last executing test programs: 4m40.597870039s ago: executing program 32 (id=378): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') socket$phonet_pipe(0x23, 0x5, 0x2) socket$phonet_pipe(0x23, 0x5, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0xc46, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x82e}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a00000000000000000000000000000000000000000000000000000000000000020001000000000000000702000000ff05000500000000000a00000000000000ff0100000000000000000000000000010000000000000000020008"], 0x80}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x2000000000000122, &(0x7f0000000780)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000840000007b8af8ff04000000bfa200000000000007020000f8ffffffb703000008000000b704b3723a70b700000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$binfmt_script(r5, 0x0, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0x2}], 0x1, 0x0, 0x0, 0x2c}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r6, 0x5) r7 = accept4$inet6(r6, 0x0, 0x0, 0x80000) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r7, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)='15', 0x2}], 0x8) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000009c0)={[{@dioread_lock}, {@nouid32}, {@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7ff}}, {@auto_da_alloc}, {@journal_ioprio, 0x2e}, {@nouid32}, {@errors_remount}, {@data_journal}, {@grpid}], [], 0x2c}, 0x1, 0x4c2, &(0x7f0000000280)="$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") 4m24.601539151s ago: executing program 33 (id=513): brk(0x20ffc000) 4m22.278533544s ago: executing program 34 (id=527): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000e70f00000700000000002000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r0, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) write$cgroup_pid(r0, &(0x7f00000031c0), 0x12) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_usb_connect(0x2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000280)={r4, 0x11, 0x6}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@getchain={0x2c, 0x11, 0x839, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r7}, [{0x8, 0xb, 0x4}]}, 0x2c}}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)) dup(0xffffffffffffffff) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20000023896) r10 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r10, 0x5404, &(0x7f0000000000)={0xb29, 0x0, 0xfffffffe, 0x0, 0x0, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/16], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r12}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 4m18.582483605s ago: executing program 35 (id=545): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$caif_stream(0x25, 0x1, 0x5) ppoll(&(0x7f00000001c0)=[{r0, 0x2}], 0x1, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000380)="cf81bf", 0x3}], 0x10000058}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1600) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001f80), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100fdfffffffcdbdf25280000000a4bd55c70616e3000000006000600"], 0x30}}, 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x10008c0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x253, &(0x7f00000004c0)="$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") listen(0xffffffffffffffff, 0x0) r3 = gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) syz_clone3(&(0x7f0000000940)={0x200, &(0x7f00000003c0), 0x0, 0x0, {0x3}, 0x0, 0x0, &(0x7f0000000840)=""/186, &(0x7f0000000900)=[r3, r3], 0x2}, 0x58) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43, 0x9, 0x2, {0x800, 0x6, 0x2, 0x8, 0x4, 0xa3fef11, 0x7, 0xd413, 0x9}}, 0x43) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000980)=ANY=[], 0x0, 0x26, 0x0, 0x8000a, 0x3792, 0x0, @void, @value}, 0x28) ptrace$setregs(0xd, r5, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r5, 0x200, &(0x7f0000000080)={&(0x7f00000000c0)=""/112, 0x70}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000080)={0x335}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue0\x00'}) tkill(r3, 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000180780851c90f2f6a24b8a10b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000001, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m18.072298648s ago: executing program 36 (id=548): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 4m16.732690066s ago: executing program 37 (id=552): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000e70f00000700000000002000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r0, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) write$cgroup_pid(r0, &(0x7f00000031c0), 0x12) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_usb_connect(0x2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000280)={r4, 0x11, 0x6}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@getchain={0x2c, 0x11, 0x839, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r7}, [{0x8, 0xb, 0x4}]}, 0x2c}}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)) dup(0xffffffffffffffff) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20000023896) r10 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r10, 0x5404, &(0x7f0000000000)={0xb29, 0x0, 0xfffffffe, 0x0, 0x0, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/16], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r12}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 4m13.774054423s ago: executing program 38 (id=566): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES64, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00'], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0x13) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000020000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x93, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000080000000000000000205ab56454a92e6469975a892d39c19c717a3150e50ca27a451c5e54549a22be3f3b59c277188dfbeed8d300523707fd8b86fefc409bd12a4cb71afa44d3e58754fb33f3e4956dd23cd9a3952fe97db492cb96de88814e4f8fa94ace92111d7e0d513f385a651169d2e46df2eb1587ff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0xd2, &(0x7f0000000400)={0x0, 0x2, 0x0, 0xfffffffc, 0x8d}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) set_mempolicy(0x4003, &(0x7f0000000080)=0x7, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r3 = gettid() r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$nci(r4, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000000, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00572d98565693e158972216f386df5664", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x2000410, &(0x7f0000000000)={[{@commit={'commit', 0x3d, 0x5}}]}, 0x1, 0x79f, &(0x7f00000012c0)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) pwritev2(r8, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) 4m12.626428459s ago: executing program 39 (id=568): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES64, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00'], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0x13) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000020000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x93, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000080000000000000000205ab56454a92e6469975a892d39c19c717a3150e50ca27a451c5e54549a22be3f3b59c277188dfbeed8d300523707fd8b86fefc409bd12a4cb71afa44d3e58754fb33f3e4956dd23cd9a3952fe97db492cb96de88814e4f8fa94ace92111d7e0d513f385a651169d2e46df2eb1587ff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0xd2, &(0x7f0000000400)={0x0, 0x2, 0x0, 0xfffffffc, 0x8d}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) set_mempolicy(0x4003, &(0x7f0000000080)=0x7, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r3 = gettid() r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$nci(r4, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000000, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00572d98565693e158972216f386df5664", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x2000410, &(0x7f0000000000)={[{@commit={'commit', 0x3d, 0x5}}]}, 0x1, 0x79f, &(0x7f00000012c0)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) pwritev2(r8, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) 4m7.877229306s ago: executing program 5 (id=584): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$caif_stream(0x25, 0x1, 0x5) ppoll(&(0x7f00000001c0)=[{r0, 0x2}], 0x1, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000380)="cf81bf", 0x3}], 0x10000058}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1600) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001f80), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100fdfffffffcdbdf25280000000a4bd55c70616e3000000006000600"], 0x30}}, 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x10008c0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x253, &(0x7f00000004c0)="$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") listen(0xffffffffffffffff, 0x0) r3 = gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) syz_clone3(&(0x7f0000000940)={0x200, &(0x7f00000003c0), 0x0, 0x0, {0x3}, 0x0, 0x0, &(0x7f0000000840)=""/186, &(0x7f0000000900)=[r3, r3], 0x2}, 0x58) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43, 0x9, 0x2, {0x800, 0x6, 0x2, 0x8, 0x4, 0xa3fef11, 0x7, 0xd413, 0x9}}, 0x43) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000980)=ANY=[], 0x0, 0x26, 0x0, 0x8000a, 0x3792, 0x0, @void, @value}, 0x28) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000180780851c90f2f6a24b8a10b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000001, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000200000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m7.000153261s ago: executing program 5 (id=592): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') socket$phonet_pipe(0x23, 0x5, 0x2) socket$phonet_pipe(0x23, 0x5, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0xc46, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x82e}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a00000000000000000000000000000000000000000000000000000000000000020001000000000000000702000000ff05000500000000000a00000000000000ff0100"/101], 0x80}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x2000000000000122, &(0x7f0000000780)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000840000007b8af8ff04000000bfa200000000000007020000f8ffffffb703000008000000b704b3723a70b700000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$binfmt_script(r5, 0x0, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0x2}], 0x1, 0x0, 0x0, 0x2c}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r7 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r6, 0x5) r8 = accept4$inet6(r6, 0x0, 0x0, 0x80000) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r7, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)='15', 0x2}], 0x8) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000009c0)={[{@dioread_lock}, {@nouid32}, {@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7ff}}, {@auto_da_alloc}, {@journal_ioprio, 0x2e}, {@nouid32}, {@errors_remount}, {@data_journal}, {@grpid}], [], 0x2c}, 0x1, 0x4c2, &(0x7f0000000280)="$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") 4m4.771535114s ago: executing program 5 (id=604): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2a, 0x4, 0x0, 0x35, 0xa8, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x1c, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 4m4.771142494s ago: executing program 40 (id=604): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2a, 0x4, 0x0, 0x35, 0xa8, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x1c, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 3m10.991194301s ago: executing program 8 (id=991): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) 3m10.934406682s ago: executing program 8 (id=992): process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) 3m10.809421973s ago: executing program 8 (id=993): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000340)={[{@nojournal_checksum}, {}]}, 0x0, 0x4ee, &(0x7f0000000c40)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000", @ANYRES32, @ANYBLOB="00000000000000000000dc84b1c2c6a6d6dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000000580)={0x0, 0x1, 0x8, 0x74ff9241, @vifc_lcl_ifindex, @loopback}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kfree\x00', r2}, 0x18) fsetxattr$security_selinux(r0, &(0x7f0000000200), &(0x7f0000000280)='system_u:object_r:su_exec_t:s0\x00', 0x1f, 0x1) r3 = syz_io_uring_setup(0x10d, &(0x7f0000000140), &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x29c780}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syslog(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f00000008c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}, {@mblk_io_submit}]}, 