Extracting prog: 48m28.14951042s Minimizing prog: 51m27.772822061s Simplifying prog options: 0s Extracting C: 28.902205713s Simplifying C: 9m29.348490823s 30 programs, timeouts [15s 1m40s 6m0s] extracting reproducer from 30 programs single: executing 5 programs separately with timeout 15s testing program (duration=15s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_netfilter-socket$nl_generic-ioctl$F2FS_IOC_MOVE_RANGE-socket$inet6_tcp-bind$inet6-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$inet6-connect$inet6-sendmmsg$inet-setsockopt$inet6_int-setsockopt$inet6_tcp_int-sendto$inet6-shutdown detailed listing: executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash testing program (duration=15s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): unshare-syz_init_net_socket$nl_generic-syz_genetlink_get_family_id$nl802154-sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS detailed listing: executing program 0: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) program did not crash testing program (duration=15s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): getsockopt$bt_hci-sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL-socket-socket$nl_generic-ioctl$sock_SIOCINQ-bpf$BPF_PROG_DETACH-syz_genetlink_get_family_id$devlink-socketpair$unix-socket$inet6_sctp-setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD-bpf$PROG_LOAD-gettid-sendmsg$DEVLINK_CMD_RELOAD detailed listing: executing program 0: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) program did not crash testing program (duration=15s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route-socket-getsockname$packet-getsockopt$sock_cred-setsockopt$inet6_IPV6_XFRM_POLICY-bpf$BPF_GET_MAP_INFO detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) program did not crash testing program (duration=15s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): epoll_create1-socket$inet_udp-socketpair$unix-prlimit64-sched_setscheduler-getpid-mmap-socketpair$unix-connect$unix-sendmmsg$unix-recvmmsg-socketpair$nbd-readv-memfd_create-close_range-socket$unix-openat$procfs-lseek detailed listing: executing program 0: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) program did not crash single: failed to extract reproducer bisect: bisecting 30 programs with base timeout 15s testing program (duration=22s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 7, 15, 30, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$unix(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)='%', 0x1}], 0x1}}], 0x4dc, 0x0) executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001c0073fc000000000000000007000003", @ANYRES32=r2, @ANYBLOB="030044000a000200bbbbbbbbbbbb00000c000e80050001"], 0x34}}, 0x0) executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1204"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) executing program 4: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000c, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653da7e6fcea6f2619072c749570653d1213"], 0x1, 0x6e7, &(0x7f00000011c0)="$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") r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x41, 0x3, 0x200, 0x98, 0x68, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @broadcast, 0x0, 0x0, 'hsr0\x00', 'wg1\x00'}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r1, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000e00)="c52bf9fe7a1f000000000000000000000000000949b19f9f2a3e89c64018cb1d166d270fd661edd970436e61640d6d27e1cb575af64b32e1b7fae35c9284bc95c9bb5c16b79c977ba5d24a43a864bbd57fc9e5c8e3cc4e5036de6b77a9cbe61214215e3d878d5881f45f9b31e2b9e26717ce2442d4765b55659ed6eafe23e9e500c1c2eecc13ea8882deb1b346d5371abd5fac2c59fd53c69d157d2744c1ef95c5cc4f25227044dd335c", 0xaa}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000002900000043000000000000000000000014000000000002f6fcff0000000014000000000000002900000008000000010000daca000000"], 0x48}}, {{&(0x7f0000000380)={0xa, 0x4e21, 0x5, @remote, 0x5}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000080000029000000360000003c00000000170000c204ffdffc0100003d26b4ffdb07aac8d3f4fb4e05145d64ade70bfceb745db4e789f655c5eeb94deaa4e0fa4d4aa116e5c19aab9a2f4033b73cd93f6c2b32c82dda68440180756ac2ba9110d8a27a"], 0x20}}], 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x62, 0x12141, 0x0) ftruncate(r2, 0x9) unshare(0x68040200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x0, 0xfffffffd]}, &(0x7f0000000000)=0x54) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000d80)={0xd, 0x9}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns bisect: bisecting 30 programs bisect: split chunks (needed=false): <30> bisect: split chunk #0 of len 30 into 3 parts bisect: testing without sub-chunk 1/3 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [4, 7, 1, 3, 13, 3, 4, 7, 15, 30, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$unix(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)='%', 0x1}], 0x1}}], 0x4dc, 0x0) executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001c0073fc000000000000000007000003", @ANYRES32=r2, @ANYBLOB="030044000a000200bbbbbbbbbbbb00000c000e80050001"], 0x34}}, 0x0) executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1204"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) executing program 4: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000c, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653da7e6fcea6f2619072c749570653d1213"], 0x1, 0x6e7, &(0x7f00000011c0)="$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") r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x41, 0x3, 0x200, 0x98, 0x68, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @broadcast, 0x0, 0x0, 'hsr0\x00', 'wg1\x00'}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r1, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000e00)="c52bf9fe7a1f000000000000000000000000000949b19f9f2a3e89c64018cb1d166d270fd661edd970436e61640d6d27e1cb575af64b32e1b7fae35c9284bc95c9bb5c16b79c977ba5d24a43a864bbd57fc9e5c8e3cc4e5036de6b77a9cbe61214215e3d878d5881f45f9b31e2b9e26717ce2442d4765b55659ed6eafe23e9e500c1c2eecc13ea8882deb1b346d5371abd5fac2c59fd53c69d157d2744c1ef95c5cc4f25227044dd335c", 0xaa}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000002900000043000000000000000000000014000000000002f6fcff0000000014000000000000002900000008000000010000daca000000"], 0x48}}, {{&(0x7f0000000380)={0xa, 0x4e21, 0x5, @remote, 0x5}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000080000029000000360000003c00000000170000c204ffdffc0100003d26b4ffdb07aac8d3f4fb4e05145d64ade70bfceb745db4e789f655c5eeb94deaa4e0fa4d4aa116e5c19aab9a2f4033b73cd93f6c2b32c82dda68440180756ac2ba9110d8a27a"], 0x20}}], 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x62, 0x12141, 0x0) ftruncate(r2, 0x9) unshare(0x68040200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x0, 0xfffffffd]}, &(0x7f0000000000)=0x54) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000d80)={0xd, 0x9}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/3 