 911.639526][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 911.656815][T26153] device veth1_macvtap entered promiscuous mode [ 911.667482][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 911.680265][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 911.704998][T26180] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 911.725733][T26180] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 911.738082][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.750068][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.761628][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.788060][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.806563][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.821575][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.839499][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.850738][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.870492][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.881397][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.904208][T26153] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 911.914982][T26180] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 911.926365][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 911.935591][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 911.958235][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 911.969414][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.979486][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 911.991094][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.001245][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.012069][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.032668][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.043365][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.053497][T26153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.064074][T26153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.075363][T26153] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 912.083510][T26180] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 912.095998][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 912.105906][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 912.128724][T26153] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.139753][T26153] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.148676][T26153] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.158169][T26153] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.360448][T16182] device hsr_slave_0 left promiscuous mode [ 912.369445][T16182] device hsr_slave_1 left promiscuous mode [ 912.376881][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 912.384753][T16182] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 912.394188][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 912.401881][T16182] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 912.410999][T16182] device bridge_slave_1 left promiscuous mode [ 912.417687][ T3874] Bluetooth: hci0: command 0x041b tx timeout [ 912.419280][T16182] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.435019][T16182] device bridge_slave_0 left promiscuous mode [ 912.441322][T16182] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.453541][T16182] device veth1_macvtap left promiscuous mode [ 912.459714][T16182] device veth0_macvtap left promiscuous mode [ 912.466216][T16182] device veth1_vlan left promiscuous mode [ 912.471979][T16182] device veth0_vlan left promiscuous mode [ 912.650995][T16182] team0 (unregistering): Port device team_slave_1 removed [ 912.673795][T16182] team0 (unregistering): Port device team_slave_0 removed [ 912.689141][T16182] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 912.704737][T16182] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 912.777773][T16182] bond0 (unregistering): Released all slaves [ 912.849545][T16236] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 912.858252][T16236] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 912.871144][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 912.920412][T26180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 912.939033][T16236] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 912.951706][T16236] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 912.968241][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 912.980164][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 912.988506][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 913.004456][T26180] 8021q: adding VLAN 0 to HW filter on device team0 [ 913.019924][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 913.053996][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 913.063995][ T3874] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.071096][ T3874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 913.080975][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:52:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x5de, 0x0, 0x20040006, 0xb00300}) [ 913.121742][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 913.134782][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 913.150809][T20635] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.158074][T20635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 913.166639][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 913.175578][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 913.184866][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 913.195016][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 913.207914][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 913.247916][T26180] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 913.264087][T26180] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 913.285134][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 913.302280][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 913.311170][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 913.321088][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 913.330907][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 913.340095][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 913.351271][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 913.453192][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 913.460985][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 913.482023][T26180] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 913.613152][ T3874] Bluetooth: hci5: command 0x041b tx timeout [ 913.636723][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 913.653455][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 913.682016][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 913.691516][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 913.705878][T26180] device veth0_vlan entered promiscuous mode [ 913.718477][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 913.728065][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 913.742376][T26180] device veth1_vlan entered promiscuous mode [ 913.771511][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 913.781302][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 913.790034][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 913.799888][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 913.813632][T26180] device veth0_macvtap entered promiscuous mode [ 913.831388][T26180] device veth1_macvtap entered promiscuous mode [ 913.851316][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 913.863953][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 913.874462][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 913.885359][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 913.895609][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 913.906409][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 913.916865][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 913.928092][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 913.942230][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 913.953518][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 913.965478][T26180] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 913.976943][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 913.986311][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 913.995804][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 914.004893][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 914.018113][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 914.029107][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 914.040836][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 914.055104][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 914.065370][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 914.076206][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 914.086520][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 914.098584][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 914.109046][T26180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 914.120101][T26180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 914.131844][T26180] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 914.142154][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 914.151581][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 914.164401][T26180] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.176356][T26180] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.187046][T26180] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.196245][T26180] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.270050][T17020] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 914.283021][T17020] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 914.309697][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 914.314222][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 914.327313][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 914.354602][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:52:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xb00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x34501, 0x0) sendmsg$AUDIT_USER_TTY(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, 0x464, 0x100, 0x70bd2c, 0x25dfdbfe, "0e8e0ff3615701f9307d13753a27c1fa54e30ae26cf9d40a655e454d55dd9c6bd3afca22a58673a50e9c7eccb834eee1df1138fda90d48c6f5175b4561d6a49e169d8f60d969151d5ec9a0a97090fd967d373a53803ba56d453cf2a57f1035bad0f77dd9466061d0e0042624d6e3bfe59d7aada98ff279", ["", "", "", "", ""]}, 0x88}, 0x1, 0x0, 0x0, 0x4810}, 0x8004010) 14:52:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xe00100}) 14:52:31 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x700, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x600, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xe80100}) 14:52:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x604, 0x0, 0x20040006, 0xb00300}) [ 914.493535][ T6872] Bluetooth: hci0: command 0x040f tx timeout 14:52:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x900, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xb92, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:31 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xa00, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x6cb, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xf00100}) 14:52:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xb00, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x81, 0x6, 0x6, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7, 0x8, 0x0, 0x3}}) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newtclass={0x58, 0x28, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xffe0, 0x6}, {0xffff, 0xb}, {0xc, 0x8}}, [@tclass_kind_options=@c_mqprio={0xb}, @TCA_RATE={0x6, 0x5, {0x1, 0x33}}, @tclass_kind_options=@c_drr={{0x8}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}, @tclass_kind_options=@c_prio={0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x40c4}, 0x4000001) openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x700, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xc00, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8cb, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x81, 0x6, 0x6, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7, 0x8, 0x0, 0x3}}) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newtclass={0x58, 0x28, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xffe0, 0x6}, {0xffff, 0xb}, {0xc, 0x8}}, [@tclass_kind_options=@c_mqprio={0xb}, @TCA_RATE={0x6, 0x5, {0x1, 0x33}}, @tclass_kind_options=@c_drr={{0x8}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}, @tclass_kind_options=@c_prio={0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x40c4}, 0x4000001) (async, rerun: 64) openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async, rerun: 64) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xf80000}) 14:52:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xd00, 0x0, 0x20040006, 0xb00300}) [ 915.693076][ T3874] Bluetooth: hci5: command 0x040f tx timeout 14:52:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xf80100}) 14:52:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8ff, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x81, 0x6, 0x6, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x7, 0x8, 0x0, 0x3}}) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newtclass={0x58, 0x28, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xffe0, 0x6}, {0xffff, 0xb}, {0xc, 0x8}}, [@tclass_kind_options=@c_mqprio={0xb}, @TCA_RATE={0x6, 0x5, {0x1, 0x33}}, @tclass_kind_options=@c_drr={{0x8}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}, @tclass_kind_options=@c_prio={0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x40c4}, 0x4000001) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newtclass={0x58, 0x28, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xffe0, 0x6}, {0xffff, 0xb}, {0xc, 0x8}}, [@tclass_kind_options=@c_mqprio={0xb}, @TCA_RATE={0x6, 0x5, {0x1, 0x33}}, @tclass_kind_options=@c_drr={{0x8}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}, @tclass_kind_options=@c_prio={0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x40c4}, 0x4000001) openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xe00, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc66, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x7, 0x40, 0x5, 0x4, {{0x11, 0x4, 0x0, 0x3, 0x44, 0x65, 0x0, 0x1, 0x29, 0x0, @broadcast, @broadcast, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0x6b, 0x3, 0xf, [{@local, 0x9}]}, @cipso={0x86, 0x20, 0x3, [{0x7, 0x3, "a3"}, {0x5, 0x2}, {0x0, 0xc, "10e7c3760ec47d53fb1c"}, {0x2, 0x9, "713169c1bf5a3e"}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x9, 0x5, 0x1, 0x401, 0xffffffffffffffff, 0x1, '\x00', r1, r2, 0x0, 0x5, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="010000004310c73b75696c65300000000000009150000000000000000002000000a61691c8fbcf07e50135a096fa440952570d8b21b61327c1bac66a9833942fccfb4e4dd304fcad54c27d9f1ac94aefdba7724836f4ba13db1a896c497505f4aaacc1b51e57898e587d001d3dec58310e9c0475c4bd392c1d52b07590"]) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x4) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getroute={0x70, 0x1a, 0x20, 0x70bd29, 0x25dfdbfb, {0xa, 0x80, 0x10, 0xff, 0xfc, 0x1, 0xff, 0x0, 0x200}, [@RTA_MARK={0x8, 0x10, 0x7}, @RTA_OIF={0x8, 0x4, r4}, @RTA_GATEWAY={0x14, 0x5, @mcast1}, @RTA_GATEWAY={0x14, 0x5, @local}, @RTA_ENCAP_TYPE={0x6}, @RTA_MULTIPATH={0xc, 0x9, {0x9, 0x7, 0x1f}}, @RTA_OIF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 14:52:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x900, 0x0, 0x20040006, 0xb00300}) 14:52:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc67, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x1100, 0x0, 0x20040006, 0xb00300}) 14:52:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x1000000}) 14:52:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x90e, 0x0, 0x20040006, 0xb00300}) 14:52:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x1200, 0x0, 0x20040006, 0xb00300}) 14:52:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xd00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x2000000}) [ 916.573456][ T3874] Bluetooth: hci0: command 0x0419 tx timeout [ 917.715248][T16110] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.770779][T16110] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.773023][ T3249] Bluetooth: hci5: command 0x0419 tx timeout [ 917.841555][T16110] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.907864][T16110] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 918.825112][T16110] device hsr_slave_0 left promiscuous mode [ 918.831995][T16110] device hsr_slave_1 left promiscuous mode [ 918.845170][T16110] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 918.858913][T16110] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 918.870755][T16110] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 918.882658][T16110] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 918.892293][T16110] device bridge_slave_1 left promiscuous mode [ 918.909592][T16110] bridge0: port 2(bridge_slave_1) entered disabled state [ 918.919572][T16110] device bridge_slave_0 left promiscuous mode [ 918.931726][T16110] bridge0: port 1(bridge_slave_0) entered disabled state [ 918.946742][T16110] device veth1_macvtap left promiscuous mode [ 918.961169][T16110] device veth0_macvtap left promiscuous mode [ 918.967505][T16110] device veth1_vlan left promiscuous mode [ 918.974178][T16110] device veth0_vlan left promiscuous mode [ 919.179606][T16110] team0 (unregistering): Port device team_slave_1 removed [ 919.194841][T16110] team0 (unregistering): Port device team_slave_0 removed [ 919.210547][T16110] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 919.226613][T16110] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 919.292991][T16110] bond0 (unregistering): Released all slaves [ 919.400799][T26432] chnl_net:caif_netlink_parms(): no params data found [ 919.473737][T26432] bridge0: port 1(bridge_slave_0) entered blocking state [ 919.486150][T26432] bridge0: port 1(bridge_slave_0) entered disabled state [ 919.494740][T26432] device bridge_slave_0 entered promiscuous mode [ 919.510838][T26432] bridge0: port 2(bridge_slave_1) entered blocking state [ 919.518062][T26432] bridge0: port 2(bridge_slave_1) entered disabled state [ 919.525978][T26432] device bridge_slave_1 entered promiscuous mode [ 919.557899][T26432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 919.579319][T26432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 919.636184][T26432] team0: Port device team_slave_0 added [ 919.644426][T26432] team0: Port device team_slave_1 added [ 919.675673][T26432] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 919.682704][T26432] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 919.709746][T26432] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 919.722235][T26432] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 919.730474][T26432] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 919.756996][T26432] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 919.864725][T26432] device hsr_slave_0 entered promiscuous mode [ 919.888901][T26432] device hsr_slave_1 entered promiscuous mode [ 919.896355][T26432] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 919.904593][T26432] Cannot create hsr debugfs directory [ 920.454918][T26432] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 920.465673][T26432] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 920.476556][T26432] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 920.496084][T26432] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 920.624075][T26432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 920.655198][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 920.671331][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 920.695643][T26432] 8021q: adding VLAN 0 to HW filter on device team0 [ 920.714162][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 920.723848][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 920.732354][ T3249] bridge0: port 1(bridge_slave_0) entered blocking state [ 920.739495][ T3249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 920.780015][ T6880] Bluetooth: hci1: command 0x0409 tx timeout [ 920.788767][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 920.806283][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 920.825851][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 920.840097][ T6872] bridge0: port 2(bridge_slave_1) entered blocking state [ 920.847346][ T6872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 920.862248][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 920.871502][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 920.887816][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 920.901495][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 920.948193][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 920.961325][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 920.984453][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 921.000643][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 921.020461][T26432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 921.036764][T26432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 921.045235][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 921.055567][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 921.224374][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 921.233024][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 921.253027][T26432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 921.308937][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 921.339816][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 921.393716][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 921.413355][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 921.423914][T26432] device veth0_vlan entered promiscuous mode [ 921.441659][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 921.450184][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 921.467018][T26432] device veth1_vlan entered promiscuous mode [ 921.492750][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 921.501573][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 921.518337][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 921.529637][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 921.561379][T26432] device veth0_macvtap entered promiscuous mode [ 921.578281][T26432] device veth1_macvtap entered promiscuous mode [ 921.612843][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.624323][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.635094][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.652861][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.664351][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.677035][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.687502][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.699403][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.710294][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.722170][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.734087][T26432] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 921.742247][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 921.751636][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 921.760202][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 921.780864][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 921.799341][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.810495][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.821772][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.832769][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.842994][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.854012][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.864192][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.874964][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.885355][T26432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.896842][T26432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.910183][T26432] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 921.921241][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 921.931635][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 921.944545][T26432] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.954657][T26432] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.964065][T26432] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.973176][T26432] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.063750][T17020] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 922.072137][T17020] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 922.092378][T16236] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 922.099832][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 922.107337][T16236] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 922.134378][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 922.813476][ T1066] Bluetooth: hci1: command 0x041b tx timeout 14:52:39 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x7, 0x40, 0x5, 0x4, {{0x11, 0x4, 0x0, 0x3, 0x44, 0x65, 0x0, 0x1, 0x29, 0x0, @broadcast, @broadcast, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0x6b, 0x3, 0xf, [{@local, 0x9}]}, @cipso={0x86, 0x20, 0x3, [{0x7, 0x3, "a3"}, {0x5, 0x2}, {0x0, 0xc, "10e7c3760ec47d53fb1c"}, {0x2, 0x9, "713169c1bf5a3e"}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x9, 0x5, 0x1, 0x401, 0xffffffffffffffff, 0x1, '\x00', r1, r2, 0x0, 0x5, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="010000004310c73b75696c65300000000000009150000000000000000002000000a61691c8fbcf07e50135a096fa440952570d8b21b61327c1bac66a9833942fccfb4e4dd304fcad54c27d9f1ac94aefdba7724836f4ba13db1a896c497505f4aaacc1b51e57898e587d001d3dec58310e9c0475c4bd392c1d52b07590"]) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x4) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getroute={0x70, 0x1a, 0x20, 0x70bd29, 0x25dfdbfb, {0xa, 0x80, 0x10, 0xff, 0xfc, 0x1, 0xff, 0x0, 0x200}, [@RTA_MARK={0x8, 0x10, 0x7}, @RTA_OIF={0x8, 0x4, r4}, @RTA_GATEWAY={0x14, 0x5, @mcast1}, @RTA_GATEWAY={0x14, 0x5, @local}, @RTA_ENCAP_TYPE={0x6}, @RTA_MULTIPATH={0xc, 0x9, {0x9, 0x7, 0x1f}}, @RTA_OIF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x7, 0x40, 0x5, 0x4, {{0x11, 0x4, 0x0, 0x3, 0x44, 0x65, 0x0, 0x1, 0x29, 0x0, @broadcast, @broadcast, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0x6b, 0x3, 0xf, [{@local, 0x9}]}, @cipso={0x86, 0x20, 0x3, [{0x7, 0x3, "a3"}, {0x5, 0x2}, {0x0, 0xc, "10e7c3760ec47d53fb1c"}, {0x2, 0x9, "713169c1bf5a3e"}]}]}}}}}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x9, 0x5, 0x1, 0x401, 0xffffffffffffffff, 0x1, '\x00', r1, r2, 0x0, 0x5, 0x3}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="010000004310c73b75696c65300000000000009150000000000000000002000000a61691c8fbcf07e50135a096fa440952570d8b21b61327c1bac66a9833942fccfb4e4dd304fcad54c27d9f1ac94aefdba7724836f4ba13db1a896c497505f4aaacc1b51e57898e587d001d3dec58310e9c0475c4bd392c1d52b07590"]) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x4) (async) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getroute={0x70, 0x1a, 0x20, 0x70bd29, 0x25dfdbfb, {0xa, 0x80, 0x10, 0xff, 0xfc, 0x1, 0xff, 0x0, 0x200}, [@RTA_MARK={0x8, 0x10, 0x7}, @RTA_OIF={0x8, 0x4, r4}, @RTA_GATEWAY={0x14, 0x5, @mcast1}, @RTA_GATEWAY={0x14, 0x5, @local}, @RTA_ENCAP_TYPE={0x6}, @RTA_MULTIPATH={0xc, 0x9, {0x9, 0x7, 0x1f}}, @RTA_OIF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) (async) 14:52:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x911, 0x0, 0x20040006, 0xb00300}) 14:52:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xe00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x17ff, 0x0, 0x20040006, 0xb00300}) 14:52:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x2040000}) 14:52:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x1800, 0x0, 0x20040006, 0xb00300}) 14:52:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x912, 0x0, 0x20040006, 0xb00300}) 14:52:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xf00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x7, 0x40, 0x5, 0x4, {{0x11, 0x4, 0x0, 0x3, 0x44, 0x65, 0x0, 0x1, 0x29, 0x0, @broadcast, @broadcast, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0x6b, 0x3, 0xf, [{@local, 0x9}]}, @cipso={0x86, 0x20, 0x3, [{0x7, 0x3, "a3"}, {0x5, 0x2}, {0x0, 0xc, "10e7c3760ec47d53fb1c"}, {0x2, 0x9, "713169c1bf5a3e"}]}]}}}}}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x9, 0x5, 0x1, 0x401, 0xffffffffffffffff, 0x1, '\x00', r1, r2, 0x0, 0x5, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="010000004310c73b75696c65300000000000009150000000000000000002000000a61691c8fbcf07e50135a096fa440952570d8b21b61327c1bac66a9833942fccfb4e4dd304fcad54c27d9f1ac94aefdba7724836f4ba13db1a896c497505f4aaacc1b51e57898e587d001d3dec58310e9c0475c4bd392c1d52b07590"]) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x4) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getroute={0x70, 0x1a, 0x20, 0x70bd29, 0x25dfdbfb, {0xa, 0x80, 0x10, 0xff, 0xfc, 0x1, 0xff, 0x0, 0x200}, [@RTA_MARK={0x8, 0x10, 0x7}, @RTA_OIF={0x8, 0x4, r4}, @RTA_GATEWAY={0x14, 0x5, @mcast1}, @RTA_GATEWAY={0x14, 0x5, @local}, @RTA_ENCAP_TYPE={0x6}, @RTA_MULTIPATH={0xc, 0x9, {0x9, 0x7, 0x1f}}, @RTA_OIF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 14:52:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xa00, 0x0, 0x20040006, 0xb00300}) 14:52:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x3000000}) [ 923.550552][ T154] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.622276][ T154] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.690018][ T154] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.770114][ T154] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:52:40 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xb00, 0x0, 0x20040006, 0xb00300}) 14:52:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xf02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x4000000}) 14:52:40 executing program 0: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000000)={0x9da0, 0x18060e6c, 0x9, 0x31a8, 0x0, @discrete={0xfffffffe, 0x101}}) r0 = getpid() r1 = syz_open_dev$sndpcmc(&(0x7f0000000100), 0x5c, 0x240280) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) kcmp(0x0, r0, 0x1, r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x20040006, 0xb00300}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r3, 0xc0984124, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 14:52:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xc00, 0x0, 0x20040006, 0xb00300}) [ 924.837750][ T154] device hsr_slave_0 left promiscuous mode [ 924.848249][ T154] device hsr_slave_1 left promiscuous mode [ 924.860187][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 924.891663][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 924.898772][ T3249] Bluetooth: hci1: command 0x040f tx timeout [ 924.925770][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 924.939072][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 924.961359][ T154] device bridge_slave_1 left promiscuous mode [ 924.970491][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.990383][ T154] device bridge_slave_0 left promiscuous mode [ 924.997374][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.013661][ T154] device veth1_macvtap left promiscuous mode [ 925.019737][ T154] device veth0_macvtap left promiscuous mode [ 925.026399][ T154] device veth1_vlan left promiscuous mode [ 925.032233][ T154] device veth0_vlan left promiscuous mode [ 925.277227][ T154] team0 (unregistering): Port device team_slave_1 removed [ 925.295058][ T154] team0 (unregistering): Port device team_slave_0 removed [ 925.307370][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 925.322421][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 925.390954][ T154] bond0 (unregistering): Released all slaves [ 926.408188][T26688] chnl_net:caif_netlink_parms(): no params data found [ 926.584470][T26688] bridge0: port 1(bridge_slave_0) entered blocking state [ 926.609578][T26688] bridge0: port 1(bridge_slave_0) entered disabled state [ 926.625652][T26688] device bridge_slave_0 entered promiscuous mode [ 926.640489][T26688] bridge0: port 2(bridge_slave_1) entered blocking state [ 926.650756][T26688] bridge0: port 2(bridge_slave_1) entered disabled state [ 926.659955][T26688] device bridge_slave_1 entered promiscuous mode [ 926.697115][T26688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 926.716697][T26688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 926.765362][T26688] team0: Port device team_slave_0 added [ 926.774719][T26688] team0: Port device team_slave_1 added [ 926.808172][T26688] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 926.829590][T26688] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 926.857857][T26688] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 926.876301][T26688] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 926.892685][T26688] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 926.935069][T26688] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 926.980078][ T1066] Bluetooth: hci1: command 0x0419 tx timeout [ 927.006938][T26688] device hsr_slave_0 entered promiscuous mode [ 927.019045][T26688] device hsr_slave_1 entered promiscuous mode [ 927.033323][T26688] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 927.041761][T26688] Cannot create hsr debugfs directory [ 927.615643][T26688] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 927.632155][T26688] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 927.649896][T26688] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 927.662454][T26688] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 927.790193][T26688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 927.817185][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 927.828372][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 927.845072][T26688] 8021q: adding VLAN 0 to HW filter on device team0 [ 927.868309][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 