0x3, 0x44a, &(0x7f0000000400)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000880)=ANY=[], 0xff34, 0x0) chown(&(0x7f0000000340)='./file0\x00', 0xee01, 0x0) r7 = syz_io_uring_setup(0x62b4, &(0x7f0000000940)={0x0, 0x80000004, 0x0, 0x2, 0x4}, &(0x7f00000003c0), &(0x7f0000000640)) io_uring_register$IORING_REGISTER_BUFFERS2(r7, 0xf, &(0x7f0000001c80)={0x1, 0x0, 0x1000000, &(0x7f0000001140)=[{0x0}], 0x0}, 0x20) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0xfffffdcf) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000640)={'syztnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x1, 0x5, 0x69, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7, 0x10, 0x10001, 0x8cd6}}) mknod$loop(&(0x7f00000009c0)='./file0/../file0\x00', 0x841a, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000001140)=@deltfilter={0x43dc, 0x2d, 0x532, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0x3}, {0x4, 0xd}, {0xfff2}}, [@TCA_RATE={0x6, 0x5, {0xff}}, @filter_kind_options=@f_bpf={{0x8}, {0x24, 0x2, [@TCA_BPF_CLASSID={0x8, 0x3, {0xfff3, 0x8}}, @TCA_BPF_CLASSID={0x8, 0x3, {0x0, 0xdb912443785a19c0}}, @TCA_BPF_FD={0x8}, @TCA_BPF_CLASSID={0x8, 0x3, {0x5d8930fca15c05f4, 0xfff2}}]}}, @filter_kind_options=@f_u32={{0x8}, {0x7e0, 0x2, [@TCA_U32_ACT={0x594, 0x7, [@m_ctinfo={0x14c, 0x6, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0xc, 0x7, 0xffffffffffffffff, 0x6, 0x2}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x341}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x6}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x10001}]}, {0xe8, 0x6, "c0757fa478fede1dbe2a307850416c5b008332e36f48cabeef841a0f47234d89f010cc1a572daeae116f07f38be0db67d0f029ef176ee8315b19d2c537d8115a09bbc324294ab9be433d6a21c976285e64be25546deea2ad06928dc99d0597c55c9083fbb774377516382e6e91dcfe0db6429770664e43975e20a87c006a5aaf7c6f9988f5f145e3428998db4dc95e102f941783e51d5647893764a8051e08269352fbff25e3905def08be37b0ac5c8980bd12481f82d05fed0b56cd5f873c19f8b30f123924317158e18d8731fc7d5fb8e028152c656cfad9263a4addc6a3ccaee125a9"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mpls={0xa0, 0x18, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x3d44400, 0x3, 0x5, 0x6, 0x2}, 0x2}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x448d7}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x45, 0x6, "10cd9fb36dc4efb69e253d05cd5d0b823131ccc01ed1dc5e1223dc2f46c3928cf3af557d58c0bbfe80bf9480fc5577ffbe4c96b40fe80bdab505775981282511e5"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_vlan={0x14c, 0x11, 0x0, 0x0, {{0x9}, {0x48, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xfffffff1, 0x1, 0x20000000, 0xfffff800}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x81e}]}, {0xd9, 0x6, "a7fd5621099ed59ef1d226f59006cc63be972655dce1752d9184ca3910855f3e3802887dfc67cc8d610e9103a040e13523ddca01dd6bcec4f19d64b09545f9593de7e90222f6b0353fc58f6d3caef57d9ca3e6fc6b19a1820a75bcc4fcffa1c5cc9f5e220bbc097cd6ae88bb9704231e2ebcd6425e8e041a5ca2a0fb8cdb17a968dc193d8a9fe09ad8b1e1c1b8eaa9e8b64ce63b3653d7e6c10216e811ae927e8ef8933d4299542522ae563e3eed25771c983640dbdbd3a213295e77718ab7eeebaad02269d1f54a124979a5ee68356e090efccdd1"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_nat={0x180, 0x1f, 0x0, 0x0, {{0x8}, {0xa4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x3, 0x2, 0xde4b, 0xd79}, @multicast2, @multicast2, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x9436, 0x20000000, 0x4, 0x8}, @broadcast, @remote}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xb, 0x1, 0x5, 0x401, 0x3}, @private=0xa010100, @remote, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x46df, 0x10000000, 0x4, 0x7ff}, @dev={0xac, 0x14, 0x14, 0x3e}, @empty, 0xffffff00}}]}, {0xb8, 0x6, "ce97c0164a88016641483dc33ecdf87d0c20891694fa72f3d7919d5b639475e0bbd1d6b327a5c7d6b71cc321de471c1923c60bb2257d205ad0eb0ff12e1d91fb21e486ee0e0c35d1a0b86e76a0b6fe69fa0fc99e40b37a801c0887516b46ce114aa1c1d077260b88bf2265b90a1bcc061c53ddd9b9babbd797ad3643bb7e037d281b447180d29f48ea85de6231c525b6410f1c7a37eafb689090d4d5cb2317c4b8fa4d68471d217db9e0007af75dda720cf565f7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_gact={0xd8, 0x7, 0x0, 0x0, {{0x9}, {0x7c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x81, 0x8, 0x20000000, 0x2b4, 0xf33a5e6c}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x2353, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x5, 0xf, 0xffffffffffffffff, 0xfffffff0, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x1, 0x4, 0xdd3, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x18a, 0xffffffffffffffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1e87, 0xffffffffffffffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x80f, 0x4}}]}, {0x34, 0x6, "8c93d933f5b541a00289530c4856c5518200ebfa5c5277079f909fb19b3609208b7f90051a2a87cf7f304f4171d3d9b2"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_U32_HASH={0x8, 0x2, 0x7c}, @TCA_U32_SEL={0x124, 0x5, {0xc, 0x1a, 0x40, 0x0, 0x49, 0x1, 0x4, 0x0, [{0x593e, 0x0, 0x0, 0x5}, {0x8, 0x5, 0x8, 0x7}, {0x3, 0x11d, 0x80, 0x2}, {0x1ff, 0x101, 0x1, 0x7}, {0x3, 0x2, 0x8001, 0x1}, {0xe, 0xffffffff, 0x1}, {0x1, 0x9, 0x6, 0x2}, {0x4, 0x6, 0x80, 0x8}, {0x40, 0x8, 0x10000, 0x80000000}, {0x80000001, 0x9, 0x8, 0x5}, {0x80000001, 0x4, 0x5, 0xde5a}, {0x38d, 0x1, 0x5, 0x9}, {0x5, 0xd, 0x0, 0x5}, {0x469, 0x4, 0x6d9, 0xf}, {0xffffffff, 0x2, 0x3, 0xfffe0000}, {0x6f, 0x0, 0x6, 0x2}, {0x1000, 0x6, 0x6, 0x8001}]}}, @TCA_U32_ACT={0x10c, 0x7, [@m_ct={0x108, 0x5, 0x0, 0x0, {{0x7}, {0x58, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @multicast2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @loopback}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @TCA_CT_LABELS={0x14, 0x7, "68b09bda84936c9ce80932c338ed3f5c"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}]}, {0x8b, 0x6, "bc4eb6e91fb43faa760b989ba39ab52452f03e25da0f9981d7f997a3740761f8bcd2d65994c34818dfb29727daeb89eda2fdf8da802edb980ba81b47e7bda5623583e6af437ca6ea9968863e98324e7af9f76687bac7784ed185cc4af53608956b1fcb7dbcb79496c6ae3069a4a6fb521a7c362f5d1eb8efe0f0e6df0753bed3c2cd547b28e095"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_U32_FLAGS={0x8, 0xb, 0x3}, @TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x3b74, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x1f, 0x3}}, @TCA_MATCHALL_ACT={0x34cc, 0x2, [@m_xt={0xfc, 0x1b, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0xcc, 