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$eJzs3U9oHGUUAPC3mU02kdbkIIiCMHoTNLRVEL2YUlIo7qXKUvUgLjZVycZCgovpIZt4EY+CRz1586AHD715EfxDbx68WkGq4kF7K1g6Mruz/7K7MVTSGvz9Dsvrm/fm+2b3ozvZsF9eXYrV89Nx4fr1azE7W4ry0qmluFGKhUiiaztGzYzJAQCHw40siz+zjogv99NSOvhZAQAHqf3+//rRgcy7X+9Vn3n3B4BDr/j5f24wl+yqmZ3UfPHApgUAHKDhz/8j4pGRkoFf9ZdH7g0AgMPnhZdefu5kNeL5NJ2NWHuvWWvW4pn+8ZMX4s1oxEoci/m4GdG5UcgfSu3H02eqy8fSNG3FLwtRyzuatYi1VrPWuVM4mbT7K3E85mOh6C/uNrIsS05/UV0+nrZFxHarPX6slZq16Zgrxv/xnliJE5HGfSP9EWeqyyfS4gS1tW7/dMRO/3OLfP6LMR/fvxYXoxHnI+/t3tZUl7eOp+mprHqk1O9vNWuVdl3HxE9AAAAAAAAAAAAAAAAAAAAAAADgtiymPQu9/XOy/v49i4tjjrf3x+n0F/sD7XT2B8oqWWTZH+88Xns/iaH9gXbtz9Nq1soxdXcvHQAAAAAAAAAAAAAAAAAAAP4zNjZnot5orKxvbF5aHQxa6xubUxGRZ9767rOv5mK4Zq44wXDXUFAuSorMt0lE2u/Kkm5xlvRqBtqTfPBSuZP59HJvxoM1ld5VjJ1GZfKhRuPowz9/1M88lHTPfKtfk8TY67qU7JrGYLB2b2dKk5+WPYIT/1BzNcuySe1br4x2RSmiPHGqtxlkefDNtTceeGKjuwiyjkcfmz939cNPflutN/KRc43GzPrGzWy1Xvx7/GKbHCT99bNeKhZbaXAllOtP3jp7ZMKZd4Yz9eSH31988IMrRWZq75cpO3eln3l7TE3SGfTz3YdmOkE+zd6hZ/Mgf45GzzM9ZvGPC56Kf/XC3f/xUv3y1k+/7qt4u94Y+E/CRh0AAAAAAAAAAAAAAAAAAHBHDHxXvFB82Xd6r66nzx78zAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgzun//f9eEFM7uzL7C/5qRTdzLrqHKvkJY2ZgxIW7eLUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPxf/R0AAP//30Njcw==") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 3/3 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 7, 15, 30] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="755a72713580f1de894995bcb70ee30893ac1bf325048067d62471d29311f7f8ad70b96cf702484d957e696525aab3e74b4ee315ce850a51b11b29141f14931bc896b74f0256b10749359406885662b20f1ce1fe07dd84186c9a0236132cfb5db13327df9441ec4eaa429fd06a34641833b9c8cd1f68bb82bfb1c05831749adfb46d3e594b654ac37670f066104feb0e3bdb9c2207ecb16f59c4970ef1b01c23390509d17aa71408c0deb6f7bdb840f51bfc8186216c72d7fd90da80f8e90630cb32676765c42c94fe88cbe1babdc7ca6337ffc9d7b252dc2f086520cc78fb25a456abd93d9b009d5d8360bd4c90cfab977cefe21e486a777f61cf4cc5673792fc242aadd9d17d8b4b75b37bbfd0852a7ba8043543788aaaf84b8b27e3b11a9923b705483eb01e0b9c3a88e225513376c286519d6e4350d4af40e710170b626dd81e53dd077ce7aabd19739d613ab9ce61a68ec15de10d278adc4625c90e054c8b0bfa422d6b559388269e1adaa21ff892c5c0746600674bf85ee0bf46a091689e48218bd28d5b1a976fb382677ff5f34aaccca74630515f63fb8d55280a5c2e02fe1fdc84d70e67a2844b362da133a57d4a2fc8c962e6f1ca7369d8544e37af8fb2ce0fde29e051a1b60a4fa9bfb4af222106a9e36f3351ad7820ce6003f4bbe749eebe90d1f625ba875c92bde06027c156ef984e2f0b5a2cb1b202054cc7f1da98b7075b1b7421608c40095cb64c67231014d22bd4af9728735abbe3b6adc034a3450d94fb3ef2b3ceaf775a3c1b24886326dd7d9a65c1cd66b50454d387f40701fd79acf6a7fcbb54f06a9832676f37ea1337079f269a178793667773ca2f28d418c4414fc096701f99fe33ad1799f9a6ff2047aed32bb8faf8312cd19bcc694b32b777ae4efcca62c30669f987dcb7825ef010dcde0d35c183d297fb9abd8902fccefef7389b94f80116ab8bbc6b4be4fc26ba09f07b01a4ba5e6329fee5d8a529c30ab6b191346a43d30cb9666b695880ee7899aba003620f3cc4439e691c617a510e2d33a9c19edf301e4b123096846cf5aa424150e951964d43d9039a2cca286a3f6338cb38e3a86fba4541e3ed5b1ed873cef371b23a0d39f262e6189a8b7779965868ae20f3541479aa8010f7336c1dc0e6d86efa18ee7bef5561bf7b333c64787e37c2442d240295237e1e70f6e41cc2166d275d8ba1b6d1cfc463936198ec09842a710fcb035336fd9d45d82c095b3cccfab8e1fb477daf4e463b50feef3ed065ba6f6640dc1e825f485d52bae9a0fac782fe3cb273db12cb665ffb0a5f656df8879c26a85fe40d50c9fc6417c35ab00b1fc277db1dcb24b1d8477745262a910f9c79a1a0be9401822291ab99198fc47102aaef14298a739e2104b38ae3527bd4b3430fb6e577bcb936e815e909c1815f8c97a44ff3083b7a7a15"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$eJzs3c1vHOd9B/Dv8EWiaUOSbdV1BdlayZVM2yxFUrVUQYdWIlcSXb4UJAVY6MFyLaoQxNat3QK2UaAyUPRUoQVa9NDejJxyEuBLfAl8S27JKYcAgf8FIycFCMBgZpfSklxySYUiafnzIXZ3Xn7zPL/ZmZ2Huzs7T/huWTq4Ymxpqbptdby7Of7DnUiZvevS+Ddf3L9X3j6/m33pztvFj5K+JLWkJ8nLSe/Y+OzMVIeC7iQ3knydFEn2p/G4KTdS/GeeezT+dYr/L+td177NlkwnS3yv7fb+BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAe1ExNj48PFLsy8T0tXdrDUltjbHx2ZkiS0tr5ywv0/BV1et38VXHepOivKWvb7mr75cPP5r9UpLaiRxtjB2tOiRPXz579qVDF17s6Vpefr1sfi/7N1/sx59+duf9xcWFj55IInvflfr0xNzMxNTFK/XaxNxM7fzZs8Onr16eq12emKzPXZ+br0/VxmbrF+dnZmsDY2/URs6fP1OrD12fuTZ9ZXxosr488dyfjA4Pn629M/RX9YuzczPTp98Zmhu7OjE5OTF9pYopZ5cx58od8S8n5mvz9YtTtdqt24sLZ1bl1J1V+28ZNNJpTcqg0U5Bo8OjoyMjo6Mjnzd7z3444ezb598+NzzcM7xK1kQ8oZ2WveWZ9Tfz9h/E4TF1Ndr/ZDITmc61vJta27+xjGc2M5laZ35TT3VffHXydH3Delvb/6OtizYcKe9O5NXmaN867f86uezc38f5NJ/lTt7PYhazkI92PaOd/buSeqYzkbnMZCJTuVhNqTWn1HI+Z3M2w3kvV3Msc6nlciYymXrmcj1zmU+92qPGMpt6LmY+M5lNLQMZyxupZSTncz5nUks9Q7memVzLdK5kPBerUm7ldvW8n9kgx4dBI5sJGm2Z2L0qaE1jvuX2v776nxO+d7b9GA6Pa6nZ/u/rHDowthMJAQAAANvuj36aA4df+MmvkiKvVJ/LX56YrA/vdloAAADANqq++T+aIuktR19J4f0/AAAAPG2K6jd2RZL+HGsMLf8SyocAAAAA8JSoLtf3aopjjyZ4/w8AAABPmc7X2O8YUQwuX/63drPxeLMZ0Rgr+i9PTNaHxmYmL4zkVHWVgeqXBmtK606K3urnB2/meCPqeH/jsf9RiWWdfWXUyNCFkbyZE80VGXitfHhtoE3kaCPy9Ubk662R3VkReWbogutzAvD0O7FBe7zZ9v/NDDYiBo9UTX7PkTZt8HDZBgMAe8HDPnZ+0+zSrE3734x4db32/083eP9fRryQW8capxQM5YN8mMXczGCaZxwca1fqcm8EjdMQBjt8GtDfPGXh5+e6Mrjm84C+h+vaGruQ0Qy2/USgpdxiOYczjbjuJ7MNAGCnndiwHd5c+z/Y4f1/v1MKAWBPediDfTXQs2bKdgzs9joCACtppQEAAAAAAAAAAAAAAAAAAAAAAAAAAGD7beoC/j87lSwuLiTb3jXABgN9W8lw44Gu7FDOuz7QnWS3av/zrJm1tJRstFS5jffKU2dg5cAuH5gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYEUXS3W56V7I/yXCS0zuf1ZNzd7cT2C61x1useJAH+SQHtjsdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvu+b1/7vSeHy2MSk9XcnJJDeS/PVu57g9Gt0cPNjtNHbN31X3Ldf/70p6s1Skp7HZU/SOjc/OTJWbv9hfzv/mi/v3ylvnstf2qlAWUNawonOJZg0tU3pXLvV8tVT/+MLHd/7pw3+ojV+qdsxL85cnx6euzP7Fo8CXii8bXSC0doOwnO+/nPzxf7VM3tes/MtyTdtbXe/lqt7xtfX+Ybul16l3E24vLoyWNc3X353/57+//UnLrBdyPHltIBlYWdPflrd1ajq++vlcqfi2+PfiQP43N6rtXz4bxVJRbqKD1fo/c+v24sLQBx8u3nyY07+uyOlQjiW5mfRtPqdj1fGkrWqv6+otax2ugsq7wx3K21BLiSPrPK/PV7tM/5bWobb+OlQ6PO/NjM60zei///HFnNrylj7Voca2im+LXxZX84v8W0v/H13l9j+Ztq/ONkVUkS17Suu8FS+vrkZkteajrTPeW13muq9KnoD/yN/kzx5u/66W439zW+3M8ailxvavi2Trr4sfHFzTojxStUiHV7VIzaPPess08zzciFonzz/IW0nPkS0dUd7qcER5Uq///ysG8uvc1f8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACw9xVJd7vpXcnJJIeSHCzHa8nS6pi7j1FfV3/xOGlum8fJ+bunWHdFiwd5kE9yYKczAgAAAAAAAODJuDT+zRf37/126f696vv47vxxV3NOLelJcqj4n96x8dmZqQ4F9SY3lr/S79taDjfKu+cejX9djr3cYaHdPX0AAL7TfhcAAP//ekBszQ==") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$unix(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)='%', 0x1}], 0x1}}], 0x4dc, 0x0) executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001c0073fc000000000000000007000003", @ANYRES32=r2, @ANYBLOB="030044000a000200bbbbbbbbbbbb00000c000e80050001"], 0x34}}, 0x0) executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1204"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) executing program 4: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000c, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653da7e6fcea6f2619072c749570653d1213"], 0x1, 0x6e7, &(0x7f00000011c0)="$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") r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x41, 0x3, 0x200, 0x98, 0x68, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @broadcast, 0x0, 0x0, 'hsr0\x00', 