927.885295][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 927.899992][ T3249] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.907256][ T3249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 927.941754][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 927.950522][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 927.968417][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 927.979901][ T3249] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.987068][ T3249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 928.001866][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 928.011251][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 928.041530][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 928.058750][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 928.071747][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 928.088143][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 928.116899][T26688] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 928.139672][T26688] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 928.160626][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 928.170904][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 928.180013][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 928.189445][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 928.198283][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 928.207536][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 928.252823][ T6872] Bluetooth: hci5: command 0x0409 tx timeout [ 928.347042][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 928.355908][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 928.375244][T26688] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 928.551218][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 928.560798][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 928.595252][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 928.611492][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 928.623189][T26688] device veth0_vlan entered promiscuous mode [ 928.641081][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 928.649998][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 928.669489][T26688] device veth1_vlan entered promiscuous mode [ 928.708374][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 928.724293][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 928.732538][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 928.753371][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 928.772110][T26688] device veth0_macvtap entered promiscuous mode [ 928.786899][T26688] device veth1_macvtap entered promiscuous mode [ 928.811133][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 928.832493][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 928.842431][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 928.859584][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 928.869505][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 928.888389][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 928.901537][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 928.917481][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 928.928883][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 928.946491][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 928.961740][T26688] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 928.978526][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 928.996160][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 929.007848][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 929.020082][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 929.034465][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.054926][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.073540][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.091252][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.102678][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.119946][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.129889][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.140841][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.150893][T26688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.161517][T26688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.174609][T26688] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 929.186694][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 929.196124][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 929.206980][T26688] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 929.216884][T26688] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 929.226160][T26688] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 929.235321][T26688] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 929.306435][T16182] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 929.320563][T16182] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 929.338442][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 14:52:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x1fff, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1100, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x5000000}) 14:52:46 executing program 0: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000000)={0x9da0, 0x18060e6c, 0x9, 0x31a8, 0x0, @discrete={0xfffffffe, 0x101}}) (async) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000000)={0x9da0, 0x18060e6c, 0x9, 0x31a8, 0x0, @discrete={0xfffffffe, 0x101}}) r0 = getpid() syz_open_dev$sndpcmc(&(0x7f0000000100), 0x5c, 0x240280) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100), 0x5c, 0x240280) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) kcmp(0x0, r0, 0x1, r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x20040006, 0xb00300}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) (async) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r3, 0xc0984124, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 14:52:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xd00, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) shutdown(r1, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) [ 929.351805][T16110] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 929.360863][T16110] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 929.375147][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x6000000}) 14:52:46 executing program 0: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000000)={0x9da0, 0x18060e6c, 0x9, 0x31a8, 0x0, @discrete={0xfffffffe, 0x101}}) r0 = getpid() (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100), 0x5c, 0x240280) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) kcmp(0x0, r0, 0x1, r1, 0xffffffffffffffff) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x20040006, 0xb00300}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r3, 0xc0984124, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 14:52:46 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@rose, @default, @remote, @netrom, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48, 0x800) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x2000, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1200, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xe00, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x2500, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x6040000}) 14:52:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYRES8=r1]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) r5 = openat$cgroup_ro(r3, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x4, 0x80000000, 0x6, 0xb00300}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@initdev, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, @can={0x1d, r6}, 0x5, 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)='lo\x00', 0x6, 0x800, 0x8}) 14:52:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xe09, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1402, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x27ff, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async, rerun: 64) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (rerun: 64) r3 = dup3(0xffffffffffffffff, r2, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYRES8=r1]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) (async) r5 = openat$cgroup_ro(r3, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x4, 0x80000000, 0x6, 0xb00300}) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@initdev, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, @can={0x1d, r6}, 0x5, 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)='lo\x00', 0x6, 0x800, 0x8}) 14:52:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x1100, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x7000000}) 14:52:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1600, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:46 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x2800, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x1109, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYRES8=r1]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) r5 = openat$cgroup_ro(r3, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x4, 0x80000000, 0x6, 0xb00300}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@initdev, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, @can={0x1d, r6}, 0x5, 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)='lo\x00', 0x6, 0x800, 0x8}) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) dup3(0xffffffffffffffff, r2, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYRES8=r1]}) (async) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) (async) openat$cgroup_ro(r3, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x4, 0x80000000, 0x6, 0xb00300}) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@initdev}, &(0x7f0000000080)=0x14) (async) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @multicast2}, @l2={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x9}, @can={0x1d, r6}, 0x5, 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)='lo\x00', 0x6, 0x800, 0x8}) (async) 14:52:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1701, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x2fff, 0x0, 0x20040006, 0xb00300}) 14:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x8000000}) 14:52:46 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000980)) r4 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) r6 = openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) r7 = socket$netlink(0x10, 0x3, 0x21) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, 0x2, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x22}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x40) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x1200, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1800, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) [ 930.333874][ T6872] Bluetooth: hci5: command 0x041b tx timeout 14:52:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x3000, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000980)) r4 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) r6 = openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) r7 = socket$netlink(0x10, 0x3, 0x21) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, 0x2, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x22}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x40) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000980)) (async) dup3(0xffffffffffffffff, r2, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) (async) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) (async) socket$netlink(0x10, 0x3, 0x21) (async) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, 0x2, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x22}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x40) (async) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) 14:52:47 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x597201, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x9000000}) 14:52:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000980)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000980)) dup3(0xffffffffffffffff, r2, 0x80000) (async) r4 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) r6 = openat$cgroup_ro(r4, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) r7 = socket$netlink(0x10, 0x3, 0x21) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, 0x2, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x22}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x40) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x1209, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1801, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x37ff, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040008, 0xb00300}) ioctl$SIOCRSACCEPT(r0, 0x89e3) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000080)={0x0, 0x2, 0x2}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) 14:52:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xa000000}) 14:52:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1c02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x1800, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x3800, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040008, 0xb00300}) (async) ioctl$SIOCRSACCEPT(r0, 0x89e3) (async) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000080)={0x0, 0x2, 0x2}) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) 14:52:47 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) quotactl_fd$Q_QUOTAON(r0, 0xffffffff80000201, 0xee01, &(0x7f0000000000)='./file0\x00') r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xb000000}) 14:52:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x3f00, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1d02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xc000000}) 14:52:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040008, 0xb00300}) ioctl$SIOCRSACCEPT(r0, 0x89e3) (async) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000080)={0x0, 0x2, 0x2}) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) 14:52:47 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x404c00, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x3fff, 0x0, 0x20040006, 0xb00300}) 14:52:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x1f01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) [ 931.152821][ T154] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 931.257019][ T154] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 931.303938][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.310295][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 931.378460][ T154] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 931.563748][ T154] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 932.415091][ T6880] Bluetooth: hci5: command 0x040f tx timeout [ 932.635830][ T154] device hsr_slave_0 left promiscuous mode [ 932.653691][ T154] device hsr_slave_1 left promiscuous mode [ 932.663944][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 932.682058][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 932.710470][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 932.742531][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 932.760259][ T154] device bridge_slave_1 left promiscuous mode [ 932.769119][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 932.780074][ T154] device bridge_slave_0 left promiscuous mode [ 932.787483][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 932.801220][ T154] device veth1_macvtap left promiscuous mode [ 932.814173][ T154] device veth0_macvtap left promiscuous mode [ 932.820305][ T154] device veth1_vlan left promiscuous mode [ 932.829082][ T154] device veth0_vlan left promiscuous mode [ 932.996384][ T154] team0 (unregistering): Port device team_slave_1 removed [ 933.014712][ T154] team0 (unregistering): Port device team_slave_0 removed [ 933.030582][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 933.044146][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 933.117738][ T154] bond0 (unregistering): Released all slaves [ 934.172545][T27039] chnl_net:caif_netlink_parms(): no params data found [ 934.316620][T27039] bridge0: port 1(bridge_slave_0) entered blocking state [ 934.325102][T27039] bridge0: port 1(bridge_slave_0) entered disabled state [ 934.334466][T27039] device bridge_slave_0 entered promiscuous mode [ 934.352054][T27039] bridge0: port 2(bridge_slave_1) entered blocking state [ 934.360720][T27039] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.369510][T27039] device bridge_slave_1 entered promiscuous mode [ 934.425381][T27039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 934.463586][T27039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 934.493750][ T3874] Bluetooth: hci5: command 0x0419 tx timeout [ 934.531679][T27039] team0: Port device team_slave_0 added [ 934.540574][T27039] team0: Port device team_slave_1 added [ 934.585873][T27039] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 934.597229][T27039] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 934.634892][T27039] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 934.654409][T27039] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 934.661383][T27039] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 934.697921][T27039] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 934.773592][T27039] device hsr_slave_0 entered promiscuous mode [ 934.799982][T27039] device hsr_slave_1 entered promiscuous mode [ 934.807534][T27039] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 934.825146][T27039] Cannot create hsr debugfs directory [ 935.379729][T27039] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 935.396714][T27039] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 935.412572][T27039] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 935.429571][T27039] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 935.511113][T27039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 935.527373][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 935.536178][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 935.549001][T27039] 8021q: adding VLAN 0 to HW filter on device team0 [ 935.564454][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 935.574143][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.583378][T20627] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.590457][T20627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.613077][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 935.621255][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 935.631479][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.640357][T20627] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.647491][T20627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.657485][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 935.667164][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 935.676585][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 935.686931][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 935.709172][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 935.717953][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 935.727479][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 935.736617][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 935.753294][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 935.761917][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 935.777383][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 935.793629][T27039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 935.900870][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 935.917261][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 935.930862][T27039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 935.956359][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 935.965879][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 935.994253][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 936.009961][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 936.013093][ T6872] Bluetooth: hci0: command 0x0409 tx timeout [ 936.041669][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 936.049985][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 936.068506][T27039] device veth0_vlan entered promiscuous mode [ 936.082559][T27039] device veth1_vlan entered promiscuous mode [ 936.121847][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 936.134724][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 936.149043][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 936.160884][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 936.173056][T27039] device veth0_macvtap entered promiscuous mode [ 936.186461][T27039] device veth1_macvtap entered promiscuous mode [ 936.205489][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 936.216264][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.228493][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 936.239470][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.249622][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 936.261881][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.272125][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 936.284479][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.294804][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 936.305610][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.318304][T27039] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 936.328012][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 936.346902][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 936.372080][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 936.381479][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 936.394605][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 936.406370][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.420412][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 936.431971][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.442571][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 936.453635][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.465038][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 936.475781][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.486009][T27039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 936.497012][T27039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.508608][T27039] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 936.518080][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 936.529033][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 936.549656][T27039] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.566610][T27039] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.582825][T27039] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.591562][T27039] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.690189][T16110] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 936.700006][T16110] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 936.729868][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 936.749097][T16110] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 936.761099][T16110] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 936.780031][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:52:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x2000, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xd000000}) 14:52:53 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20000006, 0xb00300}) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x2, 0x4, 0x5}}, 0x14) 14:52:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x4000, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x4100, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20000006, 0xb00300}) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x2, 0x4, 0x5}}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20000006, 0xb00300}) (async) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x2, 0x4, 0x5}}, 0x14) (async) 14:52:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xe000000}) 14:52:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2100, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x2500, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x47ff, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2401, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xf000000}) 14:52:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x3e00, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x4800, 0x0, 0x20040006, 0xb00300}) 14:52:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20000006, 0xb00300}) (async, rerun: 64) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x2, 0x4, 0x5}}, 0x14) (rerun: 64) 14:52:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x3f00, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2500, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x4fff, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x10000000}) 14:52:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x4000, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x5000, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2503, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x11000000}) 14:52:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x5800, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) pwritev2(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="c4f35ec3fe3200272836cc9d9d2e80096ec1b01a976110be7eeaff1d4691645abf7e1ead4c61de9d4a395e5815547322434d8577ff44bd", 0x37}, {&(0x7f00000003c0)="98fe37ad921ccece1d7058864c2b42116b43c656553f0816e9bdefdab078dc357afe919ae384d6f2a281a936f000642cb435797e3c528c1c9906943a7896a4fda8a299fea2f03d04ed5083f74f0d5e9a3c3aeeefa0c4a222147ddc7f779c", 0x5e}, {&(0x7f0000000440)="4b7bfcfde05fe158e1f83c09e5121086c47a110a44b9512b132d293ea63415242fbbaee0e0dd65e68052fe17", 0x2c}, {&(0x7f0000000480)="a7f190210259fd7417562f74f46ff2c655ada1370f35429b9b5a938f74ff217c17e6d5630662e3556cf27a501f233b4f647f324ede6fab00eb217c073a10dec26b2c6ef4181255c8937d04172ee0d4abe38cba2ac6bf9484be56b5b0d352965ef22c0b1a", 0x64}, {&(0x7f0000000500)="a0470239ee096ff33ecb630fb63ffd4866fdfe85c01daf50c3695a1665aba19d8a48059b6c66a9d372a0241a8f30575611568bf7940b6497b70bba81efaa9ecc4426b62311c23f6d518fbd608c93cd9bd14957e76d58437d7942b57dece32d4e0b963b916e3f3489ec37bd48a93b86a19e1757331341bb1120c14ad4097c90af5001d14147de9657ee1136b54a4c86a5d9052ffc94ef1d6f620217ba5d7913a9fbb87ac07776aa0d5b943687ccefe4d0283940a2add6e13cd7b9a29d47c13e9f0274d769e549469c435aa956be81a73052685f9faa014e6848365ad9ed4c702e454c060fb467e1bf5b7943b6cb7e08f9b7eb", 0xf2}], 0x5, 0x10001, 0xa67, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) syz_clone3(&(0x7f0000000240)={0x108000480, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0xc}, &(0x7f0000000140)=""/128, 0x80, &(0x7f00000001c0)=""/57, &(0x7f0000000200)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000006c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x68, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9, 0x75}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xffff8000}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008080}, 0x20008010) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000340)=0x2) pwritev2(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="eaa2fc9cc62003bccabb4b6ff7e660c9705587aec8", 0x15}], 0x1, 0x80, 0x10001, 0xa) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80582, 0x0) 14:52:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x4100, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2d01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x5c00, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x12000000}) 14:52:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x8102, 0x0, 0x20040006, 0xb00300}) [ 938.102981][T20627] Bluetooth: hci0: command 0x041b tx timeout 14:52:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x5c00, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2e00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x18000000}) 14:52:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x8200, 0x0, 0x20040006, 0xb00300}) 14:52:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) pwritev2(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="c4f35ec3fe3200272836cc9d9d2e80096ec1b01a976110be7eeaff1d4691645abf7e1ead4c61de9d4a395e5815547322434d8577ff44bd", 0x37}, {&(0x7f00000003c0)="98fe37ad921ccece1d7058864c2b42116b43c656553f0816e9bdefdab078dc357afe919ae384d6f2a281a936f000642cb435797e3c528c1c9906943a7896a4fda8a299fea2f03d04ed5083f74f0d5e9a3c3aeeefa0c4a222147ddc7f779c", 0x5e}, {&(0x7f0000000440)="4b7bfcfde05fe158e1f83c09e5121086c47a110a44b9512b132d293ea63415242fbbaee0e0dd65e68052fe17", 0x2c}, {&(0x7f0000000480)="a7f190210259fd7417562f74f46ff2c655ada1370f35429b9b5a938f74ff217c17e6d5630662e3556cf27a501f233b4f647f324ede6fab00eb217c073a10dec26b2c6ef4181255c8937d04172ee0d4abe38cba2ac6bf9484be56b5b0d352965ef22c0b1a", 0x64}, {&(0x7f0000000500)="a0470239ee096ff33ecb630fb63ffd4866fdfe85c01daf50c3695a1665aba19d8a48059b6c66a9d372a0241a8f30575611568bf7940b6497b70bba81efaa9ecc4426b62311c23f6d518fbd608c93cd9bd14957e76d58437d7942b57dece32d4e0b963b916e3f3489ec37bd48a93b86a19e1757331341bb1120c14ad4097c90af5001d14147de9657ee1136b54a4c86a5d9052ffc94ef1d6f620217ba5d7913a9fbb87ac07776aa0d5b943687ccefe4d0283940a2add6e13cd7b9a29d47c13e9f0274d769e549469c435aa956be81a73052685f9faa014e6848365ad9ed4c702e454c060fb467e1bf5b7943b6cb7e08f9b7eb", 0xf2}], 0x5, 0x10001, 0xa67, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) syz_clone3(&(0x7f0000000240)={0x108000480, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0xc}, &(0x7f0000000140)=""/128, 0x80, &(0x7f00000001c0)=""/57, &(0x7f0000000200)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000006c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x68, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9, 0x75}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xffff8000}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008080}, 0x20008010) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000340)=0x2) pwritev2(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="eaa2fc9cc62003bccabb4b6ff7e660c9705587aec8", 0x15}], 0x1, 0x80, 0x10001, 0xa) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80582, 0x0) 14:52:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:55 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x5e00, 0x0, 0x20040006, 0xb00300}) 14:52:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x8500, 0x0, 0x20040006, 0xb00300}) 14:52:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x2f00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x20000000}) [ 938.251780][T27263] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 14:52:55 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x5f00, 0x0, 0x20040006, 0xb00300}) 14:52:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x8700, 0x0, 0x20040006, 0xb00300}) 14:52:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3201, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x87ff, 0x0, 0x20040006, 0xb00300}) 14:52:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) pwritev2(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="c4f35ec3fe3200272836cc9d9d2e80096ec1b01a976110be7eeaff1d4691645abf7e1ead4c61de9d4a395e5815547322434d8577ff44bd", 0x37}, {&(0x7f00000003c0)="98fe37ad921ccece1d7058864c2b42116b43c656553f0816e9bdefdab078dc357afe919ae384d6f2a281a936f000642cb435797e3c528c1c9906943a7896a4fda8a299fea2f03d04ed5083f74f0d5e9a3c3aeeefa0c4a222147ddc7f779c", 0x5e}, {&(0x7f0000000440)="4b7bfcfde05fe158e1f83c09e5121086c47a110a44b9512b132d293ea63415242fbbaee0e0dd65e68052fe17", 0x2c}, {&(0x7f0000000480)="a7f190210259fd7417562f74f46ff2c655ada1370f35429b9b5a938f74ff217c17e6d5630662e3556cf27a501f233b4f647f324ede6fab00eb217c073a10dec26b2c6ef4181255c8937d04172ee0d4abe38cba2ac6bf9484be56b5b0d352965ef22c0b1a", 0x64}, {&(0x7f0000000500)="a0470239ee096ff33ecb630fb63ffd4866fdfe85c01daf50c3695a1665aba19d8a48059b6c66a9d372a0241a8f30575611568bf7940b6497b70bba81efaa9ecc4426b62311c23f6d518fbd608c93cd9bd14957e76d58437d7942b57dece32d4e0b963b916e3f3489ec37bd48a93b86a19e1757331341bb1120c14ad4097c90af5001d14147de9657ee1136b54a4c86a5d9052ffc94ef1d6f620217ba5d7913a9fbb87ac07776aa0d5b943687ccefe4d0283940a2add6e13cd7b9a29d47c13e9f0274d769e549469c435aa956be81a73052685f9faa014e6848365ad9ed4c702e454c060fb467e1bf5b7943b6cb7e08f9b7eb", 0xf2}], 0x5, 0x10001, 0xa67, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) syz_clone3(&(0x7f0000000240)={0x108000480, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0xc}, &(0x7f0000000140)=""/128, 0x80, &(0x7f00000001c0)=""/57, &(0x7f0000000200)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000006c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x68, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9, 0x75}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xffff8000}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008080}, 0x20008010) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000340)=0x2) pwritev2(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="eaa2fc9cc62003bccabb4b6ff7e660c9705587aec8", 0x15}], 0x1, 0x80, 0x10001, 0xa) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80582, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) pwritev2(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="c4f35ec3fe3200272836cc9d9d2e80096ec1b01a976110be7eeaff1d4691645abf7e1ead4c61de9d4a395e5815547322434d8577ff44bd", 0x37}, {&(0x7f00000003c0)="98fe37ad921ccece1d7058864c2b42116b43c656553f0816e9bdefdab078dc357afe919ae384d6f2a281a936f000642cb435797e3c528c1c9906943a7896a4fda8a299fea2f03d04ed5083f74f0d5e9a3c3aeeefa0c4a222147ddc7f779c", 0x5e}, {&(0x7f0000000440)="4b7bfcfde05fe158e1f83c09e5121086c47a110a44b9512b132d293ea63415242fbbaee0e0dd65e68052fe17", 0x2c}, {&(0x7f0000000480)="a7f190210259fd7417562f74f46ff2c655ada1370f35429b9b5a938f74ff217c17e6d5630662e3556cf27a501f233b4f647f324ede6fab00eb217c073a10dec26b2c6ef4181255c8937d04172ee0d4abe38cba2ac6bf9484be56b5b0d352965ef22c0b1a", 