0x6, "73f382f5843fb6b65882f492c6e1898213fb5ca6e2ddf2f3df559e727dfde13be3a08bdc4b1e18a3f62e2ec86e59e375ebe8158b842573f8bc0579ea76467d60560d187074b06094e4710e5b14c0bdcdf36a1f6a6977f7625a80f42050a31593fef3351b4f414035bc93034644912b0465ba9cc1420787771a4b07e8325d242a43bc319cd7223c16a4a3bed155d53ddab5c817313ef08f82b0e6718983e31dc940570d59ccc48f6ae8fa94b286537fa8115eae48dc170b5b9fb84978b341fd896903d83c259c6964"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_police={0x317c, 0x1f, 0x0, 0x0, {{0xb}, {0x3134, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xffffffff, 0x4, 0xadaa, 0x9, 0x9, 0x5, 0x7, 0x1, 0x2a, 0x4, 0x8, 0x8, 0x7, 0x7, 0x4, 0x81, 0xc0000000, 0x0, 0x1, 0x101, 0x9, 0x7f, 0x401, 0x1621695a, 0x80, 0x5, 0x86cf, 0x9, 0xffffff5f, 0x5, 0x1ff, 0x6, 0x2, 0x3, 0x4, 0x7, 0x10000, 0x0, 0xbb01, 0xe, 0x3, 0x7fff, 0xf0000000, 0x7fffffff, 0xfffffbff, 0x9, 0x80000001, 0x829, 0x6, 0xa, 0xc268, 0x100, 0x7, 0x81, 0x1, 0xb414, 0x2, 0x5, 0xe6, 0x4, 0x80, 0xfffffffb, 0x8, 0x81, 0x8691, 0x80000001, 0x0, 0x7ce4, 0xfffffffd, 0x70, 0xc, 0x8, 0xffffff00, 0x4, 0x2, 0xe0000, 0x62, 0xfffffff7, 0x4, 0x4, 0x9, 0xcec0, 0xc4ad, 0x624800, 0xfff, 0x49c4, 0x9, 0x60c2, 0x204, 0x9, 0x5, 0x101, 0x180, 0xa, 0x18000000, 0xfffffffb, 0x5, 0x201, 0x0, 0x6, 0x401, 0x0, 0x1ff, 0x0, 0x10, 0x8, 0xfffffffb, 0x2, 0xffff6953, 0x7d, 0x9, 0xfffffff7, 0x1, 0x4, 0x80000001, 0x7, 0x3ae, 0x3, 0x6, 0x5, 0x0, 0x7fffffff, 0xd0c, 0x6, 0x6832, 0x9, 0x5, 0x1, 0x0, 0x7, 0x98, 0x4, 0x5dac, 0xfff, 0x80b, 0x3, 0x6, 0x5, 0x80000001, 0x7, 0x7fffffff, 0x800, 0xff, 0x0, 0x9, 0x9, 0x1, 0x7, 0x3, 0xfcfa, 0x1ff, 0x5, 0x1, 0x0, 0x4, 0x7, 0x7fffffff, 0x1, 0x400, 0x0, 0x2, 0x7ff, 0x4, 0x2, 0x58a, 0x4, 0x6, 0xea, 0xeda6, 0x46625de2, 0x6fe2, 0x5, 0x7, 0x9, 0x1000, 0x9, 0x7, 0x9, 0x1, 0x8, 0x4a5, 0x1, 0x7, 0x39, 0x8, 0x8, 0x401, 0x5, 0x10000, 0x2, 0x7ff, 0xf, 0xffffffff, 0x80000000, 0x6, 0x6, 0x6, 0x9, 0x6, 0xfffffff8, 0xa000000, 0x6, 0x0, 0x401, 0x27, 0xb800, 0x4, 0x8001, 0x1ff, 0xf, 0x40e, 0x47, 0x67, 0x8000, 0x7ff, 0xc0, 0xfff, 0x2, 0x5, 0xfffffffe, 0xc35b, 0x9, 0xffffffff, 0x34, 0x8, 0x2, 0x7, 0x7ff, 0xfffffffb, 0xd35, 0x1000, 0x3c3, 0x10000, 0x5, 0x4, 0x6, 0x7, 0x3, 0x4, 0x200, 0xc2c, 0x8, 0xfff, 0xfffffffe, 0x7, 0x7, 0x2, 0xf0c, 0x239, 0x4, 0x7fffffff, 0x3, 0xd, 0xc95, 0x70c1, 0xa06]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x80, 0x3, 0x80000000, 0x6ba, 0xfffffff7, 0xffffffff, 0x0, 0x2, 0xfffffffe, 0xfffffff7, 0x7f, 0x9, 0xefb0, 0x4, 0x1, 0xfffffffc, 0x1000, 0x0, 0x5, 0xffff, 0x7ff, 0x8000, 0x101, 0xb, 0x1d8a, 0x7fff, 0x2, 0x4, 0x0, 0x47, 0x8000, 0x4, 0x4, 0x81, 0x6, 0x8, 0xa, 0xa, 0x6, 0x712, 0x58bb, 0x2, 0x7ff, 0x0, 0x6, 0x3, 0xf0e, 0x7e, 0x24d8, 0xe, 0x47, 0x100, 0x2a87, 0x5, 0x6, 0x0, 0xe1, 0x5, 0x7, 0x4, 0x10, 0x6, 0x6, 0x4, 0x7, 0xffff3410, 0x81, 0x1, 0x3, 0xb920, 0x1000, 0x6f, 0x9, 0xfff, 0x7, 0x2, 0x6, 0xa06b, 0x2f0b49f0, 0x101, 0x1, 0x100, 0x2, 0xd, 0x0, 0xfffffff8, 0x3, 0x4, 0x8, 0x9, 0x3, 0x7, 0x5, 0x3, 0x0, 0x1, 0x1cb5, 0xffffffff, 0x7f, 0x1, 0x80000001, 0x2, 0xf, 0x3, 0xfd9d, 0x3, 0x6, 0x7, 0xcf59, 0x9, 0x0, 0x7643, 0x6, 0x8, 0x0, 0x9, 0x100, 0x0, 0x8000, 0x40, 0x322a, 0x4bb0, 0x8, 0x10000, 0x800, 0x2, 0x79, 0x5, 0x0, 0x2, 0xd0, 0x8, 0x9, 0xa309, 0xfffffff7, 0x4, 0x195, 0x1, 0x0, 0x2, 0x401, 0xffffff58, 0x7, 0xfffffff8, 0x3ffed258, 0x2f4a, 0x8, 0x6, 0x1, 0x0, 0x40, 0xc, 0x6, 0x9, 0x5, 0x8, 0x7ff, 0x332f0c85, 0x8, 0x1, 0x8, 0x7400000, 0x7, 0x80a1, 0x911a, 0xcc, 0x5, 0xf3, 0xfffffff9, 0x9, 0x7ac5, 0x8, 0x9, 0xf, 0x6, 0x2, 0x480, 0xfffffeff, 0x2, 0x3, 0x5, 0x7, 0xfffffff7, 0x3ff, 0x2e, 0x4, 0x4, 0x2, 0x8, 0x3, 0x4, 0x7, 0x2060, 0x6, 0x8, 0x8cc2, 0x0, 0xbbeb, 0x0, 0x10001, 0xf7, 0x3, 0x6a68, 0x9, 0x5, 0x6, 0x3, 0x6, 0xfffffffd, 0x1, 0xc00, 0x8000, 0xfa92, 0x7, 0x4, 0x0, 0xd0, 0x8, 0x4, 0x7, 0x0, 0x5c, 0x2, 0x8f88, 0xa8c, 0x297d3356, 0x8, 0x7, 0x4, 0x3, 0x80000000, 0x1, 0xffff46c8, 0xd, 0x401, 0x0, 0x823, 0x8001, 0x2, 0x3, 0x80, 0x1, 0x3, 0x5, 0x5, 0x101, 0x400, 0xe, 0x5, 0xffff, 0x7, 0x6079f1aa, 0x21f, 0x2, 0xfff]}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xffffffffffff597a}, @TCA_POLICE_RATE={0x404, 0x2, [0xfffffffe, 0x10, 0x4, 0xac, 0x80000001, 0x5, 0x3ff, 0x59c, 0x9, 0x40df, 0x8, 0x4, 0xe, 0x379, 0x7, 0x2, 0xfffffffa, 0x0, 0x7c, 0x5, 0xf6d, 0x7, 0x0, 0x6, 0x9, 0x0, 0xf7, 0xfffffffe, 0x401, 0x9, 0x6, 0x4, 0xf, 0x10001, 0x6, 0x9, 0x7, 0x5, 0x2, 0xc, 0xf, 0x6, 0x6, 0x6, 0x6, 0x9, 0x9, 0xffff8e02, 0x7, 0xe, 0xffff8001, 0x9, 0xb0, 0x8, 0x74, 0x10000, 0x8, 0x5, 0x3ff, 0x9, 0x4, 0x4, 0x1, 0xefb, 0x33f, 0xe5e2, 0x0, 0x2a7e, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x2, 0x6, 0x7fffffff, 0x104, 0x10001, 0x6, 0x0, 0x0, 0xf5d, 0x4, 0x704bdcec, 0xf, 0x1, 0x1, 0x2, 0x5, 0x3, 0x80, 0xd7, 0x81, 0x81, 0x6, 0x2, 0x5d, 0x1, 0x9, 0xb0d3, 0x2, 0x2, 0x1, 0x8, 0x759c, 0x8, 0x7, 0x1ef, 0x7fff, 0x949, 0xf, 0x1000, 0xffff6def, 0x0, 0x7, 0x1, 0x9, 0x8, 0x3, 0x6, 0x2, 0x1, 0x10001, 0x1, 0x4, 0xf6, 0xffffffff, 0x4, 0x5, 0x200, 0x1, 0x2, 0x3, 0x6, 0x9, 0x0, 0x8, 0x100, 0x6, 0x400, 0x6d20, 0xab2a, 0x6, 0xebc, 0x9, 0xfff, 0xb, 0x3, 0x1, 0x8001, 0xfffff6c0, 0x5, 0x593a, 0x2, 0xe, 0x2, 0x200, 0x6, 0x4, 0x8000, 0x6, 0x2, 0x4, 0x9e, 0x8d, 0x70, 0x0, 0x9, 0x1, 0x7, 0x5, 0x9, 0x8001, 0x8000, 0x8, 0x3, 0x6ff0, 0x0, 0x2, 0xa, 0x5, 0x5, 0x0, 0x23, 0x1, 0x5, 0xd, 0x0, 0x3ff, 0x7db, 0x9, 0x9f, 0x7a5, 0x1, 0x4, 0x1, 0x8, 0x200, 0x20000, 0x7, 0x5, 0x6, 0x7fff, 0x0, 0x2, 0x3, 0x9, 0x9, 0x0, 0x1, 0xfffffffe, 0xffff0000, 0xfffff975, 0x8, 0x50, 0xffffffff, 0x0, 0x5, 0x4, 0x8, 0x8000, 0x9, 0x10, 0xfffffffd, 0xaca2, 0x1, 0xffff, 0x10000, 0x0, 0x35d0, 0x4, 0x55, 0x2, 0x4, 0x4, 0xd, 0x401, 0x6, 0x1, 0x6, 0x40000000, 0x4, 0xde3, 0x8, 0x7f, 0x6, 0x2, 0x40, 0x8, 0xac, 0x9, 0x2, 0x3, 0x3, 0x5, 0x2]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x321b}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x5, 0x3, 0x1, 0x2, 0xb, 0x3, 0x80000001, 0x1, 0x9, 0x0, 0xb, 0x8, 0x4, 0x1, 0x328, 0x1, 0x7, 0x9, 0x0, 0xc15, 0x10000, 0x1, 0x865a, 0x6, 0x3c5, 0x8000, 0x8, 0x8001, 0x6e08, 0x1, 0x100, 0x5, 0xffffffff, 0x8, 0xc7, 0x2, 0x1, 0x200, 0x1, 0x1, 0x1, 0x1, 0x0, 0x800, 0x401, 0x7f, 0x1, 0x1, 0x9, 0x5, 0x70, 0x2, 0x13a6, 0x6, 0xcb, 0x7, 0x4, 0x101, 0x4, 0x1, 0x30d, 0x7, 0xd5, 0x1, 0x7, 0xc, 0x7fff, 0x0, 0x1, 0xc0000000, 0x7, 0x9, 0x3, 0x1, 0x4, 0x10001, 0x6, 0x3, 0x1000, 0x2, 0x7, 0x6, 0x8001, 0x1, 0xfffffff9, 0x9, 0x8, 0x4, 0xffffffff, 0x0, 0xd83, 0x8001, 0x3ff, 0xfe70, 0xd, 0x9, 0x10f, 0x40, 0x3, 0x2, 0x76, 0x5, 0x7, 0x6, 0x40, 0xff, 