'wg1\x00'}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r1, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000e00)="c52bf9fe7a1f000000000000000000000000000949b19f9f2a3e89c64018cb1d166d270fd661edd970436e61640d6d27e1cb575af64b32e1b7fae35c9284bc95c9bb5c16b79c977ba5d24a43a864bbd57fc9e5c8e3cc4e5036de6b77a9cbe61214215e3d878d5881f45f9b31e2b9e26717ce2442d4765b55659ed6eafe23e9e500c1c2eecc13ea8882deb1b346d5371abd5fac2c59fd53c69d157d2744c1ef95c5cc4f25227044dd335c", 0xaa}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000002900000043000000000000000000000014000000000002f6fcff0000000014000000000000002900000008000000010000daca000000"], 0x48}}, {{&(0x7f0000000380)={0xa, 0x4e21, 0x5, @remote, 0x5}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000080000029000000360000003c00000000170000c204ffdffc0100003d26b4ffdb07aac8d3f4fb4e05145d64ade70bfceb745db4e789f655c5eeb94deaa4e0fa4d4aa116e5c19aab9a2f4033b73cd93f6c2b32c82dda68440180756ac2ba9110d8a27a"], 0x20}}], 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x62, 0x12141, 0x0) ftruncate(r2, 0x9) unshare(0x68040200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x0, 0xfffffffd]}, &(0x7f0000000000)=0x54) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000d80)={0xd, 0x9}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) program did not crash bisect: split chunks (needed=true): <10>, <10>, <10> bisect: split chunk #0 of len 10 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=21s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 7, 15, 30, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$eJzs3U9oHGUUAPC3mU02kdbkIIiCMHoTNLRVEL2YUlIo7qXKUvUgLjZVycZCgovpIZt4EY+CRz1586AHD715EfxDbx68WkGq4kF7K1g6Mruz/7K7MVTSGvz9Dsvrm/fm+2b3ozvZsF9eXYrV89Nx4fr1azE7W4ry0qmluFGKhUiiaztGzYzJAQCHw40siz+zjogv99NSOvhZAQAHqf3+//rRgcy7X+9Vn3n3B4BDr/j5f24wl+yqmZ3UfPHApgUAHKDhz/8j4pGRkoFf9ZdH7g0AgMPnhZdefu5kNeL5NJ2NWHuvWWvW4pn+8ZMX4s1oxEoci/m4GdG5UcgfSu3H02eqy8fSNG3FLwtRyzuatYi1VrPWuVM4mbT7K3E85mOh6C/uNrIsS05/UV0+nrZFxHarPX6slZq16Zgrxv/xnliJE5HGfSP9EWeqyyfS4gS1tW7/dMRO/3OLfP6LMR/fvxYXoxHnI+/t3tZUl7eOp+mprHqk1O9vNWuVdl3HxE9AAAAAAAAAAAAAAAAAAAAAAADgtiymPQu9/XOy/v49i4tjjrf3x+n0F/sD7XT2B8oqWWTZH+88Xns/iaH9gXbtz9Nq1soxdXcvHQAAAAAAAAAAAAAAAAAAAP4zNjZnot5orKxvbF5aHQxa6xubUxGRZ9767rOv5mK4Zq44wXDXUFAuSorMt0lE2u/Kkm5xlvRqBtqTfPBSuZP59HJvxoM1ld5VjJ1GZfKhRuPowz9/1M88lHTPfKtfk8TY67qU7JrGYLB2b2dKk5+WPYIT/1BzNcuySe1br4x2RSmiPHGqtxlkefDNtTceeGKjuwiyjkcfmz939cNPflutN/KRc43GzPrGzWy1Xvx7/GKbHCT99bNeKhZbaXAllOtP3jp7ZMKZd4Yz9eSH31988IMrRWZq75cpO3eln3l7TE3SGfTz3YdmOkE+zd6hZ/Mgf45GzzM9ZvGPC56Kf/XC3f/xUv3y1k+/7qt4u94Y+E/CRh0AAAAAAAAAAAAAAAAAAHBHDHxXvFB82Xd6r66nzx78zAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgzun//f9eEFM7uzL7C/5qRTdzLrqHKvkJY2ZgxIW7eLUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPxf/R0AAP//30Njcw==") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$unix(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)='%', 0x1}], 0x1}}], 0x4dc, 0x0) executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001c0073fc000000000000000007000003", @ANYRES32=r2, @ANYBLOB="030044000a000200bbbbbbbbbbbb00000c000e80050001"], 0x34}}, 0x0) executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1204"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) executing program 4: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000c, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653da7e6fcea6f2619072c749570653d1213"], 0x1, 0x6e7, &(0x7f00000011c0)="$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") r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x41, 0x3, 0x200, 0x98, 0x68, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @broadcast, 0x0, 0x0, 'hsr0\x00', 'wg1\x00'}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r1, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000e00)="c52bf9fe7a1f000000000000000000000000000949b19f9f2a3e89c64018cb1d166d270fd661edd970436e61640d6d27e1cb575af64b32e1b7fae35c9284bc95c9bb5c16b79c977ba5d24a43a864bbd57fc9e5c8e3cc4e5036de6b77a9cbe61214215e3d878d5881f45f9b31e2b9e26717ce2442d4765b55659ed6eafe23e9e500c1c2eecc13ea8882deb1b346d5371abd5fac2c59fd53c69d157d2744c1ef95c5cc4f25227044dd335c", 0xaa}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000002900000043000000000000000000000014000000000002f6fcff0000000014000000000000002900000008000000010000daca000000"], 0x48}}, {{&(0x7f0000000380)={0xa, 0x4e21, 0x5, @remote, 0x5}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000080000029000000360000003c00000000170000c204ffdffc0100003d26b4ffdb07aac8d3f4fb4e05145d64ade70bfceb745db4e789f655c5eeb94deaa4e0fa4d4aa116e5c19aab9a2f4033b73cd93f6c2b32c82dda68440180756ac2ba9110d8a27a"], 0x20}}], 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x62, 0x12141, 0x0) ftruncate(r2, 0x9) unshare(0x68040200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x0, 0xfffffffd]}, &(0x7f0000000000)=0x54) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000d80)={0xd, 0x9}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=21s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 4, 7, 1, 3, 13, 3, 4, 7, 15, 30, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$unix(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)='%', 0x1}], 0x1}}], 0x4dc, 0x0) executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001c0073fc000000000000000007000003", @ANYRES32=r2, @ANYBLOB="030044000a000200bbbbbbbbbbbb00000c000e80050001"], 0x34}}, 0x0) executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1204"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) executing program 4: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000c, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653da7e6fcea6f2619072c749570653d1213"], 0x1, 0x6e7, &(0x7f00000011c0)="$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") r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x41, 0x3, 0x200, 0x98, 0x68, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @broadcast, 0x0, 0x0, 'hsr0\x00', 'wg1\x00'}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r1, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000e00)="c52bf9fe7a1f000000000000000000000000000949b19f9f2a3e89c64018cb1d166d270fd661edd970436e61640d6d27e1cb575af64b32e1b7fae35c9284bc95c9bb5c16b79c977ba5d24a43a864bbd57fc9e5c8e3cc4e5036de6b77a9cbe61214215e3d878d5881f45f9b31e2b9e26717ce2442d4765b55659ed6eafe23e9e500c1c2eecc13ea8882deb1b346d5371abd5fac2c59fd53c69d157d2744c1ef95c5cc4f25227044dd335c", 0xaa}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000002900000043000000000000000000000014000000000002f6fcff0000000014000000000000002900000008000000010000daca000000"], 0x48}}, {{&(0x7f0000000380)={0xa, 0x4e21, 0x5, @remote, 0x5}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000080000029000000360000003c00000000170000c204ffdffc0100003d26b4ffdb07aac8d3f4fb4e05145d64ade70bfceb745db4e789f655c5eeb94deaa4e0fa4d4aa116e5c19aab9a2f4033b73cd93f6c2b32c82dda68440180756ac2ba9110d8a27a"], 0x20}}], 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x62, 0x12141, 0x0) ftruncate(r2, 0x9) unshare(0x68040200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x0, 0xfffffffd]}, &(0x7f0000000000)=0x54) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000d80)={0xd, 0x9}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: split chunk #1 of len 10 