0x64}, {&(0x7f0000000500)="a0470239ee096ff33ecb630fb63ffd4866fdfe85c01daf50c3695a1665aba19d8a48059b6c66a9d372a0241a8f30575611568bf7940b6497b70bba81efaa9ecc4426b62311c23f6d518fbd608c93cd9bd14957e76d58437d7942b57dece32d4e0b963b916e3f3489ec37bd48a93b86a19e1757331341bb1120c14ad4097c90af5001d14147de9657ee1136b54a4c86a5d9052ffc94ef1d6f620217ba5d7913a9fbb87ac07776aa0d5b943687ccefe4d0283940a2add6e13cd7b9a29d47c13e9f0274d769e549469c435aa956be81a73052685f9faa014e6848365ad9ed4c702e454c060fb467e1bf5b7943b6cb7e08f9b7eb", 0xf2}], 0x5, 0x10001, 0xa67, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) syz_clone3(&(0x7f0000000240)={0x108000480, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0xc}, &(0x7f0000000140)=""/128, 0x80, &(0x7f00000001c0)=""/57, &(0x7f0000000200)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000006c0)={'wlan0\x00'}) (async) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x68, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9, 0x75}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xffff8000}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008080}, 0x20008010) (async) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000340)=0x2) (async) pwritev2(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="eaa2fc9cc62003bccabb4b6ff7e660c9705587aec8", 0x15}], 0x1, 0x80, 0x10001, 0xa) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80582, 0x0) (async) 14:52:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x25000000}) 14:52:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x6e00, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3601, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x8800, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x7500, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x399a0300}) 14:52:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3801, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x8fff, 0x0, 0x20040006, 0xb00300}) [ 938.958345][T27310] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3802, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x7504, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x9100, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x97ff, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x39a20300}) 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10200, 0x100) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x5, 0xb00300}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x1, 0x224102) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x40, 0x18) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x311, 0x6}) tee(0xffffffffffffffff, r1, 0x1, 0xb) 14:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x7600, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x9fff, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10200, 0x100) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) (rerun: 64) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x5, 0xb00300}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x1, 0x224102) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) (async) openat(r0, &(0x7f0000000100)='./file0\x00', 0x40, 0x18) (async) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x311, 0x6}) (async) tee(0xffffffffffffffff, r1, 0x1, 0xb) 14:52:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3a00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xa3a4, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x7f00, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xa4a3, 0x0, 0x20040006, 0xb00300}) [ 939.525002][T27352] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 940.172854][T20627] Bluetooth: hci0: command 0x040f tx timeout 14:52:56 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10200, 0x100) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) (async) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) (async) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x5, 0xb00300}) (async) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x1, 0x224102) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) (async) openat(r0, &(0x7f0000000100)='./file0\x00', 0x40, 0x18) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x311, 0x6}) (async) tee(0xffffffffffffffff, r1, 0x1, 0xb) 14:52:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x3f000000}) 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x7f04, 0x0, 0x20040006, 0xb00300}) 14:52:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3c02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:52:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xa7ff, 0x0, 0x20040006, 0xb00300}) 14:52:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10010, r0, 0x8fc5c000) 14:52:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f00000034c0)) 14:52:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x3f00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8102, 0x0, 0x20040006, 0xb00300}) 14:52:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xafff, 0x0, 0x20040006, 0xb00300}) 14:52:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x40000000}) 14:52:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f00000034c0)) 14:52:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10010, r0, 0x8fc5c000) 14:52:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xb7ff, 0x0, 0x20040006, 0xb00300}) 14:52:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f00000034c0)) 14:52:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x41000000}) 14:52:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10010, r0, 0x8fc5c000) (async) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10010, r0, 0x8fc5c000) 14:52:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4000, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:52:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xbfff, 0x0, 0x20040006, 0xb00300}) 14:52:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, 0x0) [ 941.569154][T16236] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.621877][T16236] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.709977][T16236] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.799584][T16236] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 942.703903][T16236] device hsr_slave_0 left promiscuous mode [ 942.711375][T16236] device hsr_slave_1 left promiscuous mode [ 942.724802][T16236] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 942.732286][T16236] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 942.747699][T16236] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 942.760881][T16236] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 942.772673][T16236] device bridge_slave_1 left promiscuous mode [ 942.779203][T16236] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.788817][T16236] device bridge_slave_0 left promiscuous mode [ 942.795219][T16236] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.808888][T16236] device veth1_macvtap left promiscuous mode [ 942.815901][T16236] device veth0_macvtap left promiscuous mode [ 942.821990][T16236] device veth1_vlan left promiscuous mode [ 942.828341][T16236] device veth0_vlan left promiscuous mode [ 942.989902][T16236] team0 (unregistering): Port device team_slave_1 removed [ 943.007843][T16236] team0 (unregistering): Port device team_slave_0 removed [ 943.020950][T16236] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 943.036914][T16236] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 943.106733][T16236] bond0 (unregistering): Released all slaves [ 943.963764][T27524] chnl_net:caif_netlink_parms(): no params data found [ 944.071692][T27524] bridge0: port 1(bridge_slave_0) entered blocking state [ 944.090010][T27524] bridge0: port 1(bridge_slave_0) entered disabled state [ 944.105898][T27524] device bridge_slave_0 entered promiscuous mode [ 944.124778][T27524] bridge0: port 2(bridge_slave_1) entered blocking state [ 944.131940][T27524] bridge0: port 2(bridge_slave_1) entered disabled state [ 944.140762][T27524] device bridge_slave_1 entered promiscuous mode [ 944.212123][T27524] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 944.239064][T27524] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 944.319440][T27524] team0: Port device team_slave_0 added [ 944.347771][T27524] team0: Port device team_slave_1 added [ 944.408747][T27524] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 944.422719][T27524] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 944.462799][T27524] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 944.485814][T27524] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 944.500364][T27524] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 944.535822][T27524] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 944.630475][T27524] device hsr_slave_0 entered promiscuous mode [ 944.639084][T27524] device hsr_slave_1 entered promiscuous mode [ 944.654988][T27524] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 944.670763][T27524] Cannot create hsr debugfs directory [ 945.192242][T27524] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 945.206882][T27524] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 945.217286][T27524] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 945.234390][T27524] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 945.322959][T27524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 945.339351][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 945.355429][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 945.373630][T27524] 8021q: adding VLAN 0 to HW filter on device team0 [ 945.394939][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 945.411489][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 945.420603][T20635] bridge0: port 1(bridge_slave_0) entered blocking state [ 945.427747][T20635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 945.460839][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 945.469296][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 945.487345][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 945.497921][T20635] bridge0: port 2(bridge_slave_1) entered blocking state [ 945.505020][T20635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 945.513141][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 945.521772][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 945.543632][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 945.553887][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 945.562506][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 945.580167][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 945.590148][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 945.604621][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 945.625458][T27524] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 945.645339][T27524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 945.660595][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 945.669504][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 945.686597][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 945.772871][ T6880] Bluetooth: hci0: command 0x0409 tx timeout [ 945.832122][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 945.846950][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 945.860825][T27524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 945.886360][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 945.896366][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 945.921203][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 945.936927][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 945.951214][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 945.963100][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 945.972727][T27524] device veth0_vlan entered promiscuous mode [ 945.988381][T27524] device veth1_vlan entered promiscuous mode [ 946.020386][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 946.035898][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 946.047852][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 946.060537][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 946.075456][T27524] device veth0_macvtap entered promiscuous mode [ 946.093034][T27524] device veth1_macvtap entered promiscuous mode [ 946.112547][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 946.125005][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.135340][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 946.146538][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.156735][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 946.167565][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.177873][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 946.189439][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.199567][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 946.211265][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.229839][T27524] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 946.240403][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 946.257078][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 946.265791][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 946.274736][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 946.289424][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 946.301155][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.311254][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 946.323348][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.333872][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 946.344946][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.355230][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 946.366042][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.376280][T27524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 946.387138][T27524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 946.401883][T27524] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 946.419187][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 946.431545][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 946.450698][T27524] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.460128][T27524] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.469149][T27524] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.478412][T27524] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.570044][T16111] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 946.590087][T16111] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 946.610837][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 946.636442][T16111] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 946.648115][T16111] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 946.662580][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:53:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8200, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xc7ff, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x45f30100}) 14:53:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, 0x0) 14:53:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4001, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES8=r1, @ANYBLOB="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"]}) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000400)) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x800}}, './file0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x20040006, 0xb00300}) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r6, 0x4140, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000000c0)={@remote, @local}, &(0x7f0000000100)=0xc) ioctl$SNDRV_PCM_IOCTL_UNLINK(r6, 0x4161, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r10 = dup3(0xffffffffffffffff, r9, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r8, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000400)=r11) epoll_ctl$EPOLL_CTL_MOD(r10, 0x3, r6, &(0x7f0000000140)={0x8}) 14:53:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xcfff, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, 0x0) 14:53:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4100, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x5c000000}) 14:53:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES8=r1, @ANYBLOB="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"]}) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000400)) (async) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x800}}, './file0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x20040006, 0xb00300}) (async) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r6, 0x4140, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000000c0)={@remote, @local}, &(0x7f0000000100)=0xc) ioctl$SNDRV_PCM_IOCTL_UNLINK(r6, 0x4161, 0x0) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r10 = dup3(0xffffffffffffffff, r9, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r8, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000400)=r11) (async) epoll_ctl$EPOLL_CTL_MOD(r10, 0x3, r6, &(0x7f0000000140)={0x8}) 14:53:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8300, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x40000000}) 14:53:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xd7ff, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8400, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4202, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x7aa50300}) 14:53:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x2040000}) 14:53:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES8=r1, @ANYBLOB="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"]}) (async) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000400)) (async, rerun: 32) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x800}}, './file0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x20040006, 0xb00300}) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r6, 0x4140, 0x0) (async, rerun: 64) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000000c0)={@remote, @local}, &(0x7f0000000100)=0xc) (async, rerun: 64) ioctl$SNDRV_PCM_IOCTL_UNLINK(r6, 0x4161, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r10 = dup3(0xffffffffffffffff, r9, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r8, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000400)=r11) epoll_ctl$EPOLL_CTL_MOD(r10, 0x3, r6, &(0x7f0000000140)={0x8}) 14:53:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xdfff, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8700, 0x0, 0x20040006, 0xb00300}) 14:53:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xe7ff, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4501, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x7ea50300}) 14:53:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x438182, 0x0) sendmsg$NFT_MSG_GETSET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0xa, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_SET_EXPRESSIONS={0x54, 0x12, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @cmp={{0x8}, @void}}, {0x34, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @bitwise={{0xc}, @void}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x8004) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) r2 = memfd_secret(0x80000) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x44, 0x20, 0x400, 0x70bd2a, 0x25dfdbfc, {0xa, 0x0, 0x14, 0xff, 0xfb, 0x0, 0x0, 0x2, 0x10}, [@FRA_SRC={0x14, 0x2, @private1}, @FRA_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48884) 14:53:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x2040000}) 14:53:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xefff, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x8800, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x2040000}) 14:53:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x81020000}) 14:53:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4600, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x438182, 0x0) sendmsg$NFT_MSG_GETSET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0xa, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_SET_EXPRESSIONS={0x54, 0x12, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @cmp={{0x8}, @void}}, {0x34, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @bitwise={{0xc}, @void}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x8004) (async) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) (async) r2 = memfd_secret(0x80000) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x44, 0x20, 0x400, 0x70bd2a, 0x25dfdbfc, {0xa, 0x0, 0x14, 0xff, 0xfb, 0x0, 0x0, 0x2, 0x10}, [@FRA_SRC={0x14, 0x2, @private1}, @FRA_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48884) 14:53:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xf7ff, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x9100, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4700, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x438182, 0x0) sendmsg$NFT_MSG_GETSET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0xa, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_SET_EXPRESSIONS={0x54, 0x12, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @cmp={{0x8}, @void}}, {0x34, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @bitwise={{0xc}, @void}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x8004) (async) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) (async) r2 = memfd_secret(0x80000) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_newrule={0x44, 0x20, 0x400, 0x70bd2a, 0x25dfdbfc, {0xa, 0x0, 0x14, 0xff, 0xfb, 0x0, 0x0, 0x2, 0x10}, [@FRA_SRC={0x14, 0x2, @private1}, @FRA_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48884) 14:53:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x82000000}) 14:53:04 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xf8, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff01, 0x0, 0x20040006, 0xb00300}) [ 947.853266][ T6880] Bluetooth: hci0: command 0x041b tx timeout 14:53:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xcb06, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4788, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff07, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x9}) 14:53:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0xc00, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x83000000}) 14:53:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xcb08, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff0f, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x84000000}) 14:53:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x9}) 14:53:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff17, 0x0, 0x20040006, 0xb00300}) 14:53:04 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x9c, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xccfa, 0x0, 0x20040006, 0xb00300}) [ 948.391273][T16182] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 948.494693][T16182] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 948.629774][T16182] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 948.730240][T16182] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 949.671513][T16182] device hsr_slave_0 left promiscuous mode [ 949.678279][T16182] device hsr_slave_1 left promiscuous mode [ 949.687428][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 949.695240][T16182] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 949.705370][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 949.713612][T16182] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 949.729440][T16182] device bridge_slave_1 left promiscuous mode [ 949.735799][T16182] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.744974][T16182] device bridge_slave_0 left promiscuous mode [ 949.751197][T16182] bridge0: port 1(bridge_slave_0) entered disabled state [ 949.765129][T16182] device veth1_macvtap left promiscuous mode [ 949.771251][T16182] device veth0_macvtap left promiscuous mode [ 949.779166][T16182] device veth1_vlan left promiscuous mode [ 949.785866][T16182] device veth0_vlan left promiscuous mode [ 949.936569][ T6880] Bluetooth: hci0: command 0x040f tx timeout [ 949.989171][T16182] team0 (unregistering): Port device team_slave_1 removed [ 950.007052][T16182] team0 (unregistering): Port device team_slave_0 removed [ 950.020321][T16182] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 950.035961][T16182] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 950.104852][T16182] bond0 (unregistering): Released all slaves [ 951.041362][T27832] chnl_net:caif_netlink_parms(): no params data found [ 951.172136][T27832] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.188448][T27832] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.199332][T27832] device bridge_slave_0 entered promiscuous mode [ 951.247784][T27832] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.262291][T27832] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.278328][T27832] device bridge_slave_1 entered promiscuous mode [ 951.370805][T27832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 951.407555][T27832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 951.457968][T27832] team0: Port device team_slave_0 added [ 951.484889][T27832] team0: Port device team_slave_1 added [ 951.529315][T27832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 951.551332][T27832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 951.594409][T27832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 951.614622][T27832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 951.623219][T27832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 951.650881][T27832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 951.710187][T27832] device hsr_slave_0 entered promiscuous mode [ 951.719294][T27832] device hsr_slave_1 entered promiscuous mode [ 951.733612][T27832] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 951.741280][T27832] Cannot create hsr debugfs directory [ 952.012898][ T3249] Bluetooth: hci0: command 0x0419 tx timeout [ 952.311066][T27832] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 952.327733][T27832] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 952.341209][T27832] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 952.353732][T27832] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 952.473832][T27832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 952.495778][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 952.510832][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 952.522367][T27832] 8021q: adding VLAN 0 to HW filter on device team0 [ 952.542395][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 952.554278][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 952.569015][T20635] bridge0: port 1(bridge_slave_0) entered blocking state [ 952.576239][T20635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 952.603372][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 952.611482][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 952.620986][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 952.629859][T20635] bridge0: port 2(bridge_slave_1) entered blocking state [ 952.636988][T20635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 952.646611][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 952.655703][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 952.674605][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 952.685032][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 952.694086][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 952.703273][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 952.711986][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 952.721598][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 952.738067][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 952.754829][T27832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 952.768791][T27832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 952.779586][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 952.788597][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 952.812894][ T3874] Bluetooth: hci3: command 0x0409 tx timeout [ 952.903063][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 952.910621][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 952.924059][T27832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 953.081820][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 953.091797][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 953.117636][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 953.126863][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 953.147532][T27832] device veth0_vlan entered promiscuous mode [ 953.164754][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 953.180640][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 953.201147][T27832] device veth1_vlan entered promiscuous mode [ 953.245795][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 953.256107][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 953.264606][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 953.273454][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 953.285370][T27832] device veth0_macvtap entered promiscuous mode [ 953.305055][T27832] device veth1_macvtap entered promiscuous mode [ 953.331704][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 953.349366][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.370284][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 953.384152][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.401648][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 953.419659][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.429964][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 953.447292][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.463881][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 953.481086][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.494465][T27832] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 953.511458][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 953.520902][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 953.539369][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 953.555789][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.570755][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 953.584985][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.600376][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 953.613449][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.630466][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 953.641377][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.651836][T27832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 953.662710][T27832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 953.679668][T27832] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 953.690020][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 953.712453][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 953.726023][T27832] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 953.740226][T27832] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 953.749777][T27832] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 953.758876][T27832] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 953.843217][T16182] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 953.851559][T16182] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 953.861049][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 953.877977][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 953.891808][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 953.917662][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 14:53:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4800, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff1f, 0x0, 0x20040006, 0xb00300}) 14:53:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xde03, 0x0, 0x20040006, 0xb00300}) 14:53:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x9}) 14:53:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x85000000}) 14:53:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0xa00, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff27, 0x0, 0x20040006, 0xb00300}) 14:53:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xde05, 0x0, 0x20040006, 0xb00300}) 14:53:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r2 = dup(r0) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x80, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$kcm(0x29, 0x0, 0x0) getsockopt$sock_buf(r5, 0x1, 0x1f, &(0x7f0000000440)=""/209, &(0x7f0000000380)=0xd1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r8 = dup3(0xffffffffffffffff, r7, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r6, @ANYBLOB="000100400000000a000000054b03002c00670000d2299078e00002020210e1413f5d38752c7b8d4f36a266f800"/56]}) ioctl$TUNSETIFINDEX(r8, 0x400454da, &(0x7f0000000400)=r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x17, &(0x7f00000000c0)=@raw=[@cb_func, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x2, 0x2, 0x4, 0xc964, 0x6b11}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r2}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xd, 0x3, 0x100}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000240)=[r0, r1, r1], &(0x7f0000000280)=[{0x2, 0x2, 0xb, 0xb}, {0x2, 0x2, 0xa, 0x3}, {0x1, 0x2, 0x3, 0x2}, {0x2, 0x3, 0xf, 0x1}], 0x10, 0x7}, 0x90) 14:53:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x88000000}) 14:53:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4888, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff2f, 0x0, 0x20040006, 0xb00300}) 14:53:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xf800, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) (async) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r2 = dup(r0) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x80, 0x1) (async) r3 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x80, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) (async) r5 = socket$kcm(0x29, 0x0, 0x0) getsockopt$sock_buf(r5, 0x1, 0x1f, &(0x7f0000000440)=""/209, &(0x7f0000000380)=0xd1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r8 = dup3(0xffffffffffffffff, r7, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r6, @ANYBLOB="000100400000000a000000054b03002c00670000d2299078e00002020210e1413f5d38752c7b8d4f36a266f800"/56]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r6, @ANYBLOB="000100400000000a000000054b03002c00670000d2299078e00002020210e1413f5d38752c7b8d4f36a266f800"/56]}) ioctl$TUNSETIFINDEX(r8, 0x400454da, &(0x7f0000000400)=r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x17, &(0x7f00000000c0)=@raw=[@cb_func, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x2, 0x2, 0x4, 0xc964, 0x6b11}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r2}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xd, 0x3, 0x100}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000240)=[r0, r1, r1], &(0x7f0000000280)=[{0x2, 0x2, 0xb, 0xb}, {0x2, 0x2, 0xa, 0x3}, {0x1, 0x2, 0x3, 0x2}, {0x2, 0x3, 0xf, 0x1}], 0x10, 0x7}, 0x90) 14:53:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x91000000}) 14:53:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x25, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff37, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4a00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xfacc, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff3f, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xb69e0000}) 14:53:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4c00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:11 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r2 = dup(r0) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x80, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$kcm(0x29, 0x0, 0x0) getsockopt$sock_buf(r5, 0x1, 0x1f, &(0x7f0000000440)=""/209, &(0x7f0000000380)=0xd1) (async) getsockopt$sock_buf(r5, 0x1, 0x1f, &(0x7f0000000440)=""/209, &(0x7f0000000380)=0xd1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r8 = dup3(0xffffffffffffffff, r7, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r6, @ANYBLOB="000100400000000a000000054b03002c00670000d2299078e00002020210e1413f5d38752c7b8d4f36a266f800"/56]}) ioctl$TUNSETIFINDEX(r8, 0x400454da, &(0x7f0000000400)=r9) (async) ioctl$TUNSETIFINDEX(r8, 0x400454da, &(0x7f0000000400)=r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x17, &(0x7f00000000c0)=@raw=[@cb_func, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x2, 0x2, 0x4, 0xc964, 0x6b11}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r2}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xd, 0x3, 0x100}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000240)=[r0, r1, r1], &(0x7f0000000280)=[{0x2, 0x2, 0xb, 0xb}, {0x2, 0x2, 0xa, 0x3}, {0x1, 0x2, 0x3, 0x2}, {0x2, 0x3, 0xf, 0x1}], 0x10, 0x7}, 0x90) 14:53:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xff01, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 3: dup(0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff47, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xff07, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = userfaultfd(0x100801) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000080)={0x0, 0x10, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0]}) 14:53:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x4f01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xba8c0000}) 14:53:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x8, 0x0, 0x0, 0x20040006, 0xb00300}) [ 954.893226][ T3249] Bluetooth: hci3: command 0x041b tx timeout 14:53:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff4f, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xff08, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff7f, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x5002, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xbb0c0000}) 14:53:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x5, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r1 = userfaultfd(0x100801) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000080)={0x0, 0x10, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0]}) 14:53:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0xff0f, 0x0, 0x20040006, 0xb00300}) 14:53:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x5400, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x2, 0x20040006, 0xb00300}) 14:53:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xf4ffffff}) 14:53:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r1 = userfaultfd(0x100801) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000080)={0x0, 0x10, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0]}) 14:53:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x5c}) [ 955.549173][T17020] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:53:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x3, 0x20040006, 0xb00300}) [ 955.649903][T17020] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 955.805038][T17020] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 955.899652][T17020] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 956.778396][T17020] device hsr_slave_0 left promiscuous mode [ 956.794138][T17020] device hsr_slave_1 left promiscuous mode [ 956.804369][T17020] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 956.822233][T17020] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 956.836017][T17020] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 956.844531][T17020] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 956.854283][T17020] device bridge_slave_1 left promiscuous mode [ 956.860642][T17020] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.870925][T17020] device bridge_slave_0 left promiscuous mode [ 956.877477][T17020] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.892079][T17020] device veth1_macvtap left promiscuous mode [ 956.899279][T17020] device veth0_macvtap left promiscuous mode [ 956.905941][T17020] device veth1_vlan left promiscuous mode [ 956.913269][T17020] device veth0_vlan left promiscuous mode [ 956.972829][ T6877] Bluetooth: hci3: command 0x040f tx timeout [ 957.087020][T17020] team0 (unregistering): Port device team_slave_1 removed [ 957.100859][T17020] team0 (unregistering): Port device team_slave_0 removed [ 957.114753][T17020] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 957.131165][T17020] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 957.194632][T17020] bond0 (unregistering): Released all slaves [ 958.412351][T28161] chnl_net:caif_netlink_parms(): no params data found [ 958.529651][T28161] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.536987][T28161] bridge0: port 1(bridge_slave_0) entered disabled state [ 958.549520][T28161] device bridge_slave_0 entered promiscuous mode [ 958.560567][T28161] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.572398][T28161] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.586701][T28161] device bridge_slave_1 entered promiscuous mode [ 958.670106][T28161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 958.693495][T28161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 958.738781][T28161] team0: Port device team_slave_0 added [ 958.754479][T28161] team0: Port device team_slave_1 added [ 958.793740][T28161] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 958.800818][T28161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 958.833807][T28161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 958.853136][T28161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 958.860191][T28161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 958.889308][T28161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 958.980599][T28161] device hsr_slave_0 entered promiscuous mode [ 959.003356][T28161] device hsr_slave_1 entered promiscuous mode [ 959.014568][T28161] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 959.022157][T28161] Cannot create hsr debugfs directory [ 959.052927][ T6877] Bluetooth: hci3: command 0x0419 tx timeout [ 959.600267][T28161] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 959.614756][T28161] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 959.624388][T28161] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 959.634660][T28161] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 959.718418][T28161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 959.741539][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 959.756749][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 959.777305][T28161] 8021q: adding VLAN 0 to HW filter on device team0 [ 959.792373][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 959.811115][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 959.821330][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 959.828475][ T6877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 959.853325][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 959.861452][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 959.871156][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 959.880526][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 959.887670][ T6877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 959.895936][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 959.904980][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 959.929678][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 959.950148][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 959.959395][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 959.975382][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 959.995291][T28161] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 960.015919][T28161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 960.039459][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 960.053886][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 960.062543][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 960.072105][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 960.081232][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 960.094588][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 960.218237][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 960.226025][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 960.241807][T28161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 960.259982][ T6880] Bluetooth: hci5: command 0x0409 tx timeout [ 960.382373][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 960.391417][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 960.425049][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 960.434436][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 960.446294][T28161] device veth0_vlan entered promiscuous mode [ 960.455538][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 960.464095][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 960.477226][T28161] device veth1_vlan entered promiscuous mode [ 960.518744][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 960.535482][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 960.548727][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 960.561014][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 960.576757][T28161] device veth0_macvtap entered promiscuous mode [ 960.594164][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 960.614059][T28161] device veth1_macvtap entered promiscuous mode [ 960.641247][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 960.661815][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.672273][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 960.689605][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.699972][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 960.719768][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.743140][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 960.761372][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.771840][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 960.789403][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.801414][T28161] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 960.819377][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 960.829067][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 960.843703][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 960.854360][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.864714][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 960.875597][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.885811][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 960.900824][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.917368][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 960.929300][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.948520][T28161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 960.962297][T28161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 960.983910][T28161] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 960.991970][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 961.002439][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 961.016633][T28161] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.025826][T28161] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.034968][T28161] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.044809][T28161] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.127490][T16111] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 961.161688][T17020] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 961.161995][T16111] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 961.183797][T17020] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 961.188136][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 961.205045][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:53:17 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff87, 0x0, 0x20040006, 0xb00300}) 14:53:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfb8f0000}) 14:53:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x12}) 14:53:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x5701, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x4, 0x20040006, 0xb00300}) 14:53:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x9, 0x9, {{0x7, 0x4, 0x0, 0x6, 0x1c, 0x401, 0x0, 0x3f, 0x4, 0x0, @multicast1, @broadcast, {[@end, @lsrr={0x83, 0x7, 0x52, [@multicast2]}]}}}}}) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{0x240, 0x2, 0x5850, 0x1}, 'syz0\x00', 0x9}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfbffffff}) 14:53:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5, 0x20040006, 0xb00300}) 14:53:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x12}) 14:53:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x9, 0x9, {{0x7, 0x4, 0x0, 0x6, 0x1c, 0x401, 0x0, 0x3f, 0x4, 0x0, @multicast1, @broadcast, {[@end, @lsrr={0x83, 0x7, 0x52, [@multicast2]}]}}}}}) (async) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{0x240, 0x2, 0x5850, 0x1}, 'syz0\x00', 0x9}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x5865, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff8f, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x9, 0x9, {{0x7, 0x4, 0x0, 0x6, 0x1c, 0x401, 0x0, 0x3f, 0x4, 0x0, @multicast1, @broadcast, {[@end, @lsrr={0x83, 0x7, 0x52, [@multicast2]}]}}}}}) (async, rerun: 32) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000080)={{0x240, 0x2, 0x5850, 0x1}, 'syz0\x00', 0x9}) (async, rerun: 32) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x6, 0x20040006, 0xb00300}) 14:53:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfeffffff}) 14:53:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0x12}) 14:53:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x5d00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff97, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff010000}) 14:53:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x7, 0x20040006, 0xb00300}) 14:53:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xff9f, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="73797a746e38e3a71100000000000000", @ANYRES32=0x0, @ANYBLOB="0007001000000050000000094e0c003800660000012d907800000000e000000144144863ac1414bb00000297ac1414aa00000003890fbaac1414bbe0000001ffffffff01"]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000340)={'gre0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73797a746e6c300000faff0000000000", @ANYRES32=0x0, @ANYBLOB="0700001900000038000000084d19003400670000c0299078e0000001ffffffff8617000000030703f50502060cf975cf6a000963f777e7940401009404010000"]}) r6 = socket(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000a80)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x28}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002880)=ANY=[@ANYBLOB="6400000024000b0f00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000800010074626600380002000c00040088387e6f5e667e83280001000000000000000000000000000000000000000000000000000000000005"], 0x64}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000008c0)=@newqdisc={0x64, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x2}, {0x38, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, @TCA_TBF_PRATE64={0xc}]}}]}, 0x64}}, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x4) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000400)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000440)=0xc) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'syztnl0\x00', 0x0, 0x2f, 0x40, 0xff, 0x3, 0x0, @private1, @local, 0x8000, 0x700, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000640)={'tunl0\x00', &(0x7f0000000540)={'ip_vti0\x00', 0x0, 0x0, 0x40, 0x400, 0x8100, {{0x30, 0x4, 0x1, 0x2, 0xc0, 0x68, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0xc, 0xe6, 0x1, 0x1, [{@broadcast, 0x4}]}, @end, @timestamp_prespec={0x44, 0x3c, 0x2b, 0x3, 0x3, [{@remote, 0x65f}, {@multicast2, 0x9}, {@remote, 0x3}, {@remote, 0x75255d5d}, {@multicast1, 0x9}, {@dev={0xac, 0x14, 0x14, 0x42}, 0x6}, {@private=0xa010102, 0x65a}]}, @rr={0x7, 0x7, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x35, 0x2, [{0x5, 0x4, "f21a"}, {0x0, 0xd, "d21f6811606524929019b5"}, {0x1, 0xf, "39665e3f10063f787d0ea8465e"}, {0x1, 0xf, "89b47518a63f883c828eddae7b"}]}, @noop, @ssrr={0x89, 0xf, 0x7c, [@local, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xe5, 0x1, 0x6, [{@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x6}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000800)={0x274, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x40010}, 0x45) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r14 = getpid() fcntl$setown(r2, 0x8, r14) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setown(r2, 0x8, r15) 14:53:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6000, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffa7, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x8, 0x20040006, 0xb00300}) 14:53:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff070000}) 14:53:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) [ 962.101241][T28367] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 14:53:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffaf, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6001, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) [ 962.193369][T28371] sch_tbf: burst 0 is lower than device veth3 mtu (1514) ! 14:53:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffb7, 0x0, 0x20040006, 0xb00300}) 14:53:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x9, 0x20040006, 0xb00300}) 14:53:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="73797a746e38e3a71100000000000000", @ANYRES32=0x0, @ANYBLOB="0007001000000050000000094e0c003800660000012d907800000000e000000144144863ac1414bb00000297ac1414aa00000003890fbaac1414bbe0000001ffffffff01"]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000340)={'gre0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73797a746e6c300000faff0000000000", @ANYRES32=0x0, @ANYBLOB="0700001900000038000000084d19003400670000c0299078e0000001ffffffff8617000000030703f50502060cf975cf6a000963f777e7940401009404010000"]}) r6 = socket(0x10, 0x3, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000a80)) (async) r7 = socket$netlink(0x10, 0x3, 0x0) (async) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x28}}, 0x0) (async) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(r7, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002880)=ANY=[@ANYBLOB="6400000024000b0f00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000800010074626600380002000c00040088387e6f5e667e83280001000000000000000000000000000000000000000000000000000000000005"], 0x64}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000008c0)=@newqdisc={0x64, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x2}, {0x38, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, @TCA_TBF_PRATE64={0xc}]}}]}, 0x64}}, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x4) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000400)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000440)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'syztnl0\x00', 0x0, 0x2f, 0x40, 0xff, 0x3, 0x0, @private1, @local, 0x8000, 0x700, 0x1, 0x3}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000640)={'tunl0\x00', &(0x7f0000000540)={'ip_vti0\x00', 0x0, 0x0, 0x40, 0x400, 0x8100, {{0x30, 0x4, 0x1, 0x2, 0xc0, 0x68, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0xc, 0xe6, 0x1, 0x1, [{@broadcast, 0x4}]}, @end, @timestamp_prespec={0x44, 0x3c, 0x2b, 0x3, 0x3, [{@remote, 0x65f}, {@multicast2, 0x9}, {@remote, 0x3}, {@remote, 0x75255d5d}, {@multicast1, 0x9}, {@dev={0xac, 0x14, 0x14, 0x42}, 0x6}, {@private=0xa010102, 0x65a}]}, @rr={0x7, 0x7, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x35, 0x2, [{0x5, 0x4, "f21a"}, {0x0, 0xd, "d21f6811606524929019b5"}, {0x1, 0xf, "39665e3f10063f787d0ea8465e"}, {0x1, 0xf, "89b47518a63f883c828eddae7b"}]}, @noop, @ssrr={0x89, 0xf, 0x7c, [@local, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xe5, 0x1, 0x6, [{@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x6}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000800)={0x274, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x40010}, 0x45) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r14 = getpid() fcntl$setown(r2, 0x8, r14) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setown(r2, 0x8, r15) 14:53:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff070100}) [ 962.333082][ T6877] Bluetooth: hci5: command 0x041b tx timeout 14:53:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffbf, 0x0, 0x20040006, 0xb00300}) [ 962.411114][T28388] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 14:53:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6400, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff0f0000}) 14:53:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xa, 0x20040006, 0xb00300}) [ 962.511738][T28391] sch_tbf: burst 0 is lower than device veth5 mtu (1514) ! 14:53:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffc7, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="73797a746e38e3a71100000000000000", @ANYRES32=0x0, @ANYBLOB="0007001000000050000000094e0c003800660000012d907800000000e000000144144863ac1414bb00000297ac1414aa00000003890fbaac1414bbe0000001ffffffff01"]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000340)={'gre0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73797a746e6c300000faff0000000000", @ANYRES32=0x0, @ANYBLOB="0700001900000038000000084d19003400670000c0299078e0000001ffffffff8617000000030703f50502060cf975cf6a000963f777e7940401009404010000"]}) (async) r6 = socket(0x10, 0x3, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000a80)) r7 = socket$netlink(0x10, 0x3, 0x0) (async) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x28}}, 0x0) (async) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002880)=ANY=[@ANYBLOB="6400000024000b0f00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000800010074626600380002000c00040088387e6f5e667e83280001000000000000000000000000000000000000000000000000000000000005"], 0x64}}, 0x0) (async) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000008c0)=@newqdisc={0x64, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x2}, {0x38, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, @TCA_TBF_PRATE64={0xc}]}}]}, 0x64}}, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x4) (async) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000400)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000440)=0xc) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'syztnl0\x00', 0x0, 0x2f, 0x40, 0xff, 0x3, 0x0, @private1, @local, 0x8000, 0x700, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000640)={'tunl0\x00', &(0x7f0000000540)={'ip_vti0\x00', 0x0, 0x0, 0x40, 0x400, 0x8100, {{0x30, 0x4, 0x1, 0x2, 0xc0, 0x68, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp_addr={0x44, 0xc, 0xe6, 0x1, 0x1, [{@broadcast, 0x4}]}, @end, @timestamp_prespec={0x44, 0x3c, 0x2b, 0x3, 0x3, [{@remote, 0x65f}, {@multicast2, 0x9}, {@remote, 0x3}, {@remote, 0x75255d5d}, {@multicast1, 0x9}, {@dev={0xac, 0x14, 0x14, 0x42}, 0x6}, {@private=0xa010102, 0x65a}]}, @rr={0x7, 0x7, 0x1, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x35, 0x2, [{0x5, 0x4, "f21a"}, {0x0, 0xd, "d21f6811606524929019b5"}, {0x1, 0xf, "39665e3f10063f787d0ea8465e"}, {0x1, 0xf, "89b47518a63f883c828eddae7b"}]}, @noop, @ssrr={0x89, 0xf, 0x7c, [@local, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xe5, 0x1, 0x6, [{@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x6}]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000800)={0x274, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x40010}, 0x45) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r14 = getpid() fcntl$setown(r2, 0x8, r14) (async) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x8) (async) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setown(r2, 0x8, r15) 14:53:19 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x8, 0x20040006, 0xb00300}) 14:53:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6558, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff0f0100}) 14:53:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffcf, 0x0, 0x20040006, 0xb00300}) [ 962.684647][T28406] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 14:53:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xb, 0x20040006, 0xb00300}) 14:53:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffd7, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff7f0000}) [ 962.827991][T28409] sch_tbf: burst 0 is lower than device veth7 mtu (1514) ! 14:53:19 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xc, 0x20040006, 0xb00300}) 14:53:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x660c, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:19 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffdf, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff870000}) 14:53:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xd, 0x20040006, 0xb00300}) 14:53:19 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x670c, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffe7, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x9, 0x7fffffffffffffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xe, 0x20040006, 0xb00300}) 14:53:19 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x9, 0x7fffffffffffffff) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x9, 0x7fffffffffffffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff8f0000}) 14:53:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xffef, 0x0, 0x20040006, 0xb00300}) 14:53:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6800, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) (fail_nth: 1) 14:53:20 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x9, 0x7fffffffffffffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff970000}) 14:53:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x10, 0x20040006, 0xb00300}) 14:53:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0xfff7, 0x0, 0x20040006, 0xb00300}) 14:53:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x2, 0x20040006, 0xb00300}) 14:53:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6801, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) [ 963.665636][T28472] FAULT_INJECTION: forcing a failure. [ 963.665636][T28472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 963.691500][T28472] CPU: 1 PID: 28472 Comm: syz-executor.3 Not tainted 5.15.139-syzkaller #0 [ 963.700126][T28472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 963.710199][T28472] Call Trace: [ 963.713488][T28472] [ 963.716435][T28472] dump_stack_lvl+0x1e3/0x2cb [ 963.721117][T28472] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 963.726752][T28472] ? panic+0x84d/0x84d [ 963.730928][T28472] ? __lock_acquire+0x1295/0x1ff0 [ 963.735971][T28472] should_fail+0x38a/0x4c0 [ 963.740386][T28472] _copy_from_user+0x2d/0x170 [ 963.745159][T28472] sctp_getsockopt_peer_addr_params+0x11a/0x1660 [ 963.751607][T28472] ? print_irqtrace_events+0x210/0x210 [ 963.757165][T28472] ? sctp_getsockopt_peeloff_flags+0x2c0/0x2c0 [ 963.763342][T28472] ? _local_bh_enable+0xa0/0xa0 [ 963.768210][T28472] ? do_raw_spin_unlock+0x137/0x8b0 [ 963.773527][T28472] sctp_getsockopt+0x4ff/0x7f0 [ 963.778320][T28472] ? sock_recv_errqueue+0x4a0/0x4a0 [ 963.783641][T28472] __sys_getsockopt+0x2a6/0x550 [ 963.788531][T28472] __x64_sys_getsockopt+0xb1/0xc0 [ 963.793758][T28472] do_syscall_64+0x3d/0xb0 [ 963.798172][T28472] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 963.804152][T28472] RIP: 0033:0x7f08733fdae9 [ 963.808583][T28472] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 963.828503][T28472] RSP: 002b:00007f087197f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 963.836935][T28472] RAX: ffffffffffffffda RBX: 00007f087351cf80 RCX: 00007f08733fdae9 [ 963.844993][T28472] RDX: 0000000000000009 RSI: 0000000000000084 RDI: 0000000000000003 [ 963.852984][T28472] RBP: 00007f087197f120 R08: 00000000200034c0 R09: 0000000000000000 14:53:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x3, 0x20040006, 0xb00300}) [ 963.861076][T28472] R10: 0000000020003400 R11: 0000000000000246 R12: 0000000000000001 [ 963.869138][T28472] R13: 000000000000000b R14: 00007f087351cf80 R15: 00007ffe0b83a818 [ 963.877137][T28472] 14:53:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x11, 0x20040006, 0xb00300}) 14:53:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xff9f0000}) 14:53:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) (fail_nth: 2) [ 964.040322][T16182] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 964.041859][T28483] FAULT_INJECTION: forcing a failure. [ 964.041859][T28483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 964.078641][T28483] CPU: 0 PID: 28483 Comm: syz-executor.3 Not tainted 5.15.139-syzkaller #0 [ 964.087275][T28483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 964.097357][T28483] Call Trace: [ 964.100654][T28483] [ 964.103613][T28483] dump_stack_lvl+0x1e3/0x2cb [ 964.108322][T28483] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 964.113989][T28483] ? panic+0x84d/0x84d [ 964.118107][T28483] ? __lock_acquire+0x1295/0x1ff0 [ 964.123259][T28483] should_fail+0x38a/0x4c0 [ 964.127688][T28483] _copy_to_user+0x2d/0x130 [ 964.132191][T28483] sctp_getsockopt_peer_addr_params+0xdf6/0x1660 [ 964.138522][T28483] ? sctp_getsockopt_peeloff_flags+0x2c0/0x2c0 [ 964.144691][T28483] ? _local_bh_enable+0xa0/0xa0 [ 964.149582][T28483] ? do_raw_spin_unlock+0x137/0x8b0 [ 964.154802][T28483] sctp_getsockopt+0x4ff/0x7f0 [ 964.159572][T28483] ? sock_recv_errqueue+0x4a0/0x4a0 [ 964.164774][T28483] __sys_getsockopt+0x2a6/0x550 [ 964.169635][T28483] __x64_sys_getsockopt+0xb1/0xc0 [ 964.174663][T28483] do_syscall_64+0x3d/0xb0 [ 964.179078][T28483] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 964.184968][T28483] RIP: 0033:0x7f08733fdae9 [ 964.189514][T28483] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 964.209127][T28483] RSP: 002b:00007f087197f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 964.217649][T28483] RAX: ffffffffffffffda RBX: 00007f087351cf80 RCX: 00007f08733fdae9 [ 964.225624][T28483] RDX: 0000000000000009 RSI: 0000000000000084 RDI: 0000000000000003 [ 964.233703][T28483] RBP: 00007f087197f120 R08: 00000000200034c0 R09: 0000000000000000 [ 964.241673][T28483] R10: 0000000020003400 R11: 0000000000000246 R12: 0000000000000001 [ 964.249726][T28483] R13: 000000000000000b R14: 00007f087351cf80 R15: 00007ffe0b83a818 [ 964.257709][T28483] 14:53:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffa70000}) 14:53:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6900, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) [ 964.321271][T16182] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 964.415759][ T3874] Bluetooth: hci5: command 0x040f tx timeout [ 964.548395][T16182] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 964.643599][T16182] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 965.673407][T16182] device hsr_slave_0 left promiscuous mode [ 965.679917][T16182] device hsr_slave_1 left promiscuous mode [ 965.705119][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 965.722720][T16182] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 965.732000][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 965.762899][T16182] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 965.784817][T16182] device bridge_slave_1 left promiscuous mode [ 965.791072][T16182] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.824079][T16182] device bridge_slave_0 left promiscuous mode [ 965.830342][T16182] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.887065][T16182] device veth1_macvtap left promiscuous mode [ 965.903024][T16182] device veth0_macvtap left promiscuous mode [ 965.909138][T16182] device veth1_vlan left promiscuous mode [ 965.922934][T16182] device veth0_vlan left promiscuous mode [ 966.493483][ T3249] Bluetooth: hci5: command 0x0419 tx timeout [ 966.567033][T16182] team0 (unregistering): Port device team_slave_1 removed [ 966.605405][T16182] team0 (unregistering): Port device team_slave_0 removed [ 966.630096][T16182] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 966.676352][T16182] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 966.807339][T16182] bond0 (unregistering): Released