0x2, 0x6, 0x80, 0x5b, 0x0, 0x82d, 0x7f, 0xffffffc0, 0x4, 0x3ff, 0x4, 0x73, 0x7, 0x4, 0x101, 0x8, 0x8, 0x84, 0x1, 0x74a, 0x5678, 0x8, 0x0, 0x8, 0x3, 0x1, 0x3ff, 0x200, 0x7, 0x18e, 0x0, 0x4, 0x8, 0x0, 0x6, 0x8, 0xc, 0x81, 0x4, 0x4, 0x1ff, 0x3, 0x4, 0x3, 0x1, 0x1000, 0x0, 0x0, 0xff, 0xa, 0x6, 0x2, 0x7ff, 0xdedf, 0x1, 0xcef, 0x2, 0x1, 0x5, 0x4, 0x1000, 0x2, 0x3, 0x1, 0x9, 0x1, 0xf, 0x4, 0x9, 0x6, 0x1000, 0x47, 0x6, 0x8285, 0x5, 0x35, 0x2, 0x20a, 0x8001, 0x346b, 0x4, 0x5, 0x9, 0x6a37, 0x7, 0x4, 0x10000, 0xc4d1, 0xffff, 0x7fffffff, 0x4, 0x7ff, 0x7, 0x400, 0x7, 0x4, 0xfffffff7, 0xec72, 0xff, 0x1ff, 0xa, 0x9, 0x7ff, 0x80000000, 0x7, 0x2, 0x3, 0xfffffffc, 0x9, 0x100, 0x80, 0x6d1, 0xfffff802, 0xff, 0x40, 0xfffffffa, 0x9, 0x2, 0x1, 0xff, 0x7, 0xc44, 0x0, 0x2, 0x8001, 0x2, 0x1, 0x2, 0x80000000, 0x2, 0x6, 0x5, 0xf2, 0x401, 0xb9b7, 0x4, 0x5, 0x9, 0x1, 0x84, 0x0, 0x8, 0x1ff, 0xe, 0x2, 0xb, 0x8, 0xffff, 0xffff11e7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x7, 0xc, 0xa, 0x800, {0x2, 0x1, 0x1, 0x3, 0xfff2, 0x7}, {0x1, 0x1, 0x6, 0x9f, 0x5, 0x39452c95}, 0x101, 0x0, 0xd}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x2, 0x8, 0x0, 0x5, 0xa92, 0x7, 0xffff, 0x2, 0x10000, 0x0, 0x7, 0x0, 0x7, 0x7, 0xffffffff, 0x1, 0x6, 0xb, 0x5, 0x0, 0x7f, 0x0, 0x6, 0x80000001, 0x401, 0x2, 0x5, 0x800, 0xf, 0x7fffffff, 0x9, 0xf8b, 0xd5, 0xfffffff7, 0x81, 0xffff3a6f, 0x7, 0x4ff8, 0xfffffff8, 0x8, 0x3ff, 0x7, 0x7, 0x0, 0x8, 0x101, 0x2, 0xfffffff7, 0x50, 0x1, 0x1443, 0x5, 0x0, 0x1, 0x7c9, 0x5, 0x2, 0x7fff, 0x8, 0x0, 0x1, 0x7, 0x7, 0x8000, 0x8000, 0x0, 0x4, 0x1, 0xfffffffa, 0x8, 0xf70, 0x0, 0x2, 0xc, 0x7, 0x2, 0x5, 0x9, 0x83d, 0x5, 0x7, 0x70000000, 0x6, 0x6, 0xa939, 0x200, 0x4, 0x1, 0x0, 0x3ff, 0x170, 0xbdf, 0x6, 0x3, 0x5, 0x1, 0x9, 0x479, 0x30, 0x6, 0x7, 0x9, 0x8, 0x5, 0x4, 0x80, 0x5, 0x2398, 0x8001, 0x4, 0x40, 0x4, 0x2, 0x0, 0x6, 0x9, 0x9, 0x4, 0x2, 0x7fffffff, 0x0, 0x1, 0x0, 0x1ab053fb, 0x1000, 0x2, 0x45d, 0x6, 0x6, 0x3, 0xfff, 0xf4d, 0x82, 0xffffb542, 0x5, 0x2, 0xd09, 0x80000001, 0x7fff, 0x0, 0x9, 0xc, 0x8, 0xe, 0x5, 0x1e94, 0x9, 0x7f, 0x8, 0xe75e, 0x8001, 0x101, 0x4, 0x1000, 0x0, 0xf, 0x3, 0x0, 0xf7b, 0x6, 0xfffffff9, 0x0, 0x7, 0x2, 0x2, 0x9, 0x5, 0x2, 0x1, 0x5, 0x80000, 0x10000, 0xe, 0xe3, 0x7, 0x9, 0x0, 0x401, 0x81, 0xc7, 0x0, 0x3, 0x10001, 0x4, 0x8001, 0x78, 0xfffffffe, 0xfffffff7, 0x10001, 0x631d2ee8, 0xb, 0x0, 0x5, 0x3940f836, 0x3, 0x8, 0xffffffff, 0x7, 0x52b6, 0x9, 0x6, 0xe70a, 0x4, 0xe17, 0x0, 0x0, 0xfffffe00, 0x6b0, 0x6, 0x8001, 0x7, 0x3, 0x430, 0x0, 0x0, 0x6, 0xffffffff, 0x5, 0x9, 0x0, 0x6, 0x0, 0x0, 0x7, 0x4c1, 0x1, 0x6, 0xe0de, 0x8, 0x8, 0xc, 0x1, 0x9, 0xec, 0x0, 0x7fff, 0xffff, 0x5, 0x42f, 0x5, 0x0, 0x5, 0x1, 0xda81, 0x81, 0x92, 0xc1, 0x6, 0x8, 0x9, 0xdf11, 0x9, 0x80000000, 0x101, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x5, 0x5, 0xcf, 0x35c9, {0x7, 0x2, 0x1000, 0xf2, 0x6, 0x33c}, {0x5, 0x2, 0x9, 0x941, 0x8, 0x85df}, 0x3b6b28d2, 0x5, 0x7f}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x3, 0x8, 0x1, 0x7, 0x0, 0x6, 0x0, 0x7, 0x4edb, 0x7, 0x5, 0xfffffffd, 0x8, 0x3ff, 0x3, 0x5, 0x2, 0xfffffff7, 0xa, 0x9, 0x3, 0x91a4, 0x200, 0x6, 0x8, 0x9, 0x0, 0x3, 0x6, 0xfff, 0x80000000, 0x2, 0x7, 0x0, 0xe804, 0x59c, 0x10001, 0x5, 0xffffffff, 0xfffffff0, 0x2, 0x80000001, 0x40, 0x3, 0xb, 0x8, 0x6, 0x2, 0x0, 0x7, 0x30, 0x0, 0xfffffc00, 0xfffffffa, 0x7, 0x1, 0x0, 0x6, 0x200, 0x3, 0xe, 0x3, 0x1, 0x7, 0x9, 0x9, 0x9, 0x6, 0x4726, 0x3, 0x8, 0x2, 0x80, 0x2, 0x5f5eb9ee, 0x9, 0x6, 0x6, 0x19, 0x2, 0xffffffff, 0x9, 0x1, 0x0, 0xb, 0x4, 0x5, 0xfffff800, 0xfffffff8, 0x10, 0x9, 0xfffffffa, 0x5, 0x401, 0x80000000, 0x200, 0xb0, 0x7, 0x7, 0x904802e, 0x80, 0x2, 0x4, 0x0, 0x5, 0x80000000, 0x800000e, 0xfffffe00, 0x3, 0x100, 0x2, 0x7f, 0x40, 0x3, 0x4, 0x1df4, 0x0, 0x100, 0xf, 0x3c19, 0x1, 0xfffffffc, 0x9, 0x8001, 0x4334, 0xd, 0xd, 0x8, 0x7ff, 0x1, 0x1000, 0x8, 0x4, 0x400, 0x1, 0xff, 0x9, 0x3, 0x8, 0xf, 0x8, 0xfff, 0x8, 0x80, 0x0, 0x8, 0x8, 0x5, 0xfffffffa, 0xc769, 0x3, 0x0, 0x3, 0x4, 0x9, 0x4, 0x8, 0x620b, 0x0, 0x2, 0x6f316a1, 0x1000, 0x3, 0x5, 0x5, 0x1ff, 0x5, 0xfffeffff, 0x4, 0x7, 0x1, 0x0, 0x9, 0x80000001, 0x6, 0xfff, 0x0, 0x7, 0x5, 0x8, 0x7, 0x9, 0x0, 0x40, 0x800, 0x0, 0x15f, 0x10001, 0x4, 0x2, 0x0, 0x7f, 0x7fffffff, 0x7, 0x9, 0x1, 0x6, 0x0, 0x4, 0x1000, 0x400, 0x2, 0x5, 0x7, 0x5cad4123, 0x2, 0xff, 0x47, 0x200, 0x8, 0xec84, 0x3, 0x0, 0x5941, 0x9, 0xda, 0xd8, 0x1, 0x3ff, 0xfff, 0x3, 0x7, 0x9, 0xfffffc01, 0x9, 0xb, 0x9, 0xb, 0x9, 0x7, 0x0, 0xe, 0x401, 0x1c00000, 0xe0000000, 0x1, 0xe, 0x7, 0xa6, 0x6, 0x3, 0x4, 0x1, 0xfff, 0x4, 0x200, 0x8469, 0x22, 0xc9, 0x8, 0x10, 0x0, 0x7, 0xa449, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x27a5, 0x6, 0x6, 0x7fffffff, 0x80000001, 0x6, 0x3, 0x0, 0xe5a9, 0x0, 0xffff, 0xa3e13ef, 0x10, 0x4, 0xfffffffb, 0x5, 0x0, 0x6, 0xaaf, 0x62, 0x4, 0xc67d, 0x81, 0x1ff, 0x9, 0x81, 0xfffffffe, 0x0, 0x7fffffff, 0x1ff, 0x2, 0x2, 0x1e4, 0x10001, 0x8, 0x3, 0xf20, 0x7, 0x3, 0xb5f, 0x9e3, 0x3, 0xb7, 0x460e, 0xe4, 0xfffffff9, 0x1, 0x1, 0x10001, 0x7, 0x5, 0xe, 0x6, 0x6, 0x3, 0x10000, 0x6, 0x7, 0xc, 0x81, 0x9, 0x1, 0xc, 0x5, 0x6, 0x3d, 0x4, 0x3, 0x2, 0xf1, 0x7ff, 0x5, 0x9, 0x7fff, 0x3, 0xfffffffc, 0x5, 0x6, 0x9, 0x0, 0x6, 0x5, 0xb, 0x5, 0x9, 0xf, 0x5, 0x6, 0x4, 0x4, 0x4, 0x6, 0x6, 0x60d, 0x951, 0x0, 0x6, 0x5, 0xff, 0x7713, 0x5, 0x28, 0xff, 0x9, 0x6, 0x2, 0xfffffffb, 0x66, 0x9, 0x7fff, 0x0, 0x4, 0x9, 0x6de171cc, 0x906d, 0x7f, 0x40, 0x5, 0x0, 0x6, 0x3, 0xfffffffe, 0x2, 0x5, 0x15a, 0x4, 0x7, 0x0, 0x1, 0xac, 0x0, 0x23e, 0x7f, 0xfffffffb, 0xc, 0x9, 0x7, 0x7ff, 0x6c9a, 0x5, 0x9, 0x4, 0xe25, 0x5, 0x200, 0x0, 0x2, 0x237c, 0x2, 0xb, 0x6, 0x3, 0xfb4, 0x7, 0xd, 0xdf, 0x2, 0x4, 0x6, 0xf, 0xffff, 0x1000, 0x5, 0x3, 0x100, 0x7, 0x1, 0x6, 0x7, 0xffffcdda, 0x43c, 0x9, 0x3ff, 0x56, 0x4, 0x80000000, 0x7, 0xfffffff9, 0x7, 0xb, 0x9, 0x7, 0xffff18c5, 0x4, 0x4, 0xdad, 0x9, 0x9, 0x8, 0x9, 0x0, 0xfffffffd, 0x4, 0x5, 0x9, 0x9, 0x0, 0x8, 0x3, 0x8, 0x2, 0x80000000, 0x7, 0xd2, 0x6, 0x8, 0xf, 0x5, 0x5, 0x4, 0x7fffffff, 0x5, 0xad, 0x1, 0x0, 0x659, 0x0, 0x2, 0x9, 0x3, 0x3, 0x0, 0x1, 0x7, 0x3, 0x3, 0x5, 0x7, 0x3ff, 0x9, 0x86, 0x6, 0x10, 0xa, 0x0, 0x8, 0xba, 0x9, 0xffffdf38, 0xbce, 0x6, 0x4, 0xa4c7, 0x5, 0x0, 0x8, 0xac, 0x80000, 0xe76, 0x9, 0x4, 0x40, 0x40, 0x1, 0x2]}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x0, 0x0, 0xdd99, 0x81, 0xfffff788, 0xfc05, 0x0, 0x3, 0x140000, 0x1000, 0x1, 0x1, 0x3, 0x6, 0x8, 0xc, 0x3ff, 0x6, 0x2b6, 0x8, 0x4aff, 0x7474, 0x2, 0x4, 0x8, 0x1, 0xd, 0x4, 0x1, 0x4, 0x4, 0xd15, 0x7, 0xffffaff6, 0x8, 