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=21s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 4, 7, 15, 30, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$unix(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)='%', 0x1}], 0x1}}], 0x4dc, 0x0) executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001c0073fc000000000000000007000003", @ANYRES32=r2, @ANYBLOB="030044000a000200bbbbbbbbbbbb00000c000e80050001"], 0x34}}, 0x0) executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1204"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) executing program 4: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000c, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653da7e6fcea6f2619072c749570653d1213"], 0x1, 0x6e7, &(0x7f00000011c0)="$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") r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x41, 0x3, 0x200, 0x98, 0x68, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @broadcast, 0x0, 0x0, 'hsr0\x00', 'wg1\x00'}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'batadv_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x260) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r1, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3ff}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000e00)="c52bf9fe7a1f000000000000000000000000000949b19f9f2a3e89c64018cb1d166d270fd661edd970436e61640d6d27e1cb575af64b32e1b7fae35c9284bc95c9bb5c16b79c977ba5d24a43a864bbd57fc9e5c8e3cc4e5036de6b77a9cbe61214215e3d878d5881f45f9b31e2b9e26717ce2442d4765b55659ed6eafe23e9e500c1c2eecc13ea8882deb1b346d5371abd5fac2c59fd53c69d157d2744c1ef95c5cc4f25227044dd335c", 0xaa}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000002900000043000000000000000000000014000000000002f6fcff0000000014000000000000002900000008000000010000daca000000"], 0x48}}, {{&(0x7f0000000380)={0xa, 0x4e21, 0x5, @remote, 0x5}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000080000029000000360000003c00000000170000c204ffdffc0100003d26b4ffdb07aac8d3f4fb4e05145d64ade70bfceb745db4e789f655c5eeb94deaa4e0fa4d4aa116e5c19aab9a2f4033b73cd93f6c2b32c82dda68440180756ac2ba9110d8a27a"], 0x20}}], 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x62, 0x12141, 0x0) ftruncate(r2, 0x9) unshare(0x68040200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x0, 0xfffffffd]}, &(0x7f0000000000)=0x54) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000d80)={0xd, 0x9}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=21s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns bisect: the chunk can be dropped bisect: split chunk #2 of len 10 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 3, 30, 2] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) program did not crash bisect: split chunks (needed=true): <5>, <5>, <5>, <5>, <5> bisect: split chunk #0 of len 5 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [5, 2, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 25, 4, 4, 18, 4, 7, 1, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: split chunk #1 of len 5 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 4, 18, 4, 7, 1, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 7, 1, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$eJzs3U9oHGUUAPC3mU02kdbkIIiCMHoTNLRVEL2YUlIo7qXKUvUgLjZVycZCgovpIZt4EY+CRz1586AHD715EfxDbx68WkGq4kF7K1g6Mruz/7K7MVTSGvz9Dsvrm/fm+2b3ozvZsF9eXYrV89Nx4fr1azE7W4ry0qmluFGKhUiiaztGzYzJAQCHw40siz+zjogv99NSOvhZAQAHqf3+//rRgcy7X+9Vn3n3B4BDr/j5f24wl+yqmZ3UfPHApgUAHKDhz/8j4pGRkoFf9ZdH7g0AgMPnhZdefu5kNeL5NJ2NWHuvWWvW4pn+8ZMX4s1oxEoci/m4GdG5UcgfSu3H02eqy8fSNG3FLwtRyzuatYi1VrPWuVM4mbT7K3E85mOh6C/uNrIsS05/UV0+nrZFxHarPX6slZq16Zgrxv/xnliJE5HGfSP9EWeqyyfS4gS1tW7/dMRO/3OLfP6LMR/fvxYXoxHnI+/t3tZUl7eOp+mprHqk1O9vNWuVdl3HxE9AAAAAAAAAAAAAAAAAAAAAAADgtiymPQu9/XOy/v49i4tjjrf3x+n0F/sD7XT2B8oqWWTZH+88Xns/iaH9gXbtz9Nq1soxdXcvHQAAAAAAAAAAAAAAAAAAAP4zNjZnot5orKxvbF5aHQxa6xubUxGRZ9767rOv5mK4Zq44wXDXUFAuSorMt0lE2u/Kkm5xlvRqBtqTfPBSuZP59HJvxoM1ld5VjJ1GZfKhRuPowz9/1M88lHTPfKtfk8TY67qU7JrGYLB2b2dKk5+WPYIT/1BzNcuySe1br4x2RSmiPHGqtxlkefDNtTceeGKjuwiyjkcfmz939cNPflutN/KRc43GzPrGzWy1Xvx7/GKbHCT99bNeKhZbaXAllOtP3jp7ZMKZd4Yz9eSH31988IMrRWZq75cpO3eln3l7TE3SGfTz3YdmOkE+zd6hZ/Mgf45GzzM9ZvGPC56Kf/XC3f/xUv3y1k+/7qt4u94Y+E/CRh0AAAAAAAAAAAAAAAAAAHBHDHxXvFB82Xd6r66nzx78zAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgzun//f9eEFM7uzL7C/5qRTdzLrqHKvkJY2ZgxIW7eLUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPxf/R0AAP//30Njcw==") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file1', [], 0xa, "b26c45b0ba9f93e1b884d7ee0fa7c5c76f1c3fb93b37678feb7121427c1f78066c84fa85fce5d562792cbf969492b749b81ec1da8d58"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0xf3, 0x0, &(0x7f0000000040)) executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="83b6a82dcf49", @broadcast, @void, {@ipv4={0x800, @generic={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0xb3}, @end, @generic={0x0, 0x10, "c51e0a38a7315cbd53a313336b02"}]}}}}}}, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: split chunk #2 of len 5 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns bisect: the chunk can be dropped bisect: testing without sub-chunk 2/2 bisect: no need to test this chunk, it's definitely needed bisect: split chunk #3 of len 5 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=19s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 13, 30, 2, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$eJzs289vFFUcAPDvzLag/GpFREHQKhobf7S0oHLwotHEgyYmesBjbQtBFmpoTYQ0Wo3BoyHxbjya+Bd40otRTyZe9W5IiDYmoKea2Z0pu0u39Mcui8znkwy8t/N23/vum7fz9r1uAKU1lP2TROyIiN8iYqCebS4wVP/v2uL85D+L85NJLC29+WdSK3d1cX6yKFo8b3ueGU4j0k+TvJJms+cvnJ6oVqfP5fnRuTPvjc6ev/DMqTMTJ6dPTp8dP3bs6JGx558bf7YjcWZxXd3/4cyBfa++fen1yeOX3vnpm6y9ew/WzzfG0SlDWeB/LdW0nnu805X12M6GdNLXw4awLpWIyLqrvzb+B6IS1ztvIF75pKeNA7oquzdtbX96YQm4gyXR6xYAvVHc6LPvv8Vxi6Yet4UrL9a/AGVxX8uP+pm+SPMy/V2sfygiji/8+2V2RJfWIQAAGn2XzX+eXmn+l8behnK78j2UwYi4JyJ2R8S9EbEnIu6LqJW9PyIeWGf9rVtDN85/0ssbCmyNsvnfC/neVvP8r5j9xWAlz+2sxd+fnDhVnT6cvyfD0b81y4+tUsf3L//6ebtzjfO/7MjqL+aCeTsu97Us0E1NzE10alJ65eOI/X0rxZ8s7wQkEbEvIvav76V3FYlTT359oF2hm8e/ig7sMy19FfFEvf8XoiX+QrL6/uToXVGdPjxaXBU3+vmXi2+0q39T8XdA1v/bmq//lhIDfyeN+7Wz66/j4u+ftf1Os9Hrf0vyVm3Pekv+2AcTc3PnxiK2JK/V8k2Pj19/bpEvymfxDx9aefzvzp+Txf9gRGQX8cGIeCgiHs7b/khEPBoRh1aJ/8eXHnt34/F3Vxb/1Iqff8vX/2Bz/68/UTn9w7ft6l9b/x+tpYbzR2qffzex1gZu5r0DAACA/4s0InZEko4sp9N0ZKT+N/x7YltanZmde+rEzPtnp+q/ERiM/rRY6RpoWA8dSxbyV6znx/O14uL8kXzd+IvK3bX8yORMdarHsUPZbW8z/jN/VHrdOqDr/F4Lyqt1/Kc9agdw67n/Q3kZ/1Bexj+U10rj/6OWvL0AuDO5/0N5Gf9QXsY/lJfxD6W0md/1S5Q5Eelt0QyJLiV6/ckEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQGf8FAAD//yWS7pw=") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 13, 3, 4, 3, 13, 30, 8, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$eJzs3c1vHOd9B/Dv8EWiaUOSbdV1BdlayZVM2yxFUrVUQYdWIlcSXb4UJAVY6MFyLaoQxNat3QK2UaAyUPRUoQVa9NDejJxyEuBLfAl8S27JKYcAgf8FIycFCMBgZpfSklxySYUiafnzIXZ3Xn7zPL/ZmZ2Huzs7T/huWTq4Ymxpqbptdby7Of7DnUiZvevS+Ddf3L9X3j6/m33pztvFj5K+JLWkJ8nLSe/Y+OzMVIeC7iQ3knydFEn2p/G4KTdS/GeeezT+dYr/L+td177NlkwnS3yv7fb+BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAe1ExNj48PFLsy8T0tXdrDUltjbHx2ZkiS0tr5ywv0/BV1et38VXHepOivKWvb7mr75cPP5r9UpLaiRxtjB2tOiRPXz579qVDF17s6Vpefr1sfi/7N1/sx59+duf9xcWFj55IInvflfr0xNzMxNTFK/XaxNxM7fzZs8Onr16eq12emKzPXZ+br0/VxmbrF+dnZmsDY2/URs6fP1OrD12fuTZ9ZXxosr488dyfjA4Pn629M/RX9YuzczPTp98Zmhu7OjE5OTF9pYopZ5cx58od8S8n5mvz9YtTtdqt24sLZ1bl1J1V+28ZNNJpTcqg0U5Bo8OjoyMjo6Mjnzd7z3444ezb598+NzzcM7xK1kQ8oZ2WveWZ9Tfz9h/E4TF1Ndr/ZDITmc61vJta27+xjGc2M5laZ35TT3VffHXydH3Delvb/6OtizYcKe9O5NXmaN867f86uezc38f5NJ/lTt7PYhazkI92PaOd/buSeqYzkbnMZCJTuVhNqTWn1HI+Z3M2w3kvV3Msc6nlciYymXrmcj1zmU+92qPGMpt6LmY+M5lNLQMZyxupZSTncz5nUks9Q7memVzLdK5kPBerUm7ldvW8n9kgx4dBI5sJGm2Z2L0qaE1jvuX2v776nxO+d7b9GA6Pa6nZ/u/rHDowthMJAQAAANvuj36aA4df+MmvkiKvVJ/LX56YrA/vdloAAADANqq++T+aIuktR19J4f0/AAAAPG2K6jd2RZL+HGsMLf8SyocAAAAA8JSoLtf3aopjjyZ4/w8AAABPmc7X2O8YUQwuX/63drPxeLMZ0Rgr+i9PTNaHxmYmL4zkVHWVgeqXBmtK606K3urnB2/meCPqeH/jsf9RiWWdfWXUyNCFkbyZE80VGXitfHhtoE3kaCPy9Ubk662R3VkReWbogutzAvD0O7FBe7zZ9v/NDDYiBo9UTX7PkTZt8HDZBgMAe8HDPnZ+0+zSrE3734x4db32/083eP9fRryQW8capxQM5YN8mMXczGCaZxwca1fqcm8EjdMQBjt8GtDfPGXh5+e6Mrjm84C+h+vaGruQ0Qy2/USgpdxiOYczjbjuJ7MNAGCnndiwHd5c+z/Y4f1/v1MKAWBPediDfTXQs2bKdgzs9joCACtppQEAAAAAAAAAAAAAAAAAAAAAAAAAAGD7beoC/j87lSwuLiTb3jXABgN9W8lw44Gu7FDOuz7QnWS3av/zrJm1tJRstFS5jffKU2dg5cAuH5gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYEUXS3W56V7I/yXCS0zuf1ZNzd7cT2C61x1useJAH+SQHtjsdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvu+b1/7vSeHy2MSk9XcnJJDeS/PVu57g9Gt0cPNjtNHbN31X3Ldf/70p6s1Skp7HZU/SOjc/OTJWbv9hfzv/mi/v3ylvnstf2qlAWUNawonOJZg0tU3pXLvV8tVT/+MLHd/7pw3+ojV+qdsxL85cnx6euzP7Fo8CXii8bXSC0doOwnO+/nPzxf7VM3tes/MtyTdtbXe/lqt7xtfX+Ybul16l3E24vLoyWNc3X353/57+//UnLrBdyPHltIBlYWdPflrd1ajq++vlcqfi2+PfiQP43N6rtXz4bxVJRbqKD1fo/c+v24sLQBx8u3nyY07+uyOlQjiW5mfRtPqdj1fGkrWqv6+otax2ugsq7wx3K21BLiSPrPK/PV7tM/5bWobb+OlQ6PO/NjM60zei///HFnNrylj7Voca2im+LXxZX84v8W0v/H13l9j+Ztq/ONkVUkS17Suu8FS+vrkZkteajrTPeW13muq9KnoD/yN/kzx5u/66W439zW+3M8ailxvavi2Trr4sfHFzTojxStUiHV7VIzaPPess08zzciFonzz/IW0nPkS0dUd7qcER5Uq///ysG8uvc1f8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACw9xVJd7vpXcnJJIeSHCzHa8nS6pi7j1FfV3/xOGlum8fJ+bunWHdFiwd5kE9yYKczAgAAAAAAAODJuDT+zRf37/126f696vv47vxxV3NOLelJcqj4n96x8dmZqQ4F9SY3lr/S79taDjfKu+cejX9djr3cYaHdPX0AAL7TfhcAAP//ekBszQ==") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: split chunk #4 of len 5 into 2 parts bisect: testing without sub-chunk 1/2 testing program (duration=19s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 13, 3, 4, 3, 30, 2, 4, 15] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$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") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 3: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash bisect: testing without sub-chunk 2/2 testing program (duration=20s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): [2, 16, 4, 5, 2, 5, 25, 4, 4, 18, 3, 13, 3, 4, 3, 30, 2, 13, 30, 8] detailed listing: executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020c000000000000000000000003000600000000000200000000000000000000000000000002000100000000000000000800000000030005000000000002000008ac1414c90000000000000800020008000b08"], 0x60}, 0x1, 0x7}, 0x0) executing program 0: unshare(0x68040200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) executing program 2: io_setup(0x3ff, &(0x7f0000000500)=0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x60}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="4e8fc38e", 0xb, 0x200000000004}]) executing program 2: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553f8c6b23cbff07bbbf7f00931c07b2fd"], 0x1c}}, 0x0) recvmmsg$unix(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast2}}}}}}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="60000000020601120000000000000000000000000500010007000000140007800800124000030000050015000c0000000900020073797a300000000011000300686173683a69702c6d61726b0000000005000400000000000500050002"], 0x60}}, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000c40), 0x310decfa, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105512, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80000, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000780)={[{@dioread_nolock}, {@abort}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9c7c}}, {@debug}, {@orlov}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@nodiscard}]}, 0xfe, 0x43a, &(0x7f00000001c0)="$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") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file1/file2\x00', 0x1202804, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0], 0x3, 0x37c, &(0x7f0000000d00)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000000c0), 0x4000000000001a7, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000700)={0x0, 0x1, 0x7, 0x0, 0x199, &(0x7f0000000900)="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e21, 0x1, @empty}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELOBJ={0x9c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_USERDATA={0x5e, 0x8, "a147a3e6c1752a3e5f468586b741ef5ac72f8a8b30ae1657fa8249729c5aa436ed5905f96eb4b588360fe2486a02b87d7adc374c5452a96dd1cf2484f63854cfa58f742bdf1f297b719de4956ef72f8540ad7ac4fca2e904daa8"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xa0, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x3a, 0x6, "762b72b646c3bdcba0a042bf0213ba3724dad7b62be8ebd5e7d0f684d002143be6e45567553d2ee470b8d8741b224844e26c77b624be"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x10, 0x6, "7aa9194d18711418053748d4"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x9, 0x6, "bf66b0a35f"}]}, @NFT_MSG_DELSET={0x80, 0xb, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_USERDATA={0x2a, 0xd, 0x1, 0x0, "6a58a1da519796fcd47208266cd054f802290684b7a31bacdb65dd2df10795c140e5a8728b5b"}]}, @NFT_MSG_DELFLOWTABLE={0xdc, 0x18, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK={0x84, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'pimreg\x00'}, {0x14, 0x1, 'geneve1\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x12}]}], {0x14}}, 0x358}, 0x1, 0x0, 0x0, 0x40}, 0x8004) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2008c12, &(0x7f0000000280)={[{@map_normal}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffffe7}}, {@dmode={'dmode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@map_normal}, {@overriderock}, {@map_off}, {@mode={'mode', 0x3d, 0xd75}}, {@check_relaxed}, {@unhide}, {@session={'session', 0x3d, 0x62}}, {}, {@hide}]}, 0x2, 