all slaves [ 967.085852][T28514] chnl_net:caif_netlink_parms(): no params data found [ 967.213754][T28514] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.220905][T28514] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.229082][T28514] device bridge_slave_0 entered promiscuous mode [ 967.263171][T28514] bridge0: port 2(bridge_slave_1) entered blocking state [ 967.270517][T28514] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.284442][T28514] device bridge_slave_1 entered promiscuous mode [ 967.311758][T28514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 967.323431][T28514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 967.373630][T28514] team0: Port device team_slave_0 added [ 967.396011][T28514] team0: Port device team_slave_1 added [ 967.433226][T28514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 967.440280][T28514] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 967.489429][T28514] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 967.501906][T28514] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 967.509343][T28514] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 967.538063][T28514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 967.599016][T28514] device hsr_slave_0 entered promiscuous mode [ 967.606313][T28514] device hsr_slave_1 entered promiscuous mode [ 968.524374][T28514] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 968.574975][T28553] chnl_net:caif_netlink_parms(): no params data found [ 968.604771][T28514] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 968.659977][T28514] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 968.732789][ T6877] Bluetooth: hci2: command 0x0409 tx timeout [ 968.776049][T28514] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 968.885065][T28553] bridge0: port 1(bridge_slave_0) entered blocking state [ 968.892168][T28553] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.914392][T28553] device bridge_slave_0 entered promiscuous mode [ 968.934081][T28554] chnl_net:caif_netlink_parms(): no params data found [ 968.962902][T28553] bridge0: port 2(bridge_slave_1) entered blocking state [ 968.969997][T28553] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.998236][T28553] device bridge_slave_1 entered promiscuous mode [ 969.133646][T28553] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 969.161986][T28553] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 969.223740][T28553] team0: Port device team_slave_0 added [ 969.235384][T28553] team0: Port device team_slave_1 added [ 969.241469][T28554] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.251787][T28554] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.261964][T28554] device bridge_slave_0 entered promiscuous mode [ 969.270794][T28554] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.279032][T28554] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.286947][T28554] device bridge_slave_1 entered promiscuous mode [ 969.314336][T28514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 969.384461][T28553] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 969.391432][T28553] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 969.418413][T28553] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 969.438525][T28553] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 969.445710][T28553] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 969.479268][T28553] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 969.502943][T28554] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 969.528512][T28514] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.546916][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 969.555579][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 969.578663][T28554] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 969.604118][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 969.615772][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 969.625470][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.632562][ T6877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 969.641896][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 969.650953][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 969.660574][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.667755][ T6877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 969.683012][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 969.707602][T16182] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 969.733186][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 969.742162][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 969.755022][T28553] device hsr_slave_0 entered promiscuous mode [ 969.761992][T28553] device hsr_slave_1 entered promiscuous mode [ 969.769512][T28553] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 969.777517][T28553] Cannot create hsr debugfs directory [ 969.810126][T16182] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 969.836478][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 969.847649][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 969.856772][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 969.866000][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 969.875254][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 969.884448][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 969.897837][T28554] team0: Port device team_slave_0 added [ 969.909634][T28514] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 969.928723][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 969.964964][T16182] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 969.989986][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 969.999238][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 970.008671][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 970.034677][T28554] team0: Port device team_slave_1 added [ 970.084265][T16182] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 970.181572][T28554] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 970.189858][T28554] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 970.216345][T28554] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 970.253123][ T3874] Bluetooth: hci3: command 0x0409 tx timeout [ 970.266243][T28554] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 970.273735][T28554] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 970.301668][T28554] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 970.333020][ T1066] Bluetooth: hci4: command 0x0409 tx timeout [ 970.335272][T28514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 970.364926][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 970.372465][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 970.452753][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 970.462352][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 970.487983][T16182] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 970.508713][T28554] device hsr_slave_0 entered promiscuous mode [ 970.516086][T28554] device hsr_slave_1 entered promiscuous mode [ 970.523595][T28554] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 970.531153][T28554] Cannot create hsr debugfs directory [ 970.551898][T28514] device veth0_vlan entered promiscuous mode [ 970.566412][T16182] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 970.583628][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 970.592110][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 970.601551][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 970.609442][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 970.620788][T28514] device veth1_vlan entered promiscuous mode [ 970.668198][T16182] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 970.705472][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 970.723200][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 970.731429][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 970.751473][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 970.768439][T28514] device veth0_macvtap entered promiscuous mode [ 970.790862][T28514] device veth1_macvtap entered promiscuous mode [ 970.814772][ T1066] Bluetooth: hci2: command 0x041b tx timeout [ 970.829810][T16182] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 970.870767][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 970.882089][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 970.893073][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 970.910208][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 970.922323][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 970.942111][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 970.952072][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 970.962759][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 970.973754][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 970.984558][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 970.996013][T28514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 971.018156][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 971.030634][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 971.040319][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 971.050303][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 971.066097][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 971.082531][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 971.093204][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 971.104143][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 971.114498][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 971.125234][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 971.135456][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 971.146422][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 971.156306][T28514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 971.166966][T28514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 971.179215][T28514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 971.203090][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 971.212031][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 971.223080][T28514] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.231882][T28514] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.243001][T28514] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.251718][T28514] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.481894][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 971.507384][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 971.534218][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 971.547793][T16110] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 971.579238][T16110] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 971.659769][T20627] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:53:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x4, 0x20040006, 0xb00300}) 14:53:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x12, 0x20040006, 0xb00300}) 14:53:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) (fail_nth: 3) 14:53:28 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="73a71c010000000000000000ba160000", @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)=r4) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x140800, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@version_u}, {@cache_none}, {@mmap}, {@access_client}, {@version_u}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x388a52f0756cc04c, 0x31, 0x30, 0x30, 0x65, 0x62, 0x38, 0x38], 0x2d, [0x62, 0x32, 0x32], 0x2d, [0x31, 0x66, 0x32, 0x62], 0x2d, [0x31, 0x31, 0x62, 0x31], 0x2d, [0x0, 0x31, 0x32, 0x38, 0x33, 0x32, 0x35, 0x30]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'memory.events\x00'}}]}}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x40001, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r5, 0x4140, 0x0) sendfile(r5, r0, &(0x7f0000000280)=0x170, 0x6c7) [ 971.805868][T28673] FAULT_INJECTION: forcing a failure. [ 971.805868][T28673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 971.827691][T28673] CPU: 0 PID: 28673 Comm: syz-executor.3 Not tainted 5.15.139-syzkaller #0 [ 971.836503][T28673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 971.846566][T28673] Call Trace: [ 971.849859][T28673] [ 971.852816][T28673] dump_stack_lvl+0x1e3/0x2cb [ 971.857519][T28673] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 971.863611][T28673] ? panic+0x84d/0x84d [ 971.867678][T28673] ? snprintf+0xd6/0x120 [ 971.871932][T28673] should_fail+0x38a/0x4c0 [ 971.876342][T28673] _copy_to_user+0x2d/0x130 [ 971.880835][T28673] simple_read_from_buffer+0xc6/0x150 [ 971.886210][T28673] proc_fail_nth_read+0x1a3/0x210 [ 971.891261][T28673] ? proc_fault_inject_write+0x390/0x390 [ 971.896918][T28673] ? fsnotify_perm+0x438/0x5a0 [ 971.901690][T28673] ? proc_fault_inject_write+0x390/0x390 [ 971.907330][T28673] vfs_read+0x300/0xe10 [ 971.911690][T28673] ? kernel_read+0x1f0/0x1f0 [ 971.916272][T28673] ? __fget_files+0x413/0x480 [ 971.920945][T28673] ? mutex_lock_nested+0x17/0x20 [ 971.925898][T28673] ? __fdget_pos+0x2cb/0x380 [ 971.930497][T28673] ? ksys_read+0x77/0x2c0 [ 971.934827][T28673] ksys_read+0x1a2/0x2c0 [ 971.939181][T28673] ? print_irqtrace_events+0x210/0x210 [ 971.944660][T28673] ? vfs_write+0xe50/0xe50 [ 971.949092][T28673] ? syscall_enter_from_user_mode+0x2e/0x230 [ 971.955119][T28673] ? lockdep_hardirqs_on+0x94/0x130 [ 971.960321][T28673] ? syscall_enter_from_user_mode+0x2e/0x230 [ 971.966303][T28673] do_syscall_64+0x3d/0xb0 [ 971.970712][T28673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 971.976679][T28673] RIP: 0033:0x7f08733fc78c [ 971.981083][T28673] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 972.001061][T28673] RSP: 002b:00007f087197f0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 972.009471][T28673] RAX: ffffffffffffffda RBX: 00007f087351cf80 RCX: 00007f08733fc78c [ 972.017434][T28673] RDX: 000000000000000f RSI: 00007f087197f130 RDI: 0000000000000004 [ 972.025489][T28673] RBP: 00007f087197f120 R08: 0000000000000000 R09: 0000000000000000 [ 972.033473][T28673] R10: 0000000020003400 R11: 0000000000000246 R12: 0000000000000001 [ 972.041454][T28673] R13: 000000000000000b R14: 00007f087351cf80 R15: 00007ffe0b83a818 [ 972.049547][T28673] 14:53:28 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="73a71c010000000000000000ba160000", @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)=r4) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x140800, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@version_u}, {@cache_none}, {@mmap}, {@access_client}, {@version_u}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x388a52f0756cc04c, 0x31, 0x30, 0x30, 0x65, 0x62, 0x38, 0x38], 0x2d, [0x62, 0x32, 0x32], 0x2d, [0x31, 0x66, 0x32, 0x62], 0x2d, [0x31, 0x31, 0x62, 0x31], 0x2d, [0x0, 0x31, 0x32, 0x38, 0x33, 0x32, 0x35, 0x30]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'memory.events\x00'}}]}}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x40001, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r5, 0x4140, 0x0) sendfile(r5, r0, &(0x7f0000000280)=0x170, 0x6c7) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="73a71c010000000000000000ba160000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) dup3(0xffffffffffffffff, r2, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) (async) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)=r4) (async) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x140800, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@version_u}, {@cache_none}, {@mmap}, {@access_client}, {@version_u}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x388a52f0756cc04c, 0x31, 0x30, 0x30, 0x65, 0x62, 0x38, 0x38], 0x2d, [0x62, 0x32, 0x32], 0x2d, [0x31, 0x66, 0x32, 0x62], 0x2d, [0x31, 0x31, 0x62, 0x31], 0x2d, [0x0, 0x31, 0x32, 0x38, 0x33, 0x32, 0x35, 0x30]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'memory.events\x00'}}]}}) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x40001, 0x0) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r5, 0x4140, 0x0) (async) sendfile(r5, r0, &(0x7f0000000280)=0x170, 0x6c7) (async) 14:53:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5, 0x20040006, 0xb00300}) 14:53:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x6, 0x20040006, 0xb00300}) 14:53:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x2, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:28 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="73a71c010000000000000000ba160000", @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)=r4) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x140800, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@version_u}, {@cache_none}, {@mmap}, {@access_client}, {@version_u}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x388a52f0756cc04c, 0x31, 0x30, 0x30, 0x65, 0x62, 0x38, 0x38], 0x2d, [0x62, 0x32, 0x32], 0x2d, [0x31, 0x66, 0x32, 0x62], 0x2d, [0x31, 0x31, 0x62, 0x31], 0x2d, [0x0, 0x31, 0x32, 0x38, 0x33, 0x32, 0x35, 0x30]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'memory.events\x00'}}]}}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x40001, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r5, 0x4140, 0x0) sendfile(r5, r0, &(0x7f0000000280)=0x170, 0x6c7) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="73a71c010000000000000000ba160000", @ANYRES32=0x0, @ANYBLOB="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"]}) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) dup3(0xffffffffffffffff, r2, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) (async) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)=r4) (async) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x140800, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@version_u}, {@cache_none}, {@mmap}, {@access_client}, {@version_u}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x388a52f0756cc04c, 0x31, 0x30, 0x30, 0x65, 0x62, 0x38, 0x38], 0x2d, [0x62, 0x32, 0x32], 0x2d, [0x31, 0x66, 0x32, 0x62], 0x2d, [0x31, 0x31, 0x62, 0x31], 0x2d, [0x0, 0x31, 0x32, 0x38, 0x33, 0x32, 0x35, 0x30]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'memory.events\x00'}}]}}) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x40001, 0x0) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r5, 0x4140, 0x0) (async) sendfile(r5, r0, &(0x7f0000000280)=0x170, 0x6c7) (async) [ 972.332928][ T6877] Bluetooth: hci3: command 0x041b tx timeout [ 972.412742][ T1066] Bluetooth: hci4: command 0x041b tx timeout [ 972.545410][T28553] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 972.588382][T28553] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 972.605129][T28553] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 972.646024][T28553] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 972.691864][T28554] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 972.713214][T28554] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 972.722340][T28554] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 972.751322][T28554] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 972.868979][T28553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 972.894486][ T1066] Bluetooth: hci2: command 0x040f tx timeout [ 972.935625][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 972.945594][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 972.958368][T28553] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.035832][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 973.050983][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.064514][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.071602][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.104361][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 973.113610][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 973.124233][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.133554][ T3874] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.140630][ T3874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.179351][T28554] 8021q: adding VLAN 0 to HW filter on device bond0 [ 973.243872][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 973.262195][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 973.271821][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 973.291566][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 973.309400][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 973.327432][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 973.343006][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 973.350989][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 973.376553][T28554] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.389025][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 973.421504][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 973.435155][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 973.443725][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 973.463366][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.480527][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.487663][ T6877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.504638][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 973.519980][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 973.554949][T28553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 973.569022][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 973.577695][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 973.587659][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.596984][ T3874] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.604196][ T3874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.621879][T16182] device hsr_slave_0 left promiscuous mode [ 973.628824][T16182] device hsr_slave_1 left promiscuous mode [ 973.636796][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 973.644986][T16182] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 973.654171][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 973.661971][T16182] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 973.670612][T16182] device bridge_slave_1 left promiscuous mode [ 973.677066][T16182] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.687734][T16182] device bridge_slave_0 left promiscuous mode [ 973.698160][T16182] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.710916][T16182] device hsr_slave_0 left promiscuous mode [ 973.718342][T16182] device hsr_slave_1 left promiscuous mode [ 973.724951][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 973.732379][T16182] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 973.742747][T16182] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 973.750211][T16182] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 973.758788][T16182] device bridge_slave_1 left promiscuous mode [ 973.766258][T16182] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.775585][T16182] device bridge_slave_0 left promiscuous mode [ 973.781779][T16182] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.795715][T16182] device veth1_macvtap left promiscuous mode [ 973.801784][T16182] device veth0_macvtap left promiscuous mode [ 973.808383][T16182] device veth1_vlan left promiscuous mode [ 973.814319][T16182] device veth0_vlan left promiscuous mode [ 973.820898][T16182] device veth1_macvtap left promiscuous mode [ 973.828000][T16182] device veth0_macvtap left promiscuous mode [ 973.834431][T16182] device veth1_vlan left promiscuous mode [ 973.840635][T16182] device veth0_vlan left promiscuous mode [ 974.101473][T16182] team0 (unregistering): Port device team_slave_1 removed [ 974.116683][T16182] team0 (unregistering): Port device team_slave_0 removed [ 974.133221][T16182] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 974.151764][T16182] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 974.234804][T16182] bond0 (unregistering): Released all slaves [ 974.367979][T16182] team0 (unregistering): Port device team_slave_1 removed [ 974.387037][T16182] team0 (unregistering): Port device team_slave_0 removed [ 974.400989][T16182] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 974.412979][ T6877] Bluetooth: hci3: command 0x040f tx timeout [ 974.421372][T16182] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 974.492828][ T6877] Bluetooth: hci4: command 0x040f tx timeout [ 974.499921][T16182] bond0 (unregistering): Released all slaves [ 974.549041][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 974.558882][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 974.568320][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 974.578946][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.588371][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 974.602981][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 974.611998][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 974.672391][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 974.682401][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 974.692430][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 974.707821][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 974.719686][T28554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 974.737954][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 974.746658][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 974.764764][T28553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 974.799748][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 974.808607][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 974.834383][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 974.844469][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 974.853572][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 974.862123][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 974.873672][T28553] device veth0_vlan entered promiscuous mode [ 974.891133][T28553] device veth1_vlan entered promiscuous mode [ 974.914930][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 974.932173][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 974.940876][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 974.950879][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 974.964111][T28553] device veth0_macvtap entered promiscuous mode [ 974.972790][ T3249] Bluetooth: hci2: command 0x0419 tx timeout [ 974.987486][T28553] device veth1_macvtap entered promiscuous mode [ 975.007005][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 975.015263][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 975.027172][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 975.036044][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 975.049396][T28554] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 975.072930][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.095959][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.107955][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.118798][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.129037][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.139951][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.150382][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.161092][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.179313][T28553] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 975.191970][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 975.210145][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 975.222093][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.236642][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.246979][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.262044][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.272420][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.283792][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.294215][T28553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.305634][T28553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.317079][T28553] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 975.327508][T20633] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 975.337182][T20633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 975.356354][T28553] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.381921][T28553] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.392072][T28553] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.401259][T28553] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.427610][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 975.437531][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 975.489712][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 975.504304][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 975.518675][T28554] device veth0_vlan entered promiscuous mode [ 975.541886][T28554] device veth1_vlan entered promiscuous mode [ 975.553497][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 975.561263][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 975.569997][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 975.604433][T16236] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 975.620195][T16236] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 975.633578][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 975.642424][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 975.672809][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 975.687398][T28554] device veth0_macvtap entered promiscuous mode [ 975.728043][T28554] device veth1_macvtap entered promiscuous mode [ 975.735794][T16236] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 975.749150][T16236] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 975.757453][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.770288][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.783369][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.794455][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.804720][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.815664][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.825930][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.836807][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.847017][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.858187][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.869874][T28554] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 975.893045][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 975.902235][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 975.912169][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 975.926545][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 975.943412][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 975.955859][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.999501][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 976.010978][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 976.041207][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 976.059930][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 14:53:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffaf0000}) [ 976.087773][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 976.110558][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 976.141816][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 976.158867][T28554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 976.170490][T28554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 976.189506][T28554] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 976.203382][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 976.214558][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 976.234350][T28554] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 976.251463][T28554] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 976.272307][T28554] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 976.281473][T28554] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 976.371334][T16236] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 976.391576][T16236] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 976.421923][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 976.440361][T16236] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 976.450919][T16236] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 976.468000][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:53:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6a04, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x18, 0x20040006, 0xb00300}) 14:53:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x3, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) sendfile(r0, r0, 0x0, 0x6) 14:53:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x7, 0x20040006, 0xb00300}) 14:53:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffb70000}) [ 976.493693][ T3874] Bluetooth: hci3: command 0x0419 tx timeout 14:53:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x4, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) [ 976.573263][ T3874] Bluetooth: hci4: command 0x0419 tx timeout 14:53:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x25, 0x20040006, 0xb00300}) 14:53:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x6c00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffbf0000}) 14:53:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x6, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async, rerun: 64) sendfile(r0, r0, 0x0, 0x6) (rerun: 64) 14:53:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x8, 0x20040006, 0xb00300}) 14:53:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x7003, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffc70000}) 14:53:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x3e, 0x20040006, 0xb00300}) 14:53:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x9, 0x20040006, 0xb00300}) 14:53:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x8, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffcf0000}) 14:53:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xa, 0x20040006, 0xb00300}) 14:53:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x7400, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) sendfile(r0, r0, 0x0, 