0x9, 0xffff4ae3, 0x400000, 0x4, 0x6, 0x5, 0x0, 0x4a1, 0x9, 0x77c6, 0xf340ee6c, 0x2, 0x1, 0x4, 0xffffffff, 0xa, 0x8001, 0x0, 0x0, 0x4d9, 0x6, 0x0, 0xffffff7b, 0x6, 0x1, 0x2, 0x9, 0xfffffff8, 0xca3, 0x3, 0x7fffffff, 0xffffffff, 0xfffffff8, 0x9, 0x5, 0x3, 0x0, 0x80, 0x5, 0x6, 0x8001, 0xffff, 0xffe3, 0x3, 0xe9a5, 0x3e4, 0x1000, 0x57, 0xb, 0x6, 0x6, 0x580000, 0x0, 0x2, 0x9, 0x8, 0xef38, 0x6, 0x7fffffff, 0x1, 0x37, 0x5, 0x60000000, 0x0, 0x3, 0x8, 0x8, 0x8000, 0x3, 0x1, 0x7e34, 0x8, 0x1ff, 0x67, 0x9, 0x6, 0xca, 0x27f, 0x7, 0x80000001, 0xc1c, 0x418b, 0x20, 0x2, 0x6, 0xa, 0x0, 0x1, 0x81, 0x7, 0x2, 0x4, 0xbe24, 0x4, 0x4f2, 0x7ff, 0xfffffffb, 0x4, 0x6, 0x4, 0x87d9, 0x81, 0x1, 0x8, 0x1c, 0x4, 0x8, 0x7fffffff, 0x938, 0x6b, 0x0, 0x7, 0x6, 0xffffff19, 0x800, 0x0, 0x7, 0x6, 0xfffffffc, 0x2, 0x3, 0x6, 0x9, 0x4, 0x4a73, 0xe1, 0xb71, 0xfffffff9, 0x4, 0xffffffff, 0x1, 0x9, 0x19a, 0x9, 0x8, 0x62, 0x7, 0xfffffe00, 0x1, 0x6, 0x6, 0x3, 0x16c, 0x5, 0x1, 0x8, 0x0, 0x4, 0x4, 0x9, 0x0, 0x6fc, 0x400, 0xfffffff9, 0xfffffffc, 0x0, 0x9, 0x80000001, 0x800, 0x5, 0x7, 0x3, 0x9, 0x81, 0x7, 0x10000, 0x2, 0x56d, 0x8, 0x4, 0x1, 0x4, 0xf92, 0x7, 0x3ba, 0x7, 0xce25, 0xfa, 0xa, 0x200, 0x8, 0x8e, 0x3, 0x1, 0x1000, 0x9, 0x8, 0x6, 0x7fffffff, 0x1, 0xfffffff7, 0x1, 0x5, 0x5, 0x33, 0x8, 0xfffffff7, 0x2, 0x3, 0xc, 0x10, 0x9, 0xd14, 0x7, 0x6, 0x5, 0x8, 0x511, 0xffff, 0x8001, 0x7ff, 0x5172b490, 0x6, 0x3, 0x4b5, 0xbf, 0x3, 0x99, 0x4, 0x5]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x20000, 0x1, 0x10, 0xffffffff, 0x0, {0x6, 0x2, 0x2, 0x8, 0x2, 0xfffffffb}, {0x6, 0x0, 0x101, 0x7, 0x3, 0x1}, 0x9, 0x1, 0x2c0}}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x9, 0x6, 0xffffffbb, 0x9, 0x0, 0x3, 0x3, 0x7ff, 0xc7, 0x7, 0x7ff, 0x3, 0x4, 0x80000000, 0x7ff, 0x80000000, 0x3, 0x6, 0x3, 0x5, 0x5, 0x5, 0x7fff, 0x3, 0x5, 0x80, 0x4, 0x5, 0x7, 0x1, 0x1, 0x3, 0x9, 0x48, 0x10, 0x16, 0x8001, 0xffffffff, 0x10, 0xff, 0x6, 0x9, 0x4, 0xe, 0x2040, 0x7, 0x9, 0x5aa1, 0x1, 0x3, 0x9af, 0x4, 0x9, 0x8, 0x7, 0xc, 0x800, 0xfffffff7, 0x8, 0xfffffeff, 0x800, 0x4, 0x1, 0xc8, 0x3, 0x4, 0x8, 0x73f1, 0x5, 0x7f, 0x11cc, 0x6, 0x9, 0x95, 0x5, 0xfd, 0x0, 0x4, 0x6, 0x6e, 0x258800, 0x6, 0x7ff, 0x48d0, 0x3, 0xd, 0x1, 0x7, 0x6, 0x5, 0x8000, 0x7ff, 0xffff, 0x8, 0x519c, 0x5, 0x0, 0x10000, 0x9d31, 0x8, 0x2, 0x6, 0x7, 0x6, 0x8, 0x0, 0xeaf4, 0x5, 0xfffffff1, 0x3a79e569, 0xffffffff, 0x400, 0x2, 0xc38a, 0x4, 0x2, 0x2, 0x5, 0x401, 0x0, 0x3, 0x4d55, 0xbe6, 0x2, 0x9, 0x800, 0x100, 0x3b, 0x7, 0x7ff, 0x7, 0x7fffffff, 0x1, 0x7, 0x6, 0x10, 0x1, 0x8, 0x4, 0x401, 0xe117, 0x7, 0xf5d, 0xfffffffb, 0x8, 0x2dd, 0x10, 0x2, 0x10000, 0x800, 0x8, 0x2, 0x8, 0x8001, 0xfffffffb, 0xc3, 0x7, 0xfaa1, 0x0, 0x80, 0x8, 0x1, 0xffffff35, 0x0, 0xfffffffc, 0x2, 0x0, 0x3ff, 0x19ee, 0x7fff, 0x9, 0x401, 0x8, 0xf111, 0x0, 0x2, 0x2, 0x1, 0x8, 0x3f34, 0x7ff, 0x4, 0x6, 0xfc25, 0x8, 0x9, 0x2, 0x5, 0x9c8b, 0xfffffff7, 0x9, 0x0, 0x7, 0x766, 0x1, 0xdbbb, 0x200, 0x9, 0x40, 0x7, 0x7, 0x5, 0x8, 0x0, 0x62710000, 0x4, 0x4, 0x404, 0x6, 0x7fffffff, 0x4, 0x2, 0x30000000, 0x7, 0x5a, 0x0, 0x10, 0x101, 0x400, 0x7fffffff, 0x0, 0x50, 0x9, 0x3a1, 0x4, 0x5, 0x4, 0x3, 0x800, 0xffffff81, 0x400, 0x425, 0x83, 0x3, 0x3, 0xdd0, 0x9, 0x4d98, 0x2, 0x0, 0x4, 0x4, 0x1ff, 0x2, 0xd, 0x3, 0x3, 0xe, 0x2, 0x5, 0x4, 0x2, 0x4, 0xbb1, 0x40000]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xd, 0x9, 0x4, 0x9, 0x4, 0x0, 0x1, 0x2, 0x7, 0x4, 0x0, 0x3ff, 0x1, 0x80, 0x1, 0x3, 0x1, 0x5, 0xc1, 0x8, 0x10000, 0x4, 0x9, 0x2, 0x8, 0xb4, 0x6, 0x6, 0xfffff801, 0x10001, 0x4, 0x6, 0x6, 0xf, 0x2, 0x1, 0xff, 0x9, 0x7fffffff, 0x7ff, 0x9, 0x8, 0x1, 0xb7, 0x80000001, 0x401, 0x80, 0x7, 0x7, 0x3, 0x9a, 0x5, 0x2, 0x7f, 0x9, 0x7fff, 0xffff6b5b, 0x5, 0x10000, 0xc, 0x8, 0x4, 0x200, 0xffff6639, 0x2, 0x9, 0x4, 0x5, 0xa2, 0x4, 0xa, 0xfffffffa, 0x800, 0xffff, 0x8000, 0x1c, 0x7, 0x5, 0x3, 0xe, 0x1ff, 0x6, 0x0, 0x67, 0x7, 0x5, 0x7, 0xc, 0x9, 0xb61, 0x101, 0x6, 0x401, 0x3da, 0x2, 0x8, 0x1000, 0x10, 0x9, 0x77a, 0x8, 0x5, 0x8, 0x7, 0x367b08ef, 0xf089, 0x1, 0x9, 0x7, 0x6, 0x80000001, 0x3, 0x1, 0xa, 0x7, 0xcaf, 0x2, 0x4e5fa8f, 0x5, 0x3, 0x8, 0x1, 0xfffffff9, 0x7, 0x2, 0x9, 0x1000, 0xfffffff7, 0xfffffffe, 0xf, 0x3b6, 0x463e8c6, 0x0, 0x9, 0x2, 0x6, 0x1, 0x7, 0x7, 0x9, 0x1ff, 0xfffffff8, 0x800, 0x6, 0x0, 0xa8b00000, 0x3, 0x8e, 0x6, 0x7, 0x56000000, 0x9, 0x0, 0xb667, 0x5, 0x81, 0x1, 0x5, 0xd, 0x7, 0x3ff, 0x0, 0x8, 0x8, 0xa4, 0x9712, 0x5, 0x0, 0xc70, 0xf, 0xf, 0x6, 0x8001, 0xcbd1, 0x5, 0x3, 0x21e5, 0x4, 0x7fff, 0x7, 0x40, 0x9, 0x10001, 0x80, 0x1, 0x6, 0xf1, 0x6, 0xfffffffd, 0x6, 0x9, 0xc07, 0x3, 0xa, 0x400, 0x9, 0xe, 0x13, 0x5, 0xb, 0x40, 0x4, 0xc405, 0x9, 0x5, 0xc, 0xfffffff7, 0x0, 0x7, 0x1ff, 0x81, 0x3, 0xf6d8, 0x400, 0x3, 0x2e, 0x9, 0xf4042cd1, 0x7, 0x0, 0x7ff, 0xf, 0xe, 0x8, 0x1, 0x4, 0x6, 0x8, 0x1000, 0x5, 0xa, 0x9, 0x5655, 0x0, 0xfffffffe, 0x3, 0xffffffff, 0x8000, 0x6, 0x5, 0x2, 0xd, 0x2, 0x1, 0x2, 0x625, 0x308, 0x7, 0x4, 0x6, 0x0, 0x9, 0x80000000, 0x0, 0x0, 0xea8b]}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x10001, 0x5, 0x0, 0xaab, 0x2, 0x2, 0xb, 0x1, 0x6d0, 0x80000001, 0x8, 0x6, 0xe57, 0xd7ed, 0x0, 0xe2c5, 0x1, 0x3, 0x7, 0x7, 0x4, 0xed4, 0x9, 0x7, 0x9e, 0x6, 0x1, 0xb7, 0x80, 0x9, 0x0, 0x9, 0x9, 0x9, 0x6, 0x81, 0x2, 0x9, 0xffff7012, 0x2, 0x2, 0xff, 0x5, 0x7fffffff, 0x2, 0x9, 0xbcc, 0x2, 0x2, 0xfffff460, 0x7, 0x8, 0xfffffffa, 0x8, 0xbda, 0x80000001, 0x9, 0xeb2e, 0x67, 0x2, 0x800, 0x0, 0x6, 0x96, 0xc, 0x8, 0xffff, 0x7, 0xfffffff9, 0x400, 0x1db, 0x8, 0x1, 0x1, 0x80000000, 0xe2, 0x6, 0x6, 0x4fa3, 0xd84, 0x10000, 0xffffff82, 0x5, 0x400, 0x1, 0xf, 0x7, 0x1ca, 0x8, 0x139539d5, 0x10000040, 0x8, 0x4, 0x8, 0x0, 0x489, 0x74f, 0x4, 0xcdd2, 0x10001, 0x16000000, 0x4000, 0x1, 0x55, 0x7, 0x101, 0x7, 0x3, 0x80000000, 0xfffffffc, 0x5f9b, 0xffffffff, 0x7, 0x7, 0x17, 0x6, 0x3, 0x911, 0x48, 0xa2, 0xfffffffd, 0x2c660, 0x7fffffff, 0x2, 0x3, 0x1, 0x4, 0xfffffff9, 0x9, 0x4f73e055, 0x5, 0x9, 0x4, 0x1000, 0x100, 0x8001, 0x5, 0x8, 0xe, 0x0, 0x1, 0x4, 0x5, 0xb, 0x3, 0x8001, 0x4, 0x9, 0x4, 0x7, 0x9, 0xf6, 0xb, 0x4da0, 0x6, 0x2, 0x0, 0x7, 0x278a2c3c, 0x3, 0x2, 0x0, 0x80000000, 0x9, 0xffffffff, 0xb0bbaf1, 0x5, 0x3, 0x10001, 0x40, 0x81, 0x7, 0x200, 0x5, 0x5, 0xe48, 0xfffffffe, 0x9, 0x6, 0x1, 0x7f, 0x0, 0x2be, 0x0, 0x2, 0x29, 0xffffff80, 0x2, 0x1, 0x4, 0x6b, 0x4919, 0x3fca, 0xe539, 0x1, 0x87fb, 0x4, 0x5, 0xa14, 0x0, 0x1000, 0x3, 0xffff, 0x0, 0xc, 0x3, 0xf517, 0xfffffff8, 0x10001, 0x6, 0x200, 0xf, 0xc6da, 0x9, 0x80000001, 0x3, 0x2, 0x2, 0x4, 0x80, 0x8, 0x7, 0x7ff, 0x7fffffff, 0xc7d0, 0x3400000, 