0xa03, &(0x7f0000003a40)="$eJzs3c1vHOd9B/Dv8EWiaUOSbdV1BdlayZVM2yxFUrVUQYdWIlcSXb4UJAVY6MFyLaoQxNat3QK2UaAyUPRUoQVa9NDejJxyEuBLfAl8S27JKYcAgf8FIycFCMBgZpfSklxySYUiafnzIXZ3Xn7zPL/ZmZ2Huzs7T/huWTq4Ymxpqbptdby7Of7DnUiZvevS+Ddf3L9X3j6/m33pztvFj5K+JLWkJ8nLSe/Y+OzMVIeC7iQ3knydFEn2p/G4KTdS/GeeezT+dYr/L+td177NlkwnS3yv7fb+BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAe1ExNj48PFLsy8T0tXdrDUltjbHx2ZkiS0tr5ywv0/BV1et38VXHepOivKWvb7mr75cPP5r9UpLaiRxtjB2tOiRPXz579qVDF17s6Vpefr1sfi/7N1/sx59+duf9xcWFj55IInvflfr0xNzMxNTFK/XaxNxM7fzZs8Onr16eq12emKzPXZ+br0/VxmbrF+dnZmsDY2/URs6fP1OrD12fuTZ9ZXxosr488dyfjA4Pn629M/RX9YuzczPTp98Zmhu7OjE5OTF9pYopZ5cx58od8S8n5mvz9YtTtdqt24sLZ1bl1J1V+28ZNNJpTcqg0U5Bo8OjoyMjo6Mjnzd7z3444ezb598+NzzcM7xK1kQ8oZ2WveWZ9Tfz9h/E4TF1Ndr/ZDITmc61vJta27+xjGc2M5laZ35TT3VffHXydH3Delvb/6OtizYcKe9O5NXmaN867f86uezc38f5NJ/lTt7PYhazkI92PaOd/buSeqYzkbnMZCJTuVhNqTWn1HI+Z3M2w3kvV3Msc6nlciYymXrmcj1zmU+92qPGMpt6LmY+M5lNLQMZyxupZSTncz5nUks9Q7memVzLdK5kPBerUm7ldvW8n9kgx4dBI5sJGm2Z2L0qaE1jvuX2v776nxO+d7b9GA6Pa6nZ/u/rHDowthMJAQAAANvuj36aA4df+MmvkiKvVJ/LX56YrA/vdloAAADANqq++T+aIuktR19J4f0/AAAAPG2K6jd2RZL+HGsMLf8SyocAAAAA8JSoLtf3aopjjyZ4/w8AAABPmc7X2O8YUQwuX/63drPxeLMZ0Rgr+i9PTNaHxmYmL4zkVHWVgeqXBmtK606K3urnB2/meCPqeH/jsf9RiWWdfWXUyNCFkbyZE80VGXitfHhtoE3kaCPy9Ubk662R3VkReWbogutzAvD0O7FBe7zZ9v/NDDYiBo9UTX7PkTZt8HDZBgMAe8HDPnZ+0+zSrE3734x4db32/083eP9fRryQW8capxQM5YN8mMXczGCaZxwca1fqcm8EjdMQBjt8GtDfPGXh5+e6Mrjm84C+h+vaGruQ0Qy2/USgpdxiOYczjbjuJ7MNAGCnndiwHd5c+z/Y4f1/v1MKAWBPediDfTXQs2bKdgzs9joCACtppQEAAAAAAAAAAAAAAAAAAAAAAAAAAGD7beoC/j87lSwuLiTb3jXABgN9W8lw44Gu7FDOuz7QnWS3av/zrJm1tJRstFS5jffKU2dg5cAuH5gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYEUXS3W56V7I/yXCS0zuf1ZNzd7cT2C61x1useJAH+SQHtjsdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvu+b1/7vSeHy2MSk9XcnJJDeS/PVu57g9Gt0cPNjtNHbN31X3Ldf/70p6s1Skp7HZU/SOjc/OTJWbv9hfzv/mi/v3ylvnstf2qlAWUNawonOJZg0tU3pXLvV8tVT/+MLHd/7pw3+ojV+qdsxL85cnx6euzP7Fo8CXii8bXSC0doOwnO+/nPzxf7VM3tes/MtyTdtbXe/lqt7xtfX+Ybul16l3E24vLoyWNc3X353/57+//UnLrBdyPHltIBlYWdPflrd1ajq++vlcqfi2+PfiQP43N6rtXz4bxVJRbqKD1fo/c+v24sLQBx8u3nyY07+uyOlQjiW5mfRtPqdj1fGkrWqv6+otax2ugsq7wx3K21BLiSPrPK/PV7tM/5bWobb+OlQ6PO/NjM60zei///HFnNrylj7Voca2im+LXxZX84v8W0v/H13l9j+Ztq/ONkVUkS17Suu8FS+vrkZkteajrTPeW13muq9KnoD/yN/kzx5u/66W439zW+3M8ailxvavi2Trr4sfHFzTojxStUiHV7VIzaPPess08zzciFonzz/IW0nPkS0dUd7qcER5Uq///ysG8uvc1f8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACw9xVJd7vpXcnJJIeSHCzHa8nS6pi7j1FfV3/xOGlum8fJ+bunWHdFiwd5kE9yYKczAgAAAAAAAODJuDT+zRf37/126f696vv47vxxV3NOLelJcqj4n96x8dmZqQ4F9SY3lr/S79taDjfKu+cejX9djr3cYaHdPX0AAL7TfhcAAP//ekBszQ==") executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000069112800000000008510000002000000850000000500000095000000000000009500a50500000000b07f6d7c28f095480904fe8727355031b679f896b6c0770c8049a5d3e5f06ec8dc243b9608bfac837f83e2cdfb905c89b42574488137ee7db8fb99031eb5aaca80e2ca2da53c4dd94c998fc679c6bd80f2be43b4ce55c3d991126ae2fdf9f012a265169b2ed6ca6d3e1abc2e6c0024e2d0d54c220068d9f8751a162b686508cd42ebd1e45809cc24ed9ce7d3778f514cd8505c94c9d980bc9074b272476af8e5c89e89e5f19a395f31"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) executing program 2: epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) readv(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) lseek(r2, 0x9, 0x0) executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000680)=""/17, 0x11}, {&(0x7f0000000080)=""/238, 0xee}, {&(0x7f0000000880)=""/4096, 0x103f}, {&(0x7f0000001880)=""/149, 0x95}, {&(0x7f0000001940)=""/251, 0xfb}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001c40)=""/126, 0x7e}], 0x8}}], 0x2, 0x0, 0x0) executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="87", 0x1}], 0x1}}], 0x1, 0x0) executing program 3: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25170000002400098008000200690d000008000100550000000800010080ffffff08000200040000001400098008000200090000000800020002000000900004800c000780080001000d000000240007800800020009000000080001001c000000080003"], 0x1e8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d00000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014000400fe8000000000000000000000000000aa08000740000000003c000e800c00028005000100110000002c0001"], 0xd0}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xa1, 0x4, 0x3}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000b40), &(0x7f0000000180)=@tcp=r1}, 0x20) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000080)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="60000000020601036c0000000e77000000000000050005000a000000050001000600000205000400000000000900020073797a320000000013000300686173683a6e65742c6966616365000014000780080006400000000008000840"], 0x60}}, 0x0) executing program 4: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="008c14af656d6f725a37f094ef695ad9baf76ab30508008b63a7204cd0168ddd5d83ad346cfd4c26fe5e093c6c08b90825898cf47c4b0848e4eecc7690507d0d83383a194e58f46d8b11b16d27a5388ebdc650835e388e4d7053a479"], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x84ffe0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x248, 0xd8, 0x0, 0x148, 0x0, 0x148, 0x1b0, 0x240, 0x240, 0x1b0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$FITHAW(r0, 0xc0045878) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x6, 0x101, 0x82, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$ax25(0x3, 0x3, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x6, 0x4, 0x4001}, 0x48) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xe0028008}) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns bisect: the chunk can be dropped bisect: too many guilty chunks, aborting single: executing 5 programs separately with timeout 1m40s testing program (duration=1m40s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$nl_netfilter-socket$nl_generic-ioctl$F2FS_IOC_MOVE_RANGE-socket$inet6_tcp-bind$inet6-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$inet6-connect$inet6-sendmmsg$inet-setsockopt$inet6_int-setsockopt$inet6_tcp_int-sendto$inet6-shutdown detailed listing: executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0xd19, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) shutdown(r0, 0x2) program did not crash testing program (duration=1m40s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): unshare-syz_init_net_socket$nl_generic-syz_genetlink_get_family_id$nl802154-sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS detailed listing: executing program 0: unshare(0x2040400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) program did not crash testing program (duration=1m40s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): getsockopt$bt_hci-sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL-socket-socket$nl_generic-ioctl$sock_SIOCINQ-bpf$BPF_PROG_DETACH-syz_genetlink_get_family_id$devlink-socketpair$unix-socket$inet6_sctp-setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD-bpf$PROG_LOAD-gettid-sendmsg$DEVLINK_CMD_RELOAD detailed listing: executing program 0: getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000003140)=""/4095, &(0x7f0000000000)=0xfff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x48000000, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) program did not crash testing program (duration=1m40s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route-socket-getsockname$packet-getsockopt$sock_cred-setsockopt$inet6_IPV6_XFRM_POLICY-bpf$BPF_GET_MAP_INFO detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000140)}, 0x10) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns single: successfully extracted reproducer found reproducer with 30 syscalls minimizing guilty program testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route-socket-getsockname$packet-getsockopt$sock_cred-setsockopt$inet6_IPV6_XFRM_POLICY detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000440)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e21, 0x83, 0x0, 0x0, 0xa, 0x0, 0x10, 0x21}, {0x7fffffffffffffff, 0x51c3, 0x200, 0x5, 0x7fff, 0x0, 0x2, 0x8000000000000000}, {0x1ff, 0x3, 0x3, 0x87}, 0x6, 0x6e6bbb, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x0, 0x0, 0x2, 0x11, 0x40000000, 0x6, 0x7}}, 0xe8) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route-socket-getsockname$packet-getsockopt$sock_cred detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route-socket-getsockname$packet detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route-socket detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING-socket$nl_route detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH-setsockopt$XDP_UMEM_FILL_RING detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL-sendmsg$NL80211_CMD_JOIN_MESH detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211-sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf253800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0058007d000000000000000c0058005d000000000000000c00580037000000000000000c00580005000000000000000c00580000000000000000000c0058003500000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x40004}, 0x2404c000) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE-ioctl$sock_SIOCGIFINDEX_80211 detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r2, 0x0, 0x7}, 0x38) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-socket$inet6_udplite detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) socket$inet6_udplite(0xa, 0x2, 0x88) program did not crash testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-unshare-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x26020480) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program did not crash testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-syz_genetlink_get_family_id$nl80211-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-recvfrom-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-sendmsg$IPSET_CMD_SAVE-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000080603000000000000000000020000000500010007"], 0x1c}}, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-write$cgroup_type-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x2000) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r3}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000540)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, 0x21, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-bpf$MAP_CREATE-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-bpf$PROG_LOAD-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000500a3d50000000d18116764", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-openat$cgroup_ro-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$nl_netfilter-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-bpf$MAP_LOOKUP_BATCH-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r1, 0x0, 0x7}, 0x38) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-bpf$MAP_CREATE-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$nl_generic-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000028c0)=@filter={'filter\x00', 0x2, 0x4, 0x1428, 0xffffffff, 0x1250, 0x1250, 0x1250, 0xfeffffff, 0xffffffff, 0x1358, 0x1358, 0x1358, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0x1108, 0x1130, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0xfd, 0x0, 0x0, 0x0, './cgroup.cpu/syz0\x00'}}, @common=@frag={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"6bbf"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@ipv6={@loopback, @ipv4={'\x00', '\xff\xff', @loopback}, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1488) program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE detailed listing: executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) program did not crash extracting C reproducer testing compiled C program (duration=2m30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns simplifying C reproducer testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:true Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns testing compiled C program (duration=2m30s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$inet6_udplite-setsockopt$IP6T_SO_SET_REPLACE program crashed: BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns reproducing took 1h49m54.173056987s repro crashed as (corrupted=false): BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4020, name: syz-executor128 1 lock held by syz-executor128/4020: #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: spin_lock_irq include/linux/spinlock.h:388 [inline] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 kernel/cgroup/cgroup.c:6620 irq event stamp: 434 hardirqs last enabled at (433): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1338 [inline] hardirqs last enabled at (433): [] finish_lock_switch+0xbc/0x1e8 kernel/sched/core.c:4784 hardirqs last disabled at (434): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:126 [inline] hardirqs last disabled at (434): [] _raw_spin_lock_irq+0x38/0x13c kernel/locking/spinlock.c:170 softirqs last enabled at (416): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (416): [] release_sock+0x1e4/0x270 net/core/sock.c:3276 softirqs last disabled at (414): [] spin_lock_bh include/linux/spinlock.h:368 [inline] softirqs last disabled at (414): [] release_sock+0x3c/0x270 net/core/sock.c:3263 Preemption disabled at: [] spin_lock_irq include/linux/spinlock.h:388 [inline] [] cgroup_get_from_path+0x30/0x300 kernel/cgroup/cgroup.c:6620 CPU: 1 PID: 4020 Comm: syz-executor128 Not tainted 5.15.164-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call trace: dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 ___might_sleep+0x380/0x4dc kernel/sched/core.c:9626 __might_sleep+0x98/0xf0 kernel/sched/core.c:9580 down_read+0x34/0x398 kernel/locking/rwsem.c:1497 kernfs_walk_and_get_ns+0x8c/0x310 fs/kernfs/dir.c:908 kernfs_walk_and_get include/linux/kernfs.h:559 [inline] cgroup_get_from_path+0x64/0x300 kernel/cgroup/cgroup.c:6622 cgroup_mt_check_v1+0x18c/0x278 net/netfilter/xt_cgroup.c:56 xt_check_match+0x338/0x914 net/netfilter/x_tables.c:523 check_match net/ipv6/netfilter/ip6_tables.c:490 [inline] find_check_match net/ipv6/netfilter/ip6_tables.c:507 [inline] find_check_entry net/ipv6/netfilter/ip6_tables.c:558 [inline] translate_table+0x10cc/0x1ac8 net/ipv6/netfilter/ip6_tables.c:735 do_replace net/ipv6/netfilter/ip6_tables.c:1156 [inline] do_ip6t_set_ctl+0xb8c/0x1164 net/ipv6/netfilter/ip6_tables.c:1646 nf_setsockopt+0x270/0x290 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x1f78/0x3d74 net/ipv6/ipv6_sockglue.c:1014 udpv6_setsockopt+0xa8/0xc0 net/ipv6/udp.c:1684 sock_common_setsockopt+0xb0/0xcc net/core/sock.c:3445 __sys_setsockopt+0x3a8/0x6b4 net/socket.c:2198 __do_sys_setsockopt net/socket.c:2209 [inline] __se_sys_setsockopt net/socket.c:2206 [inline] __arm64_sys_setsockopt+0xb8/0xd4 net/socket.c:2206 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 ============================= [ BUG: Invalid wait