0x6) (async) sendfile(r0, r0, 0x0, 0x6) 14:53:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x41, 0x20040006, 0xb00300}) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xb, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffd70000}) 14:53:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xb, 0x20040006, 0xb00300}) 14:53:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x7a00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xc, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x7e02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5c, 0x20040006, 0xb00300}) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xd, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xc, 0x20040006, 0xb00300}) 14:53:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffdf0000}) 14:53:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"/324]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670200b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000080)={0x78276179, 0xb269, 0x1, 0xfff, 0x1000, 0x3}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r6 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x20400, 0x10) sendmsg$nl_route(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@can_delroute={0x34, 0x19, 0x10, 0x70bd28, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_MOD_SET={0x15, 0x4, {{{0x0, 0x1}, 0x7, 0x2, 0x0, 0x0, "1ad5639ffca09fe0"}, 0x4}}, @CGW_DST_IF={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xe, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f00"/324]}) (async) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670200b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000080)={0x78276179, 0xb269, 0x1, 0xfff, 0x1000, 0x3}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r6 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x20400, 0x10) sendmsg$nl_route(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@can_delroute={0x34, 0x19, 0x10, 0x70bd28, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_MOD_SET={0x15, 0x4, {{{0x0, 0x1}, 0x7, 0x2, 0x0, 0x0, "1ad5639ffca09fe0"}, 0x4}}, @CGW_DST_IF={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) 14:53:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x8002, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffe70000}) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xf, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xd, 0x20040006, 0xb00300}) 14:53:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5e, 0x20040006, 0xb00300}) 14:53:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f00"/324]}) (async) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670200b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000080)={0x78276179, 0xb269, 0x1, 0xfff, 0x1000, 0x3}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r6 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x20400, 0x10) sendmsg$nl_route(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@can_delroute={0x34, 0x19, 0x10, 0x70bd28, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_MOD_SET={0x15, 0x4, {{{0x0, 0x1}, 0x7, 0x2, 0x0, 0x0, "1ad5639ffca09fe0"}, 0x4}}, @CGW_DST_IF={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x10, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x8100, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:34 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x597040, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x275a, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r2) r3 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x10900, 0x100) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="21007f63b870b927b4b45b8e1376b398e4bd7533cee2b495f5ef70cb01ac390b8d9b5fb1720ce3d281c6bf64c9b6443d8a262db73d3f85f2f449db7361e0d3e45157ad69152f7c2b8769df17dd5c59ab3b3d88a0546e4b2a2b608e028344e107bef14d5bd40b0120d7e400f271a7e1fd40a44435cc7fb16c70d72d5957c647767e1ae7f1ce1d3e9947b7e84d6a73925ed75b6e5bcd689c30d22c81", 0x9b}, {&(0x7f00000001c0)="082fe85def4bf35ff09f39cc3633167806b592b52b7c7141d96aaaee424f22f593c0286d588cbaad83e51c0e1421e163445c0631da883c9b49e834159247bc8ec61dec93070a7c986f071ebb800f72616d60e48c1c7f6e8b9e9f9c04df587214f62670d5187454f716197253dba46213518827d140fbaf136d183627e8317cb296c00817de8555e48382abd13af9ca7c83c9f146fa1f5177cb7a2d481bb4a5440fd9abad460425", 0xa7}, {&(0x7f0000000280)="07fb1740578bb86059936aed3fc1a69fc2da9a2a", 0x14}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f00000002c0)="d9db20447a9d8d8d7e474f015d4562b426d0b40b0f", 0x15}], 0x6) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x11, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffef0000}) 14:53:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5f, 0x20040006, 0xb00300}) 14:53:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xe, 0x20040006, 0xb00300}) 14:53:34 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x597040, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x597040, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x275a, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r2) (async) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r2) r3 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x10900, 0x100) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="21007f63b870b927b4b45b8e1376b398e4bd7533cee2b495f5ef70cb01ac390b8d9b5fb1720ce3d281c6bf64c9b6443d8a262db73d3f85f2f449db7361e0d3e45157ad69152f7c2b8769df17dd5c59ab3b3d88a0546e4b2a2b608e028344e107bef14d5bd40b0120d7e400f271a7e1fd40a44435cc7fb16c70d72d5957c647767e1ae7f1ce1d3e9947b7e84d6a73925ed75b6e5bcd689c30d22c81", 0x9b}, {&(0x7f00000001c0)="082fe85def4bf35ff09f39cc3633167806b592b52b7c7141d96aaaee424f22f593c0286d588cbaad83e51c0e1421e163445c0631da883c9b49e834159247bc8ec61dec93070a7c986f071ebb800f72616d60e48c1c7f6e8b9e9f9c04df587214f62670d5187454f716197253dba46213518827d140fbaf136d183627e8317cb296c00817de8555e48382abd13af9ca7c83c9f146fa1f5177cb7a2d481bb4a5440fd9abad460425", 0xa7}, {&(0x7f0000000280)="07fb1740578bb86059936aed3fc1a69fc2da9a2a", 0x14}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f00000002c0)="d9db20447a9d8d8d7e474f015d4562b426d0b40b0f", 0x15}], 0x6) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:35 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x597040, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x275a, 0x0) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r2) (async) r3 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x10900, 0x100) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="21007f63b870b927b4b45b8e1376b398e4bd7533cee2b495f5ef70cb01ac390b8d9b5fb1720ce3d281c6bf64c9b6443d8a262db73d3f85f2f449db7361e0d3e45157ad69152f7c2b8769df17dd5c59ab3b3d88a0546e4b2a2b608e028344e107bef14d5bd40b0120d7e400f271a7e1fd40a44435cc7fb16c70d72d5957c647767e1ae7f1ce1d3e9947b7e84d6a73925ed75b6e5bcd689c30d22c81", 0x9b}, {&(0x7f00000001c0)="082fe85def4bf35ff09f39cc3633167806b592b52b7c7141d96aaaee424f22f593c0286d588cbaad83e51c0e1421e163445c0631da883c9b49e834159247bc8ec61dec93070a7c986f071ebb800f72616d60e48c1c7f6e8b9e9f9c04df587214f62670d5187454f716197253dba46213518827d140fbaf136d183627e8317cb296c00817de8555e48382abd13af9ca7c83c9f146fa1f5177cb7a2d481bb4a5440fd9abad460425", 0xa7}, {&(0x7f0000000280)="07fb1740578bb86059936aed3fc1a69fc2da9a2a", 0x14}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f00000002c0)="d9db20447a9d8d8d7e474f015d4562b426d0b40b0f", 0x15}], 0x6) (async) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfff70000}) 14:53:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x8847, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x6e, 0x20040006, 0xb00300}) 14:53:35 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x10, 0x20040006, 0xb00300}) 14:53:35 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x84001, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffff0000}) [ 978.675975][ T154] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.845892][ T154] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.921931][ T154] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.003492][ T154] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.981490][ T154] device hsr_slave_0 left promiscuous mode [ 979.993312][ T154] device hsr_slave_1 left promiscuous mode [ 980.007189][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 980.018447][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 980.030893][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 980.041822][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 980.057454][ T154] device bridge_slave_1 left promiscuous mode [ 980.067130][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.081279][ T154] device bridge_slave_0 left promiscuous mode [ 980.091768][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.111979][ T154] device veth1_macvtap left promiscuous mode [ 980.118181][ T154] device veth0_macvtap left promiscuous mode [ 980.125110][ T154] device veth1_vlan left promiscuous mode [ 980.130946][ T154] device veth0_vlan left promiscuous mode [ 980.355002][ T154] team0 (unregistering): Port device team_slave_1 removed [ 980.368898][ T154] team0 (unregistering): Port device team_slave_0 removed [ 980.381113][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 980.399211][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 980.467061][ T154] bond0 (unregistering): Released all slaves [ 981.565826][T28969] chnl_net:caif_netlink_parms(): no params data found [ 981.691165][T28969] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.709936][T28969] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.719377][T28969] device bridge_slave_0 entered promiscuous mode [ 981.737838][T28969] bridge0: port 2(bridge_slave_1) entered blocking state [ 981.752362][T28969] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.769325][T28969] device bridge_slave_1 entered promiscuous mode [ 981.851193][T28969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 981.881875][T28969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 981.946643][T28969] team0: Port device team_slave_0 added [ 981.956648][T28969] team0: Port device team_slave_1 added [ 981.987330][T28969] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 981.994712][T28969] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 982.028773][T28969] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 982.044064][T28969] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 982.051287][T28969] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 982.087564][T28969] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 982.145883][T28969] device hsr_slave_0 entered promiscuous mode [ 982.160522][T28969] device hsr_slave_1 entered promiscuous mode [ 982.167496][T28969] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 982.184843][T28969] Cannot create hsr debugfs directory [ 982.772220][T28969] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 982.782424][T28969] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 982.794377][T28969] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 982.804619][T28969] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 982.881131][T28969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.905965][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 982.921011][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 982.939871][T28969] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.960979][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 982.970667][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.988104][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.995283][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 983.031991][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 983.040673][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 983.058699][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 983.070174][ T3249] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.077833][ T3249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 983.092517][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 983.101565][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 983.117551][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 983.129911][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 983.160692][T28969] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 983.177828][T28969] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 983.191543][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 983.200986][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 983.210295][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 983.219514][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 983.228603][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 983.237660][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 983.246751][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 983.260465][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 983.352998][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 983.360889][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 983.373405][T28969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 983.381359][ T1066] Bluetooth: hci1: command 0x0409 tx timeout [ 983.403613][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 983.412552][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 983.435039][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 983.444980][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 983.455977][T28969] device veth0_vlan entered promiscuous mode [ 983.464662][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 983.474331][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 983.487589][T28969] device veth1_vlan entered promiscuous mode [ 983.515005][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 983.524150][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 983.532417][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 983.541806][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 983.553985][T28969] device veth0_macvtap entered promiscuous mode [ 983.566058][T28969] device veth1_macvtap entered promiscuous mode [ 983.601814][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 983.612833][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.631958][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 983.644014][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.654270][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 983.665036][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.676592][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 983.697874][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.717856][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 983.732188][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.747394][T28969] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 983.760985][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 983.771365][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 983.781008][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 983.791687][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 983.802540][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.816187][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.827378][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.839463][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.849685][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.861682][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.872445][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.883371][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.899913][T28969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.911173][T28969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.928194][T28969] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 983.939521][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 983.955889][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 983.971796][T28969] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 983.987395][T28969] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 983.997583][T28969] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 984.015848][T28969] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 984.124512][T16236] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 984.137898][T16236] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 984.158472][T20633] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 984.175123][T16182] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 984.187795][T16182] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 984.201681][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:53:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x12, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x11, 0x20040006, 0xb00300}) 14:53:40 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x84001, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x75, 0x20040006, 0xb00300}) 14:53:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x8848, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xffffff7f}) 14:53:40 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x84001, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x13, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x76, 0x20040006, 0xb00300}) 14:53:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x8f01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfffffff4}) 14:53:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x12, 0x20040006, 0xb00300}) 14:53:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) fallocate(r1, 0x1, 0x1, 0x2) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x14, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) fallocate(r1, 0x1, 0x1, 0x2) 14:53:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x920b, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x15, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfffffffb}) 14:53:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x82, 0x20040006, 0xb00300}) 14:53:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x18, 0x20040006, 0xb00300}) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x16, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x83, 0x20040006, 0xb00300}) 14:53:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x9701, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) fallocate(r1, 0x1, 0x1, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) fallocate(r1, 0x1, 0x1, 0x2) (async) 14:53:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300, 0xfffffffe}) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x17, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bridge', 0x408400, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r2, 0x3, r0, 0x1}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000140)={r2, 0x1, 0x3}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x25, 0x20040006, 0xb00300}) 14:53:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x9800, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x84, 0x20040006, 0xb00300}) 14:53:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="73797a746e6c320000000000000d0000233b5826287c8c193345de87c563a4a4d3638a5b62a20057cf08e15820fa7a8a57245d291944fb2b6c410a77fb31f0f0408bf5abb2d12560f406e6c213f6bca27db02974bfb412acd4447f0d1df87dc9d164e059b57e087672b76354c4dcb6b6f610cb13bfe4d46fef33ed4c928eb93eef03ebe308d1831e362ada1d87c3344b4b4ab5cb6c2aad609e348ff93038ebd2940ebe12cf44784c71b031ca73cc8f845badfba1452dd9e20291947234f55dafb2478623", @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) r4 = dup3(r0, r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c04596ebb1c7cdd52d90293e1fa332054656db90e60e6d73a12bfba163d1f5c78e7d6de2c1d129465fd8798564ab4c8a4def59a605838d126a6f2b179216f697234e55fed0d469ffec3166410c39312baf667e5baf5c0015ab331c5a34d59d5e7d800000000000000153450b9b", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) r6 = openat$cgroup_ro(r4, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x200000000, 0xb00300}) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="73797a746e6c320000000000000d0000233b5826287c8c193345de87c563a4a4d3638a5b62a20057cf08e15820fa7a8a57245d291944fb2b6c410a77fb31f0f0408bf5abb2d12560f406e6c213f6bca27db02974bfb412acd4447f0d1df87dc9d164e059b57e087672b76354c4dcb6b6f610cb13bfe4d46fef33ed4c928eb93eef03ebe308d1831e362ada1d87c3344b4b4ab5cb6c2aad609e348ff93038ebd2940ebe12cf44784c71b031ca73cc8f845badfba1452dd9e20291947234f55dafb2478623", @ANYRES32=0x0, @ANYBLOB="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"]}) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) dup3(r0, r2, 0x0) (async) r4 = dup3(r0, r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c04596ebb1c7cdd52d90293e1fa332054656db90e60e6d73a12bfba163d1f5c78e7d6de2c1d129465fd8798564ab4c8a4def59a605838d126a6f2b179216f697234e55fed0d469ffec3166410c39312baf667e5baf5c0015ab331c5a34d59d5e7d800000000000000153450b9b", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) r6 = openat$cgroup_ro(r4, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x200000000, 0xb00300}) 14:53:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x9a03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x19, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x28, 0x20040006, 0xb00300}) 14:53:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x87, 0x20040006, 0xb00300}) 14:53:42 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="73797a746e6c320000000000000d0000233b5826287c8c193345de87c563a4a4d3638a5b62a20057cf08e15820fa7a8a57245d291944fb2b6c410a77fb31f0f0408bf5abb2d12560f406e6c213f6bca27db02974bfb412acd4447f0d1df87dc9d164e059b57e087672b76354c4dcb6b6f610cb13bfe4d46fef33ed4c928eb93eef03ebe308d1831e362ada1d87c3344b4b4ab5cb6c2aad609e348ff93038ebd2940ebe12cf44784c71b031ca73cc8f845badfba1452dd9e20291947234f55dafb2478623", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) dup3(r0, r2, 0x0) (async) r4 = dup3(r0, r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c04596ebb1c7cdd52d90293e1fa332054656db90e60e6d73a12bfba163d1f5c78e7d6de2c1d129465fd8798564ab4c8a4def59a605838d126a6f2b179216f697234e55fed0d469ffec3166410c39312baf667e5baf5c0015ab331c5a34d59d5e7d800000000000000153450b9b", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c04596ebb1c7cdd52d90293e1fa332054656db90e60e6d73a12bfba163d1f5c78e7d6de2c1d129465fd8798564ab4c8a4def59a605838d126a6f2b179216f697234e55fed0d469ffec3166410c39312baf667e5baf5c0015ab331c5a34d59d5e7d800000000000000153450b9b", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) r6 = openat$cgroup_ro(r4, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x200000000, 0xb00300}) 14:53:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bridge', 0x408400, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r2, 0x3, r0, 0x1}) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000140)={r2, 0x1, 0x3}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1a, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) [ 985.453151][ T1066] Bluetooth: hci1: command 0x041b tx timeout 14:53:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x9c00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffa, 0x4020020040009, 0xb00300}) 14:53:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x30, 0x20040006, 0xb00300}) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1b, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x88, 0x20040006, 0xb00300}) 14:53:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bridge', 0x408400, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r2, 0x3, r0, 0x1}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000140)={r2, 0x1, 0x3}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bridge', 0x408400, 0x1) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r2, 0x3, r0, 0x1}) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000140)={r2, 0x1, 0x3}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) 14:53:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffa, 0x4020020040009, 0xb00300}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffa, 0x4020020040009, 0xb00300}) (async) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1c, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x9e00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x91, 0x20040006, 0xb00300}) 14:53:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 14:53:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffa, 0x4020020040009, 0xb00300}) 14:53:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x38, 0x20040006, 0xb00300}) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1d, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xa002, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:42 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x41, 0x20040006, 0xb00300}) 14:53:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 32) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x21, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xf8, 0x20040006, 0xb00300}) 14:53:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x22, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x48, 0x20040006, 0xb00300}) 14:53:42 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (rerun: 64) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xa501, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x23, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x204, 0x20040006, 0xb00300}) 14:53:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x50, 0x20040006, 0xb00300}) 14:53:43 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xa601, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) 14:53:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x281, 0x20040006, 0xb00300}) 14:53:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x58, 0x20040006, 0xb00300}) 14:53:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xae02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x300, 0x20040006, 0xb00300}) [ 989.613744][T16111] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 989.677634][T16111] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 989.729509][T16111] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 989.789425][T16111] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.716742][T16111] device hsr_slave_0 left promiscuous mode [ 990.725803][T16111] device hsr_slave_1 left promiscuous mode [ 990.733517][T16111] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 990.740978][T16111] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 990.751147][T16111] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 990.759005][T16111] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 990.775288][T16111] device bridge_slave_1 left promiscuous mode [ 990.781562][T16111] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.791008][T16111] device bridge_slave_0 left promiscuous mode [ 990.804161][T16111] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.828785][T16111] device veth1_macvtap left promiscuous mode [ 990.835744][T16111] device veth0_macvtap left promiscuous mode [ 990.841845][T16111] device veth1_vlan left promiscuous mode [ 990.848213][T16111] device veth0_vlan left promiscuous mode [ 991.018474][T16111] team0 (unregistering): Port device team_slave_1 removed [ 991.031589][T16111] team0 (unregistering): Port device team_slave_0 removed [ 991.049804][T16111] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 991.065718][T16111] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 991.127367][T16111] bond0 (unregistering): Released all slaves [ 992.049067][T29388] chnl_net:caif_netlink_parms(): no params data found [ 992.167615][T29388] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.182766][T29388] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.191243][T29388] device bridge_slave_0 entered promiscuous mode [ 992.216316][T29388] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.223945][T29388] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.232140][T29388] device bridge_slave_1 entered promiscuous mode [ 992.290072][T29388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 992.311414][T29388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 992.394576][T29388] team0: Port device team_slave_0 added [ 992.410251][T29388] team0: Port device team_slave_1 added [ 992.461601][T29388] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 992.482849][T29388] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 992.521733][T29388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 992.534840][T29388] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 992.541799][T29388] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 992.597375][T29388] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 992.673438][T29388] device hsr_slave_0 entered promiscuous mode [ 992.688802][T29388] device hsr_slave_1 entered promiscuous mode [ 992.713939][T29388] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 992.721621][T29388] Cannot create hsr debugfs directory [ 992.744627][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.751052][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 993.624799][T29388] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 993.641905][T29388] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 993.660728][T29388] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 993.671364][T29388] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 993.768678][T29388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 993.799269][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 993.816453][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 993.831396][T29388] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.850584][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 993.869204][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 993.879684][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.886847][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 993.924838][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 993.940306][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 993.949344][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 993.965595][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.972742][ T6877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 993.987786][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 993.997935][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 994.015289][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 994.030683][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 994.041066][ T6877] Bluetooth: hci1: command 0x0409 tx timeout [ 994.065636][T29388] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 994.103945][T29388] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 994.125315][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 994.140710][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 994.150610][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 994.167438][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 994.176590][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 994.185635][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 994.194313][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 994.206379][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 994.315097][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 994.329664][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 994.353615][T29388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 994.376196][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 994.391145][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 994.427518][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 994.442057][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 994.454175][T29388] device veth0_vlan entered promiscuous mode [ 994.469788][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 994.477955][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 994.497145][T29388] device veth1_vlan entered promiscuous mode [ 994.524165][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 994.532395][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 994.544281][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 994.553976][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 994.571397][T29388] device veth0_macvtap entered promiscuous mode [ 994.584975][T29388] device veth1_macvtap entered promiscuous mode [ 994.611646][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 994.630332][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.641756][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 994.662429][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.679454][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 994.692082][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.703432][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 994.714369][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.724515][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 994.736102][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.747487][T29388] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 994.757417][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 994.766331][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 994.774595][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 994.783463][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 994.795217][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 994.816263][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.833595][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 994.850663][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.860607][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 994.877827][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.890840][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 994.906879][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.918237][T29388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 994.932468][T29388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 994.949397][T29388] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 994.959470][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 994.971317][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 