0x5, 0x2, 0x7, 0x2, 0xffffff18, 0xfffffffd, 0x1, 0x9, 0xfffff801, 0x0, 0x3, 0xf5, 0x1, 0x0, 0x0, 0x4, 0xd, 0x5, 0x0, 0x2, 0x51, 0x1000, 0x8, 0x8, 0x2, 0x1ff, 0xffff, 0x5, 0x1]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0xff98}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x7fff, 0x69d, 0x0, 0x0, 0x0, 0x8, 0x9, 0x3477, 0x7, 0xd6, 0x1, 0x0, 0x4, 0x8, 0x7, 0x1, 0x0, 0x7, 0x3, 0x6, 0x8, 0x6, 0xffffffff, 0x1, 0x8, 0x9, 0x400, 0x800000, 0xffffff04, 0x4, 0x9, 0x6, 0x7ff, 0x3, 0xf8b, 0x7, 0x101, 0x2, 0x7, 0x5, 0x4, 0x2, 0xf867, 0x2, 0x5, 0x1aaf, 0x100, 0x1, 0x845, 0x10, 0xfffffff9, 0x2f326af2, 0x1, 0xffff0001, 0x8, 0x0, 0x101, 0x6, 0x9, 0x2, 0x5, 0x6, 0x80000000, 0x200, 0x9, 0xf, 0x2, 0x1, 0x42, 0x4, 0xf, 0x3, 0x81, 0xd, 0x35, 0x6, 0x3, 0x6, 0xfffffff9, 0x3, 0x6, 0x2, 0x800, 0x80000001, 0xae, 0xda, 0x6b, 0x2, 0x65, 0xfffffffc, 0x5, 0x0, 0x0, 0x0, 0x4a4f, 0x0, 0x5, 0xb1b3, 0xef, 0x80000000, 0x7104, 0xc, 0x3, 0x2, 0xd, 0x2, 0x4c06, 0x3fcb, 0xa0, 0x8000, 0x8, 0x7, 0x49e4eb69, 0x298c4bf3, 0x617, 0x0, 0x8, 0x8, 0xc3, 0x9ca7, 0x2c, 0x1, 0x7fffffff, 0x245780, 0x5, 0x19a0, 0x6, 0x1, 0x200, 0x3, 0x62, 0x3, 0x2, 0x7f, 0x81, 0x7, 0xffff, 0x8, 0xb517, 0x0, 0xffffff80, 0x7ff, 0x4, 0xfff, 0x800, 0x2577, 0x7, 0x9, 0x8, 0x80000000, 0x4, 0xc, 0x2, 0x4, 0xffffff01, 0xd, 0x69, 0x8, 0x1, 0x8, 0xcf1, 0xc83, 0xe, 0xbab, 0x4, 0xa2a, 0x6, 0x3, 0x8, 0x4, 0x6, 0x9, 0xfffeffff, 0xfff, 0x7, 0x0, 0x5, 0x5, 0x9, 0x2, 0x7, 0x3, 0xae2, 0x0, 0x235, 0x9, 0x2, 0x6, 0x1, 0x1, 0xbd, 0x619a, 0xa, 0x2, 0x6, 0x6, 0xf, 0x7fffffff, 0x6, 0x8, 0x4, 0x9, 0x9a5, 0x4, 0x3, 0x4, 0x4, 0x5, 0x8001, 0x0, 0x80, 0x8, 0x7fff, 0x7, 0x80000000, 0x0, 0x6, 0x9, 0x8, 0x5, 0x9, 0x9, 0x10000, 0xfffffffc, 0x5, 0x7, 0x2, 0x9, 0xe81b, 0x4, 0xffff, 0xfeff, 0x7, 0xff, 0x2, 0x1, 0x7, 0x5, 0xeb, 0xa8000000, 0x466, 0x3ff, 0x2, 0x401, 0x6, 0x2, 0x6, 0x9, 0xffffffc0, 0x2, 0x1, 0x1, 0xffffffff, 0x8, 0x80]}]]}, {0x1e, 0x6, "63cf48ead98846bd214a39356481ce401e989c3785549a750fe5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_mpls={0x124, 0xc, 0x0, 0x0, {{0x9}, {0x4c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x5, 0x1ff, 0x8, 0xa34, 0x1}, 0x4}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4a4a3}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x800, 0xfffffe00, 0x10000001, 0x2, 0x1}, 0x2}}]}, {0xae, 0x6, "83df40a410c95c92e7829f002ffa5cdd41d2089ac7e3aa2ab9e7e71691636e31f07ece3a608f837bc59335f5c0f94fb9da0be8c804f4372b5a18a8bb904d92e252f264563808bbb79192a9ebd806654995fe6c88aafa46ea93e66744970041d99f71e6109908314aceba78f85b839a143bc1add9f1ab9a18cb295d58a9ed414be96596138e8a1404e85cbe5da9826a894cf19bf6120d74590e663ae7d2bd816d183aa424368a67926c8e"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_skbmod={0x12c, 0xc, 0x0, 0x0, {{0xb}, {0x20, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x5}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0xac80}]}, {0xe4, 0x6, "77f132e256f9fb9059c3487ff30fa64f7f4443ca1f341ad441607fb50d8ca4b99e58c68ca6479b4fd168eb0649d4a87606a5ba863618154ca151a9c73be3d26fba4da996f0604fb06cf4f3323d6610d12041985859d6ac4ea431354e4f2c3e21b3f9e0bb76ab092dfc389b4d41edcb8d8f907db0c31cd2cfe08f41e36ceec6f46baafb7c43e71975eb9156f4ad66089e7326ed8f72416b255527cc86715d8ac79802f9c68affe41f068b83f2ec998ead9856be8806d2516bf4d4947580369ae570dfe8c0b48ef8c5fd6bffefe8630cf8542922e6672d18ee83a545e36929c803"}, {0xc}, {0xc, 0x8, {0x2}}}}]}, @TCA_MATCHALL_ACT={0x68c, 0x2, [@m_ctinfo={0xc0, 0x16, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x9, 0x6, 0x7, 0x7ff, 0x7}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x101}]}, {0x71, 0x6, "5a1cf5588ed931c2d474f51fe50751e7e9ef12c45161b5ecbd2eeea5612faa2d6e11294dc0c465a165f11513cafebc73de495bc9f10d343fe26505d54f3a3325c8d1dd34afefb36f42311ea721a3878fb8fb03ca5ff64b2ad3fdce4000d2ecbaf2883420adf40d7493ca864a22"}, {0xc, 0x7, {0xec377200306db93d}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_bpf={0x40, 0xd, 0x0, 0x0, {{0x8}, {0x10, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0xa, 0x6, "98e13bf4dff3"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_bpf={0xd0, 0x10, 0x0, 0x0, {{0x8}, {0x80, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x3ff, 0x1, 0x6, 0x5}, {0x9, 0xc, 0x5, 0x8}, {0x3, 0x3, 0x3, 0x4}, {0x4, 0x4, 0x4, 0xce8}, {0xffff, 0x4, 0x6, 0xd}, {0x2, 0xf, 0x8, 0x1}, {0x2, 0x0, 0x80, 0xfff}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7d, 0x5, 0x994a270fb91efd82, 0x1, 0x5}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x200, 0x400, 0x0, 0x8, 0x3ff}}]}, {0x29, 0x6, "1fc62d81852e21e6309836de4a6bb94c64ebcc8b1314a9758f9363947d0db5e1fec550c92a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_nat={0xe4, 0x20, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x4, 0x5, 0x9e, 0x3}, @rand_addr=0x64010100, @private=0xa010102, 0xff, 0x1}}]}, {0x91, 0x6, "f3c6f22656ea5f05c2cfa76612b67e7a84bea660edd51cd1500c35d58af8724354c26460ab9e4b547b1760ee2f6a8c0b47289a6f7c6812c92beb5500b8fcfe4c55bf5805840b4567519dd56c70e6390126831d8f4f678bfc0c6dc8766cd9cff94f9b28a241a8bed42d80efc3560fc36d4e59dcf2d3114fa409e270c66ee81886cab6af0d70cf587371c3ea9ee4"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_gact={0x180, 0x19, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0xb09, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x3, 0x0, 0x7, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xb39, 0x3000000d}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0xac, 0x3, 0xffffff77, 0xd6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1e14, 0x6}}]}, {0xff, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_nat={0x124, 0x1e, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xaa, 0x10000, 0x10000000, 0x0, 0x6110}, @multicast2, @multicast2, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xf936ec32, 0xfffffff8, 0x7, 0x6, 0x5}, @broadcast, @dev={0xac, 0x14, 0x14, 0x30}, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7c30, 0x8, 0x8, 0x28a8, 0x6}, @broadcast, @rand_addr=0x64010100, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8001, 0xd1, 0x2, 0x109, 0x1}, @multicast1, @multicast2, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xcb, 0x5, 0x8, 0x7, 0x84}, @multicast2, @private=0xa010102, 0xffffff00, 0x1}}]}, {0x33, 0x6, "6ae9492e25e1e93c7ddb4cd42bcfde24650ca5e225bc57a7ec53b17d3bb9f0dacaa51580133a76391c5818fa229f36"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x130, 