context ] 5.15.164-syzkaller #0 Tainted: G W ----------------------------- syz-executor128/4020 is trying to lock: ffff800014db7410 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310 fs/kernfs/dir.c:908 other info that might help us debug this: context-{4:4} 1 lock held by syz-executor128/4020: #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: spin_lock_irq include/linux/spinlock.h:388 [inline] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 kernel/cgroup/cgroup.c:6620 stack backtrace: CPU: 1 PID: 4020 Comm: syz-executor128 Tainted: G W 5.15.164-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call trace: dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 print_lock_invalid_wait_context kernel/locking/lockdep.c:4664 [inline] check_wait_context kernel/locking/lockdep.c:4725 [inline] __lock_acquire+0x1af0/0x7638 kernel/locking/lockdep.c:4962 lock_acquire+0x240/0x77c kernel/locking/lockdep.c:5623 down_read+0xc0/0x398 kernel/locking/rwsem.c:1498 kernfs_walk_and_get_ns+0x8c/0x310 fs/kernfs/dir.c:908 kernfs_walk_and_get include/linux/kernfs.h:559 [inline] cgroup_get_from_path+0x64/0x300 kernel/cgroup/cgroup.c:6622 cgroup_mt_check_v1+0x18c/0x278 net/netfilter/xt_cgroup.c:56 xt_check_match+0x338/0x914 net/netfilter/x_tables.c:523 check_match net/ipv6/netfilter/ip6_tables.c:490 [inline] find_check_match net/ipv6/netfilter/ip6_tables.c:507 [inline] find_check_entry net/ipv6/netfilter/ip6_tables.c:558 [inline] translate_table+0x10cc/0x1ac8 net/ipv6/netfilter/ip6_tables.c:735 do_replace net/ipv6/netfilter/ip6_tables.c:1156 [inline] do_ip6t_set_ctl+0xb8c/0x1164 net/ipv6/netfilter/ip6_tables.c:1646 nf_setsockopt+0x270/0x290 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x1f78/0x3d74 net/ipv6/ipv6_sockglue.c:1014 udpv6_setsockopt+0xa8/0xc0 net/ipv6/udp.c:1684 sock_common_setsockopt+0xb0/0xcc net/core/sock.c:3445 __sys_setsockopt+0x3a8/0x6b4 net/socket.c:2198 __do_sys_setsockopt net/socket.c:2209 [inline] __se_sys_setsockopt net/socket.c:2206 [inline] __arm64_sys_setsockopt+0xb8/0xd4 net/socket.c:2206 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 xt_cgroup: invalid path, errno=-2 final repro crashed as (corrupted=false): BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1497 in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4020, name: syz-executor128 1 lock held by syz-executor128/4020: #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: spin_lock_irq include/linux/spinlock.h:388 [inline] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 kernel/cgroup/cgroup.c:6620 irq event stamp: 434 hardirqs last enabled at (433): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1338 [inline] hardirqs last enabled at (433): [] finish_lock_switch+0xbc/0x1e8 kernel/sched/core.c:4784 hardirqs last disabled at (434): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:126 [inline] hardirqs last disabled at (434): [] _raw_spin_lock_irq+0x38/0x13c kernel/locking/spinlock.c:170 softirqs last enabled at (416): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (416): [] release_sock+0x1e4/0x270 net/core/sock.c:3276 softirqs last disabled at (414): [] spin_lock_bh include/linux/spinlock.h:368 [inline] softirqs last disabled at (414): [] release_sock+0x3c/0x270 net/core/sock.c:3263 Preemption disabled at: [] spin_lock_irq include/linux/spinlock.h:388 [inline] [] cgroup_get_from_path+0x30/0x300 kernel/cgroup/cgroup.c:6620 CPU: 1 PID: 4020 Comm: syz-executor128 Not tainted 5.15.164-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call trace: dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 ___might_sleep+0x380/0x4dc kernel/sched/core.c:9626 __might_sleep+0x98/0xf0 kernel/sched/core.c:9580 down_read+0x34/0x398 kernel/locking/rwsem.c:1497 kernfs_walk_and_get_ns+0x8c/0x310 fs/kernfs/dir.c:908 kernfs_walk_and_get include/linux/kernfs.h:559 [inline] cgroup_get_from_path+0x64/0x300 kernel/cgroup/cgroup.c:6622 cgroup_mt_check_v1+0x18c/0x278 net/netfilter/xt_cgroup.c:56 xt_check_match+0x338/0x914 net/netfilter/x_tables.c:523 check_match net/ipv6/netfilter/ip6_tables.c:490 [inline] find_check_match net/ipv6/netfilter/ip6_tables.c:507 [inline] find_check_entry net/ipv6/netfilter/ip6_tables.c:558 [inline] translate_table+0x10cc/0x1ac8 net/ipv6/netfilter/ip6_tables.c:735 do_replace net/ipv6/netfilter/ip6_tables.c:1156 [inline] do_ip6t_set_ctl+0xb8c/0x1164 net/ipv6/netfilter/ip6_tables.c:1646 nf_setsockopt+0x270/0x290 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x1f78/0x3d74 net/ipv6/ipv6_sockglue.c:1014 udpv6_setsockopt+0xa8/0xc0 net/ipv6/udp.c:1684 sock_common_setsockopt+0xb0/0xcc net/core/sock.c:3445 __sys_setsockopt+0x3a8/0x6b4 net/socket.c:2198 __do_sys_setsockopt net/socket.c:2209 [inline] __se_sys_setsockopt net/socket.c:2206 [inline] __arm64_sys_setsockopt+0xb8/0xd4 net/socket.c:2206 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 ============================= [ BUG: Invalid wait context ] 5.15.164-syzkaller #0 Tainted: G W ----------------------------- syz-executor128/4020 is trying to lock: ffff800014db7410 (kernfs_rwsem){++++}-{3:3}, at: kernfs_walk_and_get_ns+0x8c/0x310 fs/kernfs/dir.c:908 other info that might help us debug this: context-{4:4} 1 lock held by syz-executor128/4020: #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: spin_lock_irq include/linux/spinlock.h:388 [inline] #0: ffff800014cb6ad8 (css_set_lock){....}-{2:2}, at: cgroup_get_from_path+0x30/0x300 kernel/cgroup/cgroup.c:6620 stack backtrace: CPU: 1 PID: 4020 Comm: syz-executor128 Tainted: G W 5.15.164-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call trace: dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 print_lock_invalid_wait_context kernel/locking/lockdep.c:4664 [inline] check_wait_context kernel/locking/lockdep.c:4725 [inline] __lock_acquire+0x1af0/0x7638 kernel/locking/lockdep.c:4962 lock_acquire+0x240/0x77c kernel/locking/lockdep.c:5623 down_read+0xc0/0x398 kernel/locking/rwsem.c:1498 kernfs_walk_and_get_ns+0x8c/0x310 fs/kernfs/dir.c:908 kernfs_walk_and_get include/linux/kernfs.h:559 [inline] cgroup_get_from_path+0x64/0x300 kernel/cgroup/cgroup.c:6622 cgroup_mt_check_v1+0x18c/0x278 net/netfilter/xt_cgroup.c:56 xt_check_match+0x338/0x914 net/netfilter/x_tables.c:523 check_match net/ipv6/netfilter/ip6_tables.c:490 [inline] find_check_match net/ipv6/netfilter/ip6_tables.c:507 [inline] find_check_entry net/ipv6/netfilter/ip6_tables.c:558 [inline] translate_table+0x10cc/0x1ac8 net/ipv6/netfilter/ip6_tables.c:735 do_replace net/ipv6/netfilter/ip6_tables.c:1156 [inline] do_ip6t_set_ctl+0xb8c/0x1164 net/ipv6/netfilter/ip6_tables.c:1646 nf_setsockopt+0x270/0x290 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x1f78/0x3d74 net/ipv6/ipv6_sockglue.c:1014 udpv6_setsockopt+0xa8/0xc0 net/ipv6/udp.c:1684 sock_common_setsockopt+0xb0/0xcc net/core/sock.c:3445 __sys_setsockopt+0x3a8/0x6b4 net/socket.c:2198 __do_sys_setsockopt net/socket.c:2209 [inline] __se_sys_setsockopt net/socket.c:2206 [inline] __arm64_sys_setsockopt+0xb8/0xd4 net/socket.c:2206 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 xt_cgroup: invalid path, errno=-2