994.983487][T29388] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.992224][T29388] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 995.003376][T29388] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 995.012110][T29388] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 995.090187][T16110] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 995.109063][T16110] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 995.128664][T17020] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 14:53:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x24, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5c, 0x20040006, 0xb00300}) 14:53:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) renameat2(r3, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x3) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1a0a0}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}]}, 0x1c}}, 0x40400d4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x40000, 0x20040006, 0xb00300}) 14:53:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xb400, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:53:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x3de, 0x20040006, 0xb00300}) [ 995.134353][ T6877] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 995.143483][T17020] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 995.160109][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:53:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) (async) renameat2(r3, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x3) (async, rerun: 64) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1a0a0}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}]}, 0x1c}}, 0x40400d4) (async, rerun: 64) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x40000, 0x20040006, 0xb00300}) 14:53:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x402, 0x20040006, 0xb00300}) 14:53:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xbc01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x82, 0x20040006, 0xb00300}) 14:53:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x25, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:52 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x1, 0x1000, 0xb00300}) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000000)=ANY=[@ANYBLOB="770b0000000000000500000000000000020000000900000004000000000000007f00000000000000070000000000000005000000000000000000000000000000000000000000000004040000000000000000000000000000fdffffffffffffff010000000000000040000000000000000000000000000000000000000000000001100000000000000000000000000000ffffff7f000000000100000000000000fa0000000000000000000000000000000000000000000000000200000000000000000000000000000300000000000051bf2ce9f72e784bff050000000000000000000000000000000000000000000000881000"/256]) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140), 0x20301, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240), 0x0, 0x100) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000100)={0x2}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f00000001c0)) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffff9) 14:53:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) renameat2(r3, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x3) (async) renameat2(r3, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x3) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1a0a0}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x10001}]}, 0x1c}}, 0x40400d4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x40000, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x40000, 0x20040006, 0xb00300}) 14:53:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x66, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:52 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x1, 0x1000, 0xb00300}) (async, rerun: 32) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000000)=ANY=[@ANYBLOB="770b0000000000000500000000000000020000000900000004000000000000007f00000000000000070000000000000005000000000000000000000000000000000000000000000004040000000000000000000000000000fdffffffffffffff010000000000000040000000000000000000000000000000000000000000000001100000000000000000000000000000ffffff7f000000000100000000000000fa0000000000000000000000000000000000000000000000000200000000000000000000000000000300000000000051bf2ce9f72e784bff050000000000000000000000000000000000000000000000881000"/256]) (async, rerun: 32) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140), 0x20301, 0x0) (async, rerun: 64) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240), 0x0, 0x100) (rerun: 64) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000100)={0x2}) (async) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f00000001c0)) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffff9) 14:53:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xbc02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x6c, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:53:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x406, 0x20040006, 0xb00300}) 14:53:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x85, 0x20040006, 0xb00300}) 14:53:52 executing program 1: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010018000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="08000000feffffff2e2f66696c653000"]) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000080)={"17741dbfaf6145f6f84d0d0915c2c3d0", 0x0, 0x0, {0x8, 0x7}, {0xfffffffffffffff8}, 0xa479, [0xffffffff, 0x8000000000000001, 0x9478, 0x8, 0x8, 0x8b2, 0x10001, 0x9416, 0x28b06f5a, 0x9, 0x4, 0x8, 0x9, 0xfff, 0x1, 0xffff]}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000800)={{r1}, r2, 0xc, @inherit={0x60, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000000000003000000000000070000000000000000ffffffff00000000880000000000000003000000000000ffffffff0000000000c20000000000000001ffffffffffffffff7f00000000000020000000000000000200000000000000"]}, @subvolid=0x100000000}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x5) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x5) r6 = getuid() getresuid(&(0x7f00000002c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgid(0xffffffffffffffff) r10 = accept4$inet6(r3, &(0x7f0000000500), &(0x7f0000000540)=0x1c, 0x80000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r12 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000005c0), 0x18480, 0x0) r13 = socket$packet(0x11, 0x3, 0x300) r14 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r14, 0x4140, 0x0) r15 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) sendmsg$netlink(r3, &(0x7f0000000780)={&(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)=[{&(0x7f0000001800)={0x1278, 0x22, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x1268, 0x8b, 0x0, 0x1, [@typed={0x8, 0x94, 0x0, 0x0, @ipv4=@loopback}, @generic="f301b6d346d76cb9f98da95dd4b5a4decf58f20578e24bfb2519a027e3dd81bb9ca98cf6a5aa717177067e66a2508cd853c12e661daa67264fc30d8b29da9050759541d06ab87b63d31b1aaa5e4e795f523c466127ae4ecdd34e", @typed={0x8, 0x8c, 0x0, 0x0, @u32=0x8}, @generic="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", @typed={0x8, 0x87, 0x0, 0x0, @pid=r4}, @generic="0fdbbc91477c52efaa6d57b469eea94ddb2f0bcbee5b34585e3e09a17fa715cfe3b1185cf9e8d7a8984c91b5af994f44fbf9dc1277e8bdfc712de1ba6d9be2e8063336892d0888a8bbec87cd3b287d55a1f5f2d05e53534e087d7d055f424f35c0b749b72a7a2982de896d6bfcdbb88175abb9b64ac6", @generic="f10907beb15f48fba673c829a7f5bf37d07065e824867c0ef8d705776964f373a3d387e73a63ba2f39cbc91af68c4b9d26255cce2905ba0271528aa45fc48ecd729daae8df8a55d65195d0a6cdacf39c37fcbfbcf65e375976ff90658191f7df553681109d1ecee284d8e9e3dc5d83e917a9c2d875c6aefdfa1e65fefeed0884b43c719307cfdbcf1d7052ea37c99e289ce0446e1058cfcf31603a1d0561abc671e5c54cdedbaf873e6c7608f293ef7aab04ee3b37cb3b89314766c387a5a366521de2226919a44b7f55f173bffba5eecc81e6bb88deae636c3e4c0c4a6ad0f967fcfb61", @generic="3dfaf91125e5fb780bece6702c3023ed219c38a2ad0c27cacede6656b00e85a25a013cae609d27c8d48e4e36", @generic="8bb863175fb533f75d07cfbef477ded7e5b9989b7223da5c1bc64fef2c56be46baccccb71119438d00ed91069b8ae1001e8db72791e93b77956128bd085e36b68f06fa0a4f4a9d9c8559a52e7778640ab734f647e58ccc67849ed501ed821e1231d85456318d9045b44b6a71"]}]}, 0x1278}], 0x1, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r8, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r9}}}, @rights={{0x2c, 0x1, 0x1, [r10, r3, r11, r12, r13, r14, r15]}}], 0xb0, 0x4048841}, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r16 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r16, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r18 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r19 = dup3(0xffffffffffffffff, r18, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r17, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r19, 0x400454da, &(0x7f0000000400)=r20) openat$cgroup_ro(r19, &(0x7f0000000200)='blkio.bfq.io_service_time\x00', 0x0, 0x0) 14:53:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xbd01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x475, 0x20040006, 0xb00300}) 14:53:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x87, 0x20040006, 0xb00300}) 14:53:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc003, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:53:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x47f, 0x20040006, 0xb00300}) 14:53:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x88, 0x20040006, 0xb00300}) [ 996.255354][ T154] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.312073][ T154] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.401214][ T154] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:53:53 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x1, 0x1000, 0xb00300}) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000000)=ANY=[@ANYBLOB="770b0000000000000500000000000000020000000900000004000000000000007f00000000000000070000000000000005000000000000000000000000000000000000000000000004040000000000000000000000000000fdffffffffffffff010000000000000040000000000000000000000000000000000000000000000001100000000000000000000000000000ffffff7f000000000100000000000000fa0000000000000000000000000000000000000000000000000200000000000000000000000000000300000000000051bf2ce9f72e784bff050000000000000000000000000000000000000000000000881000"/256]) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140), 0x20301, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240), 0x0, 0x100) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000100)={0x2}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f00000001c0)) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffff9) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x1, 0x1, 0x1000, 0xb00300}) (async) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000000)=ANY=[@ANYBLOB="770b0000000000000500000000000000020000000900000004000000000000007f00000000000000070000000000000005000000000000000000000000000000000000000000000004040000000000000000000000000000fdffffffffffffff010000000000000040000000000000000000000000000000000000000000000001100000000000000000000000000000ffffff7f000000000100000000000000fa0000000000000000000000000000000000000000000000000200000000000000000000000000000300000000000051bf2ce9f72e784bff050000000000000000000000000000000000000000000000881000"/256]) (async) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140), 0x20301, 0x0) (async) syz_open_dev$sndpcmc(&(0x7f0000000240), 0x0, 0x100) (async) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000100)={0x2}) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f00000001c0)) (async) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffff9) (async) 14:53:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x91, 0x20040006, 0xb00300}) [ 996.460632][ T154] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 997.498672][ T154] device hsr_slave_0 left promiscuous mode [ 997.514917][ T154] device hsr_slave_1 left promiscuous mode [ 997.533057][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 997.540536][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 997.561602][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 997.569488][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 997.579244][ T154] device bridge_slave_1 left promiscuous mode [ 997.585930][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.595581][ T154] device bridge_slave_0 left promiscuous mode [ 997.601857][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.616437][ T154] device veth1_macvtap left promiscuous mode [ 997.622498][ T154] device veth0_macvtap left promiscuous mode [ 997.628764][ T154] device veth1_vlan left promiscuous mode [ 997.638242][ T154] device veth0_vlan left promiscuous mode [ 997.795648][ T154] team0 (unregistering): Port device team_slave_1 removed [ 997.811363][ T154] team0 (unregistering): Port device team_slave_0 removed [ 997.824952][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 997.839320][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 997.911778][ T154] bond0 (unregistering): Released all slaves [ 999.211872][T29644] chnl_net:caif_netlink_parms(): no params data found [ 999.434351][T29644] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.441964][T29644] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.489795][T29644] device bridge_slave_0 entered promiscuous mode [ 999.530942][T29644] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.572943][T29644] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.611785][T29644] device bridge_slave_1 entered promiscuous mode [ 999.727698][T29644] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 999.769607][T29644] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 999.826742][T29644] team0: Port device team_slave_0 added [ 999.854203][T29644] team0: Port device team_slave_1 added [ 999.900167][T29644] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 999.913847][T29644] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 999.952805][T29644] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 999.971725][T29644] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1000.000192][T29644] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1000.044904][T29644] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1000.114562][T29644] device hsr_slave_0 entered promiscuous mode [ 1000.121688][T29644] device hsr_slave_1 entered promiscuous mode [ 1000.139757][T29644] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1000.162680][T29644] Cannot create hsr debugfs directory [ 1000.782086][T29644] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1000.799254][T29644] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1000.810687][T29644] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1000.830828][T29644] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1000.851663][ T154] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1000.945378][ T154] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1000.973867][ T3874] Bluetooth: hci1: command 0x0409 tx timeout [ 1000.992752][ T154] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1001.055157][T29644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1001.086905][ T154] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1001.104516][T29644] 8021q: adding VLAN 0 to HW filter on device team0 [ 1001.123449][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1001.131398][T20631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1001.175803][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1001.187075][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1001.197330][T20630] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.204465][T20630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1001.212537][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1001.221866][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1001.230834][T20630] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.237966][T20630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1001.248505][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1001.295325][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1001.308052][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1001.319689][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1001.334475][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1001.350304][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1001.360256][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1001.430855][T29644] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1001.441767][T29644] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1001.462328][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1001.470365][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1001.479355][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1001.488842][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1001.497469][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1001.505914][T20635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1001.726747][T29644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1001.734265][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1001.741895][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1001.821981][T29705] chnl_net:caif_netlink_parms(): no params data found [ 1001.940809][T29705] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.963192][T29705] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.971376][T29705] device bridge_slave_0 entered promiscuous mode [ 1001.981525][T29705] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.997745][T29705] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.009569][T29705] device bridge_slave_1 entered promiscuous mode [ 1002.068648][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1002.077730][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1002.127689][T29705] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1002.142322][T29644] device veth0_vlan entered promiscuous mode [ 1002.152048][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1002.160881][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1002.179858][T29705] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1002.190644][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1002.207188][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1002.264946][T29644] device veth1_vlan entered promiscuous mode [ 1002.278738][T29705] team0: Port device team_slave_0 added [ 1002.286862][T29705] team0: Port device team_slave_1 added [ 1002.303935][T20633] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1002.359608][T29705] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1002.369714][T29705] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1002.396467][T29705] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1002.420869][T29705] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1002.430450][T29705] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1002.464932][T29705] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1002.505812][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1002.515952][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1002.537922][T29644] device veth0_macvtap entered promiscuous mode [ 1002.559495][T29644] device veth1_macvtap entered promiscuous mode [ 1002.601284][T29705] device hsr_slave_0 entered promiscuous mode [ 1002.616753][T29705] device hsr_slave_1 entered promiscuous mode [ 1002.627864][T29705] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1002.640849][T29705] Cannot create hsr debugfs directory [ 1002.659978][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1002.671537][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.681464][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1002.692311][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.702304][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1002.713852][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.731518][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1002.742468][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.760881][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1002.771643][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.783905][T29644] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1002.814301][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1002.823583][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1002.833540][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1002.842160][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1002.852751][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1002.864625][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.874803][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1002.885458][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.895669][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1002.906138][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.917989][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1002.928548][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.938515][T29644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1002.949087][T29644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1002.960085][T29644] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1002.986951][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1003.000844][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1003.039434][T29644] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.049444][T29644] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.059013][ T1066] Bluetooth: hci1: command 0x041b tx timeout [ 1003.062074][T29644] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.082320][T29644] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.097109][ T154] device hsr_slave_0 left promiscuous mode [ 1003.112363][ T154] device hsr_slave_1 left promiscuous mode [ 1003.120021][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1003.145498][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1003.164847][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1003.172321][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1003.189966][ T154] device bridge_slave_1 left promiscuous mode [ 1003.198888][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.212904][ T1066] Bluetooth: hci4: command 0x0409 tx timeout [ 1003.219467][ T154] device bridge_slave_0 left promiscuous mode [ 1003.235678][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.254338][ T154] device veth1_macvtap left promiscuous mode [ 1003.260409][ T154] device veth0_macvtap left promiscuous mode [ 1003.276100][ T154] device veth1_vlan left promiscuous mode [ 1003.281951][ T154] device veth0_vlan left promiscuous mode [ 1003.529389][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1003.553858][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1003.568390][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1003.583333][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1003.651741][ T154] bond0 (unregistering): Released all slaves [ 1003.922191][T16182] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1003.965370][T16182] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1003.985789][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1004.010209][T16111] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1004.030914][T16111] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1004.081716][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1004.261943][T29705] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1004.279538][T29705] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1004.293639][T29705] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1004.313702][T29705] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1004.410255][T29705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1004.440208][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.448811][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.461104][T29705] 8021q: adding VLAN 0 to HW filter on device team0 [ 1004.476165][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1004.485705][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1004.506564][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.513684][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1004.543477][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.551533][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1004.567736][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1004.582238][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.589398][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1004.606629][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.620367][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.632187][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1004.647712][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1004.662752][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1004.671570][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1004.692426][T29705] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1004.709772][T29705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1004.724814][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1004.734972][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1004.743609][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1004.755877][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1004.774627][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1004.790575][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1004.963171][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1004.970730][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1004.992985][T29705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1005.016708][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1005.026149][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1005.054115][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1005.063695][T20632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1005.075900][T29705] device veth0_vlan entered promiscuous mode [ 1005.087155][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1005.096324][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1005.109045][T29705] device veth1_vlan entered promiscuous mode [ 1005.132781][ T3249] Bluetooth: hci1: command 0x040f tx timeout [ 1005.137308][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1005.147886][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1005.156746][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1005.166373][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1005.179058][T29705] device veth0_macvtap entered promiscuous mode [ 1005.192838][T29705] device veth1_macvtap entered promiscuous mode [ 1005.213998][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.226516][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.237984][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.248841][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.259343][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.270735][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.281838][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.292758][ T3249] Bluetooth: hci4: command 0x041b tx timeout [ 1005.294574][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.310133][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.323127][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.335032][T29705] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1005.344979][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1005.354399][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1005.363706][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1005.373086][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1005.389922][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.405921][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.421441][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.436231][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.451790][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.465402][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.482034][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.500029][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.510770][T29705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.522730][T29705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.535493][T29705] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1005.547896][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1005.557510][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1005.570334][T29705] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1005.581674][T29705] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1005.591532][T29705] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1005.601107][T29705] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1005.704927][T16182] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1005.729053][T16182] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1005.748583][T20630] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1005.758028][ T4093] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1005.769648][ T4093] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1005.785340][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:54:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x6d, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x500, 0x20040006, 0xb00300}) 14:54:02 executing program 1: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010018000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="08000000feffffff2e2f66696c653000"]) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000080)={"17741dbfaf6145f6f84d0d0915c2c3d0", 0x0, 0x0, {0x8, 0x7}, {0xfffffffffffffff8}, 0xa479, [0xffffffff, 0x8000000000000001, 0x9478, 0x8, 0x8, 0x8b2, 0x10001, 0x9416, 0x28b06f5a, 0x9, 0x4, 0x8, 0x9, 0xfff, 0x1, 0xffff]}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000800)={{r1}, r2, 0xc, @inherit={0x60, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000000000003000000000000070000000000000000ffffffff00000000880000000000000003000000000000ffffffff0000000000c20000000000000001ffffffffffffffff7f00000000000020000000000000000200000000000000"]}, @subvolid=0x100000000}) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x5) (async) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x5) (async) r6 = getuid() getresuid(&(0x7f00000002c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) (async) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r9 = getpgid(0xffffffffffffffff) (async) r10 = accept4$inet6(r3, &(0x7f0000000500), &(0x7f0000000540)=0x1c, 0x80000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r12 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000005c0), 0x18480, 0x0) r13 = socket$packet(0x11, 0x3, 0x300) (async) r14 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r14, 0x4140, 0x0) r15 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) sendmsg$netlink(r3, &(0x7f0000000780)={&(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)=[{&(0x7f0000001800)={0x1278, 0x22, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x1268, 0x8b, 0x0, 0x1, [@typed={0x8, 0x94, 0x0, 0x0, @ipv4=@loopback}, @generic="f301b6d346d76cb9f98da95dd4b5a4decf58f20578e24bfb2519a027e3dd81bb9ca98cf6a5aa717177067e66a2508cd853c12e661daa67264fc30d8b29da9050759541d06ab87b63d31b1aaa5e4e795f523c466127ae4ecdd34e", @typed={0x8, 0x8c, 0x0, 0x0, @u32=0x8}, @generic="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", @typed={0x8, 0x87, 0x0, 0x0, @pid=r4}, @generic="0fdbbc91477c52efaa6d57b469eea94ddb2f0bcbee5b34585e3e09a17fa715cfe3b1185cf9e8d7a8984c91b5af994f44fbf9dc1277e8bdfc712de1ba6d9be2e8063336892d0888a8bbec87cd3b287d55a1f5f2d05e53534e087d7d055f424f35c0b749b72a7a2982de896d6bfcdbb88175abb9b64ac6", @generic="f10907beb15f48fba673c829a7f5bf37d07065e824867c0ef8d705776964f373a3d387e73a63ba2f39cbc91af68c4b9d26255cce2905ba0271528aa45fc48ecd729daae8df8a55d65195d0a6cdacf39c37fcbfbcf65e375976ff90658191f7df553681109d1ecee284d8e9e3dc5d83e917a9c2d875c6aefdfa1e65fefeed0884b43c719307cfdbcf1d7052ea37c99e289ce0446e1058cfcf31603a1d0561abc671e5c54cdedbaf873e6c7608f293ef7aab04ee3b37cb3b89314766c387a5a366521de2226919a44b7f55f173bffba5eecc81e6bb88deae636c3e4c0c4a6ad0f967fcfb61", @generic="3dfaf91125e5fb780bece6702c3023ed219c38a2ad0c27cacede6656b00e85a25a013cae609d27c8d48e4e36", @generic="8bb863175fb533f75d07cfbef477ded7e5b9989b7223da5c1bc64fef2c56be46baccccb71119438d00ed91069b8ae1001e8db72791e93b77956128bd085e36b68f06fa0a4f4a9d9c8559a52e7778640ab734f647e58ccc67849ed501ed821e1231d85456318d9045b44b6a71"]}]}, 0x1278}], 0x1, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r8, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r9}}}, @rights={{0x2c, 0x1, 0x1, [r10, r3, r11, r12, r13, r14, r15]}}], 0xb0, 0x4048841}, 0x0) (async) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) r16 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r16, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) r18 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r19 = dup3(0xffffffffffffffff, r18, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r17, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r19, 0x400454da, &(0x7f0000000400)=r20) openat$cgroup_ro(r19, &(0x7f0000000200)='blkio.bfq.io_service_time\x00', 0x0, 0x0) 14:54:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x281, 0x20040006, 0xb00300}) 14:54:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 14:54:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc102, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5de, 0x20040006, 0xb00300}) 14:54:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc203, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x300, 0x20040006, 0xb00300}) 14:54:02 executing program 1: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010018000000000000000000", @ANYRES32, @ANYBLOB="08000000feffffff2e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010018000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="08000000feffffff2e2f66696c653000"]) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000080)={"17741dbfaf6145f6f84d0d0915c2c3d0", 0x0, 0x0, {0x8, 0x7}, {0xfffffffffffffff8}, 0xa479, [0xffffffff, 0x8000000000000001, 0x9478, 0x8, 0x8, 0x8b2, 0x10001, 0x9416, 0x28b06f5a, 0x9, 0x4, 0x8, 0x9, 0xfff, 0x1, 0xffff]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000080)={"17741dbfaf6145f6f84d0d0915c2c3d0", 0x0, 0x0, {0x8, 0x7}, {0xfffffffffffffff8}, 0xa479, [0xffffffff, 0x8000000000000001, 0x9478, 0x8, 0x8, 0x8b2, 0x10001, 0x9416, 0x28b06f5a, 0x9, 0x4, 0x8, 0x9, 0xfff, 0x1, 0xffff]}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000800)={{r1}, r2, 0xc, @inherit={0x60, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000000000003000000000000070000000000000000ffffffff00000000880000000000000003000000000000ffffffff0000000000c20000000000000001ffffffffffffffff7f00000000000020000000000000000200000000000000"]}, @subvolid=0x100000000}) (async) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000800)={{r1}, r2, 0xc, @inherit={0x60, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000000000003000000000000070000000000000000ffffffff00000000880000000000000003000000000000ffffffff0000000000c20000000000000001ffffffffffffffff7f00000000000020000000000000000200000000000000"]}, @subvolid=0x100000000}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x5) (async) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x5) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x5) r6 = getuid() getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)) (async) getresuid(&(0x7f00000002c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgid(0xffffffffffffffff) r10 = accept4$inet6(r3, &(0x7f0000000500), &(0x7f0000000540)=0x1c, 0x80000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000005c0), 0x18480, 0x0) (async) r12 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000005c0), 0x18480, 0x0) r13 = socket$packet(0x11, 0x3, 0x300) r14 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r14, 0x4140, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) (async) r15 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) sendmsg$netlink(r3, &(0x7f0000000780)={&(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)=[{&(0x7f0000001800)={0x1278, 0x22, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x1268, 0x8b, 0x0, 0x1, [@typed={0x8, 0x94, 0x0, 0x0, @ipv4=@loopback}, @generic="f301b6d346d76cb9f98da95dd4b5a4decf58f20578e24bfb2519a027e3dd81bb9ca98cf6a5aa717177067e66a2508cd853c12e661daa67264fc30d8b29da9050759541d06ab87b63d31b1aaa5e4e795f523c466127ae4ecdd34e", @typed={0x8, 0x8c, 0x0, 0x0, @u32=0x8}, @generic="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", @typed={0x8, 0x87, 0x0, 0x0, @pid=r4}, @generic="0fdbbc91477c52efaa6d57b469eea94ddb2f0bcbee5b34585e3e09a17fa715cfe3b1185cf9e8d7a8984c91b5af994f44fbf9dc1277e8bdfc712de1ba6d9be2e8063336892d0888a8bbec87cd3b287d55a1f5f2d05e53534e087d7d055f424f35c0b749b72a7a2982de896d6bfcdbb88175abb9b64ac6", @generic="f10907beb15f48fba673c829a7f5bf37d07065e824867c0ef8d705776964f373a3d387e73a63ba2f39cbc91af68c4b9d26255cce2905ba0271528aa45fc48ecd729daae8df8a55d65195d0a6cdacf39c37fcbfbcf65e375976ff90658191f7df553681109d1ecee284d8e9e3dc5d83e917a9c2d875c6aefdfa1e65fefeed0884b43c719307cfdbcf1d7052ea37c99e289ce0446e1058cfcf31603a1d0561abc671e5c54cdedbaf873e6c7608f293ef7aab04ee3b37cb3b89314766c387a5a366521de2226919a44b7f55f173bffba5eecc81e6bb88deae636c3e4c0c4a6ad0f967fcfb61", @generic="3dfaf91125e5fb780bece6702c3023ed219c38a2ad0c27cacede6656b00e85a25a013cae609d27c8d48e4e36", @generic="8bb863175fb533f75d07cfbef477ded7e5b9989b7223da5c1bc64fef2c56be46baccccb71119438d00ed91069b8ae1001e8db72791e93b77956128bd085e36b68f06fa0a4f4a9d9c8559a52e7778640ab734f647e58ccc67849ed501ed821e1231d85456318d9045b44b6a71"]}]}, 0x1278}], 0x1, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r8, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r9}}}, @rights={{0x2c, 0x1, 0x1, [r10, r3, r11, r12, r13, r14, r15]}}], 0xb0, 0x4048841}, 0x0) (async) sendmsg$netlink(r3, &(0x7f0000000780)={&(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)=[{&(0x7f0000001800)={0x1278, 0x22, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x1268, 0x8b, 0x0, 0x1, [@typed={0x8, 0x94, 0x0, 0x0, @ipv4=@loopback}, @generic="f301b6d346d76cb9f98da95dd4b5a4decf58f20578e24bfb2519a027e3dd81bb9ca98cf6a5aa717177067e66a2508cd853c12e661daa67264fc30d8b29da9050759541d06ab87b63d31b1aaa5e4e795f523c466127ae4ecdd34e", @typed={0x8, 0x8c, 0x0, 0x0, @u32=0x8}, @generic="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", @typed={0x8, 0x87, 0x0, 0x0, @pid=r4}, @generic="0fdbbc91477c52efaa6d57b469eea94ddb2f0bcbee5b34585e3e09a17fa715cfe3b1185cf9e8d7a8984c91b5af994f44fbf9dc1277e8bdfc712de1ba6d9be2e8063336892d0888a8bbec87cd3b287d55a1f5f2d05e53534e087d7d055f424f35c0b749b72a7a2982de896d6bfcdbb88175abb9b64ac6", @generic="f10907beb15f48fba673c829a7f5bf37d07065e824867c0ef8d705776964f373a3d387e73a63ba2f39cbc91af68c4b9d26255cce2905ba0271528aa45fc48ecd729daae8df8a55d65195d0a6cdacf39c37fcbfbcf65e375976ff90658191f7df553681109d1ecee284d8e9e3dc5d83e917a9c2d875c6aefdfa1e65fefeed0884b43c719307cfdbcf1d7052ea37c99e289ce0446e1058cfcf31603a1d0561abc671e5c54cdedbaf873e6c7608f293ef7aab04ee3b37cb3b89314766c387a5a366521de2226919a44b7f55f173bffba5eecc81e6bb88deae636c3e4c0c4a6ad0f967fcfb61", @generic="3dfaf91125e5fb780bece6702c3023ed219c38a2ad0c27cacede6656b00e85a25a013cae609d27c8d48e4e36", @generic="8bb863175fb533f75d07cfbef477ded7e5b9989b7223da5c1bc64fef2c56be46baccccb71119438d00ed91069b8ae1001e8db72791e93b77956128bd085e36b68f06fa0a4f4a9d9c8559a52e7778640ab734f647e58ccc67849ed501ed821e1231d85456318d9045b44b6a71"]}]}, 0x1278}], 0x1, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r8, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r9}}}, @rights={{0x2c, 0x1, 0x1, [r10, r3, r11, r12, r13, r14, r15]}}], 0xb0, 0x4048841}, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r16 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r16, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r16, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r18 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r19 = dup3(0xffffffffffffffff, r18, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r17, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r19, 0x400454da, &(0x7f0000000400)=r20) openat$cgroup_ro(r19, &(0x7f0000000200)='blkio.bfq.io_service_time\x00', 0x0, 0x0) 14:54:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x6f, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) dup3(0xffffffffffffffff, r3, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) (async) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) (async) 14:54:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x70, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc400, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x600, 0x20040006, 0xb00300}) 14:54:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x71, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x500, 0x20040006, 0xb00300}) 14:54:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r2, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000400)=r5) (async) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 14:54:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000080)=0x4, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x80010, r1, 0x4017f000) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x72, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000080)=0x4, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x80010, r1, 0x4017f000) 14:54:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xc800, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000080)=0x4, 0x4) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x80010, r1, 0x4017f000) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x73, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = accept$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000000c0)={0x0, 0x4}) 14:54:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x604, 0x20040006, 0xb00300}) 14:54:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x600, 0x20040006, 0xb00300}) 14:54:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xca03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x74, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0xb8, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xfb3}, @NL80211_ATTR_FRAME={0x7b, 0x33, @beacon={@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x4ba7}, @device_a, @device_b, @random="f3632a8c30a8", {0x0, 0x8be}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @void, @void, @val={0x5, 0x3, {0x1, 0x0, 0x24}}, @void, @val={0x2a, 0x1, {0x0, 0x1}}, @val={0x3c, 0x4, {0x0, 0x0, 0xac}}, @void, @void, @val={0x71, 0x7, {0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, 0x40}}, @void, [{0xdd, 0x6, "7b656aa0435f"}, {0xdd, 0x6, "6cc588419d4c"}, {0xdd, 0x12, '\a\x00'/18}, {0xdd, 0x6, "6514a3619e7b"}, {0xdd, 0x6, "2d6e22385fd4"}]}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x0, 0x0]}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0xc, 0xcd, [0x0, 0x0, 0x0, 0x0]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x400, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x95b, 0x49}}}}, [@NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x361}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="74f5050f01000000983e3543d94293b422f7afb8ca6a0990d4c03ecb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086010000000002020210e1413f5d38752c7b8d4f36a266f895009c245ceabff48ea62eeba3d577cb967888f5e4b85bd0f650b2b5b6b1088d5228d9fff8fc7e51b9314bfc3d81b0a3bc0f8869fa68c6b2f4afb0c275bee3896031902a6829b5abf3eca454d699e6dc1d57aef47583ed01caab1437474e7c03f74afabb8d8f0db22360ef772e7fac"]}) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000400)=r7) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r10 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r10, 0x4140, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r10, 0x660c) r11 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r12 = dup3(0xffffffffffffffff, r11, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r9, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r12, 0x400454da, &(0x7f0000000400)=r13) r14 = openat$cgroup_ro(r12, &(0x7f0000000080)='memory.swap.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r14, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x6cb, 0x20040006, 0xb00300}) 14:54:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = accept$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000000c0)={0x0, 0x4}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) accept$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) (async) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000000c0)={0x0, 0x4}) (async) 14:54:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x700, 0x20040006, 0xb00300}) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x75, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xcc01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0xb8, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xfb3}, @NL80211_ATTR_FRAME={0x7b, 0x33, @beacon={@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x4ba7}, @device_a, @device_b, @random="f3632a8c30a8", {0x0, 0x8be}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @void, @void, @val={0x5, 0x3, {0x1, 0x0, 0x24}}, @void, @val={0x2a, 0x1, {0x0, 0x1}}, @val={0x3c, 0x4, {0x0, 0x0, 0xac}}, @void, @void, @val={0x71, 0x7, {0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, 0x40}}, @void, [{0xdd, 0x6, "7b656aa0435f"}, {0xdd, 0x6, "6cc588419d4c"}, {0xdd, 0x12, '\a\x00'/18}, {0xdd, 0x6, "6514a3619e7b"}, {0xdd, 0x6, "2d6e22385fd4"}]}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x0, 0x0]}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0xc, 0xcd, [0x0, 0x0, 0x0, 0x0]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x400, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x95b, 0x49}}}}, [@NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x361}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) dup3(0xffffffffffffffff, r5, 0x80000) (async) r6 = dup3(0xffffffffffffffff, r5, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="74f5050f01000000983e3543d94293b422f7afb8ca6a0990d4c03ecb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086010000000002020210e1413f5d38752c7b8d4f36a266f895009c245ceabff48ea62eeba3d577cb967888f5e4b85bd0f650b2b5b6b1088d5228d9fff8fc7e51b9314bfc3d81b0a3bc0f8869fa68c6b2f4afb0c275bee3896031902a6829b5abf3eca454d699e6dc1d57aef47583ed01caab1437474e7c03f74afabb8d8f0db22360ef772e7fac"]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="74f5050f01000000983e3543d94293b422f7afb8ca6a0990d4c03ecb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086010000000002020210e1413f5d38752c7b8d4f36a266f895009c245ceabff48ea62eeba3d577cb967888f5e4b85bd0f650b2b5b6b1088d5228d9fff8fc7e51b9314bfc3d81b0a3bc0f8869fa68c6b2f4afb0c275bee3896031902a6829b5abf3eca454d699e6dc1d57aef47583ed01caab1437474e7c03f74afabb8d8f0db22360ef772e7fac"]}) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000400)=r7) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) r10 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r10, 0x4140, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r10, 0x4140, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r10, 0x660c) (async) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r10, 0x660c) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) (async) r11 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r12 = dup3(0xffffffffffffffff, r11, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r9, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r12, 0x400454da, &(0x7f0000000400)=r13) r14 = openat$cgroup_ro(r12, &(0x7f0000000080)='memory.swap.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r14, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x76, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xcc03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x700, 0x20040006, 0xb00300}) 14:54:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x900, 0x20040006, 0xb00300}) 14:54:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) (async) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0xb8, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xfb3}, @NL80211_ATTR_FRAME={0x7b, 0x33, @beacon={@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x4ba7}, @device_a, @device_b, @random="f3632a8c30a8", {0x0, 0x8be}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @void, @void, @val={0x5, 0x3, {0x1, 0x0, 0x24}}, @void, @val={0x2a, 0x1, {0x0, 0x1}}, @val={0x3c, 0x4, {0x0, 0x0, 0xac}}, @void, @void, @val={0x71, 0x7, {0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, 0x40}}, @void, [{0xdd, 0x6, "7b656aa0435f"}, {0xdd, 0x6, "6cc588419d4c"}, {0xdd, 0x12, '\a\x00'/18}, {0xdd, 0x6, "6514a3619e7b"}, {0xdd, 0x6, "2d6e22385fd4"}]}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x0, 0x0]}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0xc, 0xcd, [0x0, 0x0, 0x0, 0x0]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x400, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x95b, 0x49}}}}, [@NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x361}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40) (async) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x80000) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="74f5050f01000000983e3543d94293b422f7afb8ca6a0990d4c03ecb315bd26d0d9021c7f6", @ANYRES32=r1, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086010000000002020210e1413f5d38752c7b8d4f36a266f895009c245ceabff48ea62eeba3d577cb967888f5e4b85bd0f650b2b5b6b1088d5228d9fff8fc7e51b9314bfc3d81b0a3bc0f8869fa68c6b2f4afb0c275bee3896031902a6829b5abf3eca454d699e6dc1d57aef47583ed01caab1437474e7c03f74afabb8d8f0db22360ef772e7fac"]}) (rerun: 64) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000400)=r7) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500009400000000002f9078ac141400e0000002071769e0000001ac1414aa7f00ef00ac14143cac1e000144080000000000000707007f00000144440001e0000001000000000000000000000000ffffffff000000000000000000ac141400020000000000000100000000ff8ff34a80a9ced6db141400000000004414000000000020000000000000d790000000000000706ba640311b20549370a3e26b318c7dc707021f5edab9a1af0d9ce078b82e6c0256efa446186d4c311c00407700ceba128fd9acdc1e0d9d9e258de15b817e4b502c65fbdc5dd9f14d8d6785758e10fe6c7c1bf272b1360d449807416ad59357a62ffc4e0df79bb2dd682b354a56a925fa8a12db10510a85f4cf67e9675294c0b18571844bbfd77e388acc8564a5ffc13b270c3fe5b7423e4300be561f4a1f9eca003de13a645f"]}) (async) r10 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r10, 0x4140, 0x0) (async, rerun: 32) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r10, 0x660c) (rerun: 32) r11 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x800, 0x0) r12 = dup3(0xffffffffffffffff, r11, 0x80000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="74f505ee000000009de4965e5f4c042d22f7afb8ca6a0990f4c045cb315bd26d0d9021c7f6", @ANYRES32=r9, @ANYBLOB="0001004000000000000000054b03002c00670000b3299078e00000020000000086180000000002020210e1413f5d38752c7b8d4f36a266f8"]}) ioctl$TUNSETIFINDEX(r12, 0x400454da, &(0x7f0000000400)=r13) (async) r14 = openat$cgroup_ro(r12, &(0x7f0000000080)='memory.swap.current\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r14, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = accept$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000000c0)={0x0, 0x4}) (async) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000000c0)={0x0, 0x4}) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7a, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7b, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xd003, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xa00, 0x20040006, 0xb00300}) 14:54:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x8cb, 0x20040006, 0xb00300}) 14:54:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xfffffffffffffffd, 0x20040006, 0xb00300}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)={0x3, 'vxcan1\x00', {0x9}, 0x1000}) r2 = socket$qrtr(0x2a, 0x2, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) ftruncate(r3, 0xfffb) 14:54:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x208040, 0x0) sendfile(r1, r2, &(0x7f0000000080)=0xb7, 0x7ff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@private1}}, {{@in=@loopback}, 0x0, @in6=@private0}}, &(0x7f00000001c0)=0xe8) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7c, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xfffffffffffffffd, 0x20040006, 0xb00300}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)={0x3, 'vxcan1\x00', {0x9}, 0x1000}) (async) r2 = socket$qrtr(0x2a, 0x2, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) (async) ftruncate(r3, 0xfffb) [ 1007.212783][ T3249] Bluetooth: hci1: command 0x0419 tx timeout 14:54:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xda03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7d, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xb00, 0x20040006, 0xb00300}) 14:54:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x8ff, 0x20040006, 0xb00300}) 14:54:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async, rerun: 32) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x208040, 0x0) (rerun: 32) sendfile(r1, r2, &(0x7f0000000080)=0xb7, 0x7ff) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@private1}}, {{@in=@loopback}, 0x0, @in6=@private0}}, &(0x7f00000001c0)=0xe8) 14:54:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xfffffffffffffffd, 0x20040006, 0xb00300}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)={0x3, 'vxcan1\x00', {0x9}, 0x1000}) socket$qrtr(0x2a, 0x2, 0x0) (async) r2 = socket$qrtr(0x2a, 0x2, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4140, 0x0) ftruncate(r3, 0xfffb) (async) ftruncate(r3, 0xfffb) [ 1007.372715][ T3249] Bluetooth: hci4: command 0x040f tx timeout 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x82, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:54:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x900, 0x20040006, 0xb00300}) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x83, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:54:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xdc03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xc00, 0x20040006, 0xb00300}) 14:54:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4140, 0x0) (async) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x208040, 0x0) sendfile(r1, r2, &(0x7f0000000080)=0xb7, 0x7ff) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@private1}}, {{@in=@loopback}, 0x0, @in6=@private0}}, &(0x7f00000001c0)=0xe8) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x84, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xde03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x85, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xd00, 0x20040006, 0xb00300}) 14:54:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x90e, 0x20040006, 0xb00300}) 14:54:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5, 0x20040006, 0xb00300}) 14:54:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) (async) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0xa, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xe602, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5, 0x20040006, 0xb00300}) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5, 0x20040006, 0xb00300}) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x911, 0x20040006, 0xb00300}) 14:54:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xe00, 0x20040006, 0xb00300}) 14:54:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xe801, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x2, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x1100, 0x20040006, 0xb00300}) 14:54:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x912, 0x20040006, 0xb00300}) 14:54:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x5, 0x20040006, 0xb00300}) 14:54:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x3, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xeb00, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xa00, 0x20040006, 0xb00300}) 14:54:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, 'memory.events\x00'}, {0x20, '*T('}, {0x20, 'memory.events\x00'}], 0xa, "6dd720b789c9db23626efa22dcf01043551ef2af8353e29d8df5b604bfede590f44c1f441a07b1b06b9119dfe2d2e2ba64698e88c8feba00484642dec2bf76617e756e194ea81ec9ee47b20109b286f0628053847c39158f822b9799eb82656221d85c2d0daea6400b78aa0522e60535b2a7aa9acc0e266c534f79da3df5e9e9e7d64c67fb34ed8f89a3496e005cf80f6a41b9491dbbd631652877825107fee891d830d486229dadf8a46169d3f2d3"}, 0xd6) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x7, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x1200, 0x20040006, 0xb00300}) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x300, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x700, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xee01, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x17ff, 0x20040006, 0xb00300}) 14:54:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xb00, 0x20040006, 0xb00300}) 14:54:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) dup(0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, 'memory.events\x00'}, {0x20, '*T('}, {0x20, 'memory.events\x00'}], 0xa, "6dd720b789c9db23626efa22dcf01043551ef2af8353e29d8df5b604bfede590f44c1f441a07b1b06b9119dfe2d2e2ba64698e88c8feba00484642dec2bf76617e756e194ea81ec9ee47b20109b286f0628053847c39158f822b9799eb82656221d85c2d0daea6400b78aa0522e60535b2a7aa9acc0e266c534f79da3df5e9e9e7d64c67fb34ed8f89a3496e005cf80f6a41b9491dbbd631652877825107fee891d830d486229dadf8a46169d3f2d3"}, 0xd6) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xee02, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty=0x2}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x1800, 0x20040006, 0xb00300}) 14:54:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xc00, 0x20040006, 0xb00300}) 14:54:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, 'memory.events\x00'}, {0x20, '*T('}, {0x20, 'memory.events\x00'}], 0xa, "6dd720b789c9db23626efa22dcf01043551ef2af8353e29d8df5b604bfede590f44c1f441a07b1b06b9119dfe2d2e2ba64698e88c8feba00484642dec2bf76617e756e194ea81ec9ee47b20109b286f0628053847c39158f822b9799eb82656221d85c2d0daea6400b78aa0522e60535b2a7aa9acc0e266c534f79da3df5e9e9e7d64c67fb34ed8f89a3496e005cf80f6a41b9491dbbd631652877825107fee891d830d486229dadf8a46169d3f2d3"}, 0xd6) 14:54:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) dup(0xffffffffffffffff) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty=0x3}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty=0x7}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xee03, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:54:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x1fff, 0x20040006, 0xb00300}) 14:54:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xd00, 0x20040006, 0xb00300}) 14:54:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%p \x00'}, 0x20) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) copy_file_range(r1, &(0x7f0000000100)=0x400, r2, 0x0, 0x4, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x2, 0x8000000000000000, 0x2, 0xb00300}) 14:54:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) dup(0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty=0x300}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 1: fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0xb00300}) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000080)) 14:54:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%p \x00'}, 0x20) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) copy_file_range(r1, &(0x7f0000000100)=0x400, r2, 0x0, 0x4, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x2, 0x8000000000000000, 0x2, 0xb00300}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)='%p \x00'}, 0x20) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4140, 0x0) (async) copy_file_range(r1, &(0x7f0000000100)=0x400, r2, 0x0, 0x4, 0x0) (async) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x2, 0x8000000000000000, 0x2, 0xb00300}) (async) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty=0x700}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) socket$igmp6(0xa, 0x3, 0x2) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x88080, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006b00)={{{@in, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000006c00)=0xe8) r4 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r4, r6, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = openat$cgroup_procs(r7, 0x0, 0x2, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f0000000000), 0x400000000000041, 0x0) fstat(r8, 0x0) ioctl$TIOCGSID(r7, 0x5429, 0x0) write(r3, &(0x7f0000000080)="8bebd10b2000fe7af54339991329e158b97833fa5943cf54d3420728bc835fbb997b2fb706de1f6ff638e1a35275813fdb28ac264c57233b070f1318e7dd5720d2d9b6abcff909da0d4f1d608b373a1fe0aca1e5f22f16c144aaaf3fe7cae2689f9aec2fbaa550c50ff6658cd02ebfd8963543e23a41d2fbdb6c7b60a7672abfda966688de28867b40352c7334f3596e103d180d4cdb4971153bef9086cb3253443d73ccda0a16975affea4fcf004a4f243a2ca12c9ca76533b194c869", 0xbd) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r10, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0xe00, 0x20040006, 0xb00300}) 14:54:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e131}, 0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003400)={0x0, @in={{0x2, 0x0, @empty=0x2000000}}}, &(0x7f00000034c0)=0x9c) 14:54:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='ext4_allocate_blocks\x00', r0}, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006f00)={0x2020}, 0x2020) add_key$user(&(0x7f00000003c0), 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x2000, 0x20040006, 0xb00300}) [ 1009.429063][T16182] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.464493][ T3249] Bluetooth: hci4: command 0x0419 tx timeout [ 1009.472904][ T3249] ------------[ cut here ]------------ [ 1009.478383][ T3249] WARNING: CPU: 0 PID: 3249 at kernel/workqueue.c:1453 __queue_work+0xbaf/0xd00 [ 1009.487604][ T3249] Modules linked in: [ 1009.491507][ T3249] CPU: 0 PID: 3249 Comm: kworker/0:3 Not tainted 5.15.139-syzkaller #0 [ 1009.499765][ T3249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 1009.509917][ T3249] Workqueue: events hci_cmd_timeout [ 1009.515212][ T3249] RIP: 0010:__queue_work+0xbaf/0xd00 [ 1009.520508][ T3249] Code: 7c 24 10 e8 c3 4c 77 00 e9 1c fd ff ff e8 c9 96 2d 00 89 ee 48 c7 c7 80 0d 7d 8c e8 eb 36 d6 02 e9 64 fc ff ff e8 b1 96 2d 00 <0f> 0b 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 9b 96 2d 00 [ 1009.540208][ T3249] RSP: 0018:ffffc90002e2faf8 EFLAGS: 00010093 [ 1009.546275][ T3249] RAX: ffffffff81528d1f RBX: 00000000000b0012 RCX: ffff888018840000 [ 1009.554434][ T3249] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 1009.562397][ T3249] RBP: 0000000000010000 R08: ffffffff8154c395 R09: ffffed1010e83167 [ 1009.570397][ T3249] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1009.578448][ T3249] R13: ffff8880782e0800 R14: 0000000000000008 R15: 1ffff920005c5f74 [ 1009.586420][ T3249] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1009.595518][ T3249] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1009.602090][ T3249] CR2: 0000001b2bd23000 CR3: 000000001861b000 CR4: 00000000003506f0 [ 1009.610060][ T3249] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1009.618196][ T3249] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1009.626246][ T3249] Call Trace: [ 1009.629519][ T3249] [ 1009.632529][ T3249] ? __warn+0x15b/0x300 [ 1009.636826][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.641690][ T3249] ? report_bug+0x1b7/0x2e0 [ 1009.646190][ T3249] ? handle_bug+0x3d/0x70 [ 1009.650517][ T3249] ? exc_invalid_op+0x16/0x40 [ 1009.655186][ T3249] ? asm_exc_invalid_op+0x16/0x20 [ 1009.660291][ T3249] ? kthread_data+0x45/0xc0 [ 1009.664792][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.669465][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.674134][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.678796][ T3249] ? bt_err+0x123/0x170 [ 1009.682997][ T3249] ? queue_work_on+0xf6/0x250 [ 1009.687662][ T3249] ? lockdep_hardirqs_off+0x70/0x100 [ 1009.692958][ T3249] queue_work_on+0x14b/0x250 [ 1009.697541][ T3249] ? wq_worker_last_func+0x40/0x40 [ 1009.702648][ T3249] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1009.708540][ T3249] ? do_raw_spin_unlock+0x137/0x8b0 [ 1009.713820][ T3249] ? hci_cmd_timeout+0x174/0x230 [ 1009.718752][ T3249] process_one_work+0x8a1/0x10c0 [ 1009.723690][ T3249] ? worker_detach_from_pool+0x260/0x260 [ 1009.729315][ T3249] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1009.734853][ T3249] ? kthread_data+0x4e/0xc0 [ 1009.739346][ T3249] ? wq_worker_running+0x97/0x170 [ 1009.744362][ T3249] worker_thread+0xaca/0x1280 [ 1009.749049][ T3249] kthread+0x3f6/0x4f0 [ 1009.753112][ T3249] ? rcu_lock_release+0x20/0x20 [ 1009.757952][ T3249] ? kthread_blkcg+0xd0/0xd0 [ 1009.762536][ T3249] ret_from_fork+0x1f/0x30 [ 1009.766975][ T3249] [ 1009.769985][ T3249] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1009.777538][ T3249] CPU: 0 PID: 3249 Comm: kworker/0:3 Not tainted 5.15.139-syzkaller #0 [ 1009.785763][ T3249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 1009.795903][ T3249] Workqueue: events hci_cmd_timeout [ 1009.801100][ T3249] Call Trace: [ 1009.804367][ T3249] [ 1009.807284][ T3249] dump_stack_lvl+0x1e3/0x2cb [ 1009.811956][ T3249] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1009.817779][ T3249] ? panic+0x84d/0x84d [ 1009.821841][ T3249] ? __queue_work+0xb90/0xd00 [ 1009.826510][ T3249] ? __queue_work+0xb90/0xd00 [ 1009.831181][ T3249] panic+0x318/0x84d [ 1009.835075][ T3249] ? __warn+0x16a/0x300 [ 1009.839222][ T3249] ? fb_is_primary_device+0xcc/0xcc [ 1009.844414][ T3249] ? ret_from_fork+0x1f/0x30 [ 1009.849001][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.853665][ T3249] __warn+0x2b2/0x300 [ 1009.857643][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.862307][ T3249] report_bug+0x1b7/0x2e0 [ 1009.866630][ T3249] handle_bug+0x3d/0x70 [ 1009.870799][ T3249] exc_invalid_op+0x16/0x40 [ 1009.875298][ T3249] asm_exc_invalid_op+0x16/0x20 [ 1009.880227][ T3249] RIP: 0010:__queue_work+0xbaf/0xd00 [ 1009.885677][ T3249] Code: 7c 24 10 e8 c3 4c 77 00 e9 1c fd ff ff e8 c9 96 2d 00 89 ee 48 c7 c7 80 0d 7d 8c e8 eb 36 d6 02 e9 64 fc ff ff e8 b1 96 2d 00 <0f> 0b 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 9b 96 2d 00 [ 1009.905274][ T3249] RSP: 0018:ffffc90002e2faf8 EFLAGS: 00010093 [ 1009.911427][ T3249] RAX: ffffffff81528d1f RBX: 00000000000b0012 RCX: ffff888018840000 [ 1009.919410][ T3249] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 1009.927377][ T3249] RBP: 0000000000010000 R08: ffffffff8154c395 R09: ffffed1010e83167 [ 1009.935344][ T3249] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1009.943329][ T3249] R13: ffff8880782e0800 R14: 0000000000000008 R15: 1ffff920005c5f74 [ 1009.951322][ T3249] ? kthread_data+0x45/0xc0 [ 1009.955819][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.960523][ T3249] ? __queue_work+0xbaf/0xd00 [ 1009.965199][ T3249] ? bt_err+0x123/0x170 [ 1009.969346][ T3249] ? queue_work_on+0xf6/0x250 [ 1009.974014][ T3249] ? lockdep_hardirqs_off+0x70/0x100 [ 1009.979291][ T3249] queue_work_on+0x14b/0x250 [ 1009.983885][ T3249] ? wq_worker_last_func+0x40/0x40 [ 1009.988985][ T3249] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1009.994870][ T3249] ? do_raw_spin_unlock+0x137/0x8b0 [ 1010.000067][ T3249] ? hci_cmd_timeout+0x174/0x230 [ 1010.004998][ T3249] process_one_work+0x8a1/0x10c0 [ 1010.010224][ T3249] ? worker_detach_from_pool+0x260/0x260 [ 1010.015853][ T3249] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1010.021389][ T3249] ? kthread_data+0x4e/0xc0 [ 1010.025893][ T3249] ? wq_worker_running+0x97/0x170 [ 1010.030911][ T3249] worker_thread+0xaca/0x1280 [ 1010.035599][ T3249] kthread+0x3f6/0x4f0 [ 1010.039660][ T3249] ? rcu_lock_release+0x20/0x20 [ 1010.044503][ T3249] ? kthread_blkcg+0xd0/0xd0 [ 1010.049083][ T3249] ret_from_fork+0x1f/0x30 [ 1010.053500][ T3249] [ 1010.056679][ T3249] Kernel Offset: disabled [ 1010.061385][ T3249] Rebooting in 86400 seconds..