0x9, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7fff}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x1}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}]}, {0xdd, 0x6, "447239f72290eb31d49ef9b1c75bb797682b81df877d42f3c72ba804e26dee5c7c92ea284406bc1015851f9b91b30bee9592512be23b898646d6655a264212360a4435bd8aff161886d26ee6782ee938a542355932cead4b12167990d718671375f71787f573a9a89d72a3a78ece6494c20096a69b1f7c43a13c22df1bc2c7705666c55151df92eb646f4259157c3f60c06a3a996a16b717f946aab597e2ec85fdec0d51e49fbb5ccd89f258cffea581aae951f92a322d4163a71d1d195dfc86fac00b667d0510e2fbdb6624dae24fd22381f185a606706dcb"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x6}]}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @TCA_CHAIN={0x8, 0xb, 0xd477003}, @TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x43dc}, 0x1, 0x0, 0x0, 0x8840}, 0x40) 3m10.384451445s ago: executing program 8 (id=997): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000340)={[{@nojournal_checksum}, {}]}, 0x0, 0x4ee, &(0x7f0000000c40)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000", @ANYRES32, @ANYBLOB="00000000000000000000dc84b1c2c6a6d6dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) add_key(&(0x7f0000001280)='.dead\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000000580)={0x0, 0x1, 0x8, 0x74ff9241, @vifc_lcl_ifindex, @loopback}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kfree\x00', r2}, 0x18) fsetxattr$security_selinux(r0, &(0x7f0000000200), &(0x7f0000000280)='system_u:object_r:su_exec_t:s0\x00', 0x1f, 0x1) r3 = syz_io_uring_setup(0x10d, &(0x7f0000000140), &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x29c780}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syslog(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f00000008c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}, {@mblk_io_submit}]}, 0x3, 0x44a, &(0x7f0000000400)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000880)=ANY=[], 0xff34, 0x0) chown(&(0x7f0000000340)='./file0\x00', 0xee01, 0x0) r7 = syz_io_uring_setup(0x62b4, &(0x7f0000000940)={0x0, 0x80000004, 0x0, 0x2, 0x4}, &(0x7f00000003c0), &(0x7f0000000640)) io_uring_register$IORING_REGISTER_BUFFERS2(r7, 0xf, &(0x7f0000001c80)={0x1, 0x0, 0x1000000, &(0x7f0000001140)=[{0x0}], 0x0}, 0x20) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0xfffffdcf) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000640)={'syztnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x1, 0x5, 0x69, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7, 0x10, 0x10001, 0x8cd6}}) mknod$loop(&(0x7f00000009c0)='./file0/../file0\x00', 0x841a, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000001140)=@deltfilter={0x43dc, 0x2d, 0x532, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0x3}, {0x4, 0xd}, {0xfff2}}, [@TCA_RATE={0x6, 0x5, {0xff}}, @filter_kind_options=@f_bpf={{0x8}, {0x24, 0x2, [@TCA_BPF_CLASSID={0x8, 0x3, {0xfff3, 0x8}}, @TCA_BPF_CLASSID={0x8, 0x3, {0x0, 0xdb912443785a19c0}}, @TCA_BPF_FD={0x8}, @TCA_BPF_CLASSID={0x8, 0x3, {0x5d8930fca15c05f4, 0xfff2}}]}}, @filter_kind_options=@f_u32={{0x8}, {0x7e0, 0x2, [@TCA_U32_ACT={0x594, 0x7, [@m_ctinfo={0x14c, 0x6, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0xc, 0x7, 0xffffffffffffffff, 0x6, 0x2}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x341}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x6}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x10001}]}, {0xe8, 0x6, "c0757fa478fede1dbe2a307850416c5b008332e36f48cabeef841a0f47234d89f010cc1a572daeae116f07f38be0db67d0f029ef176ee8315b19d2c537d8115a09bbc324294ab9be433d6a21c976285e64be25546deea2ad06928dc99d0597c55c9083fbb774377516382e6e91dcfe0db6429770664e43975e20a87c006a5aaf7c6f9988f5f145e3428998db4dc95e102f941783e51d5647893764a8051e08269352fbff25e3905def08be37b0ac5c8980bd12481f82d05fed0b56cd5f873c19f8b30f123924317158e18d8731fc7d5fb8e028152c656cfad9263a4addc6a3ccaee125a9"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mpls={0xa0, 0x18, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x3d44400, 0x3, 0x5, 0x6, 0x2}, 0x2}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x448d7}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x45, 0x6, "10cd9fb36dc4efb69e253d05cd5d0b823131ccc01ed1dc5e1223dc2f46c3928cf3af557d58c0bbfe80bf9480fc5577ffbe4c96b40fe80bdab505775981282511e5"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_vlan={0x14c, 0x11, 0x0, 0x0, {{0x9}, {0x48, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xfffffff1, 0x1, 0x20000000, 0xfffff800}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x81e}]}, {0xd9, 0x6, "a7fd5621099ed59ef1d226f59006cc63be972655dce1752d9184ca3910855f3e3802887dfc67cc8d610e9103a040e13523ddca01dd6bcec4f19d64b09545f9593de7e90222f6b0353fc58f6d3caef57d9ca3e6fc6b19a1820a75bcc4fcffa1c5cc9f5e220bbc097cd6ae88bb9704231e2ebcd6425e8e041a5ca2a0fb8cdb17a968dc193d8a9fe09ad8b1e1c1b8eaa9e8b64ce63b3653d7e6c10216e811ae927e8ef8933d4299542522ae563e3eed25771c983640dbdbd3a213295e77718ab7eeebaad02269d1f54a124979a5ee68356e090efccdd1"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_nat={0x180, 0x1f, 0x0, 0x0, {{0x8}, {0xa4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x3, 0x2, 0xde4b, 0xd79}, @multicast2, @multicast2, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x9436, 0x20000000, 0x4, 0x8}, @broadcast, @remote}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xb, 0x1, 0x5, 0x401, 0x3}, @private=0xa010100, @remote, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x46df, 0x10000000, 0x4, 0x7ff}, @dev={0xac, 0x14, 0x14, 0x3e}, @empty, 0xffffff00}}]}, {0xb8, 0x6, "ce97c0164a88016641483dc33ecdf87d0c20891694fa72f3d7919d5b639475e0bbd1d6b327a5c7d6b71cc321de471c1923c60bb2257d205ad0eb0ff12e1d91fb21e486ee0e0c35d1a0b86e76a0b6fe69fa0fc99e40b37a801c0887516b46ce114aa1c1d077260b88bf2265b90a1bcc061c53ddd9b9babbd797ad3643bb7e037d281b447180d29f48ea85de6231c525b6410f1c7a37eafb689090d4d5cb2317c4b8fa4d68471d217db9e0007af75dda720cf565f7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_gact={0xd8, 0x7, 0x0, 0x0, {{0x9}, {0x7c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x81, 0x8, 0x20000000, 0x2b4, 0xf33a5e6c}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x2353, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x5, 0xf, 0xffffffffffffffff, 0xfffffff0, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x1, 0x4, 0xdd3, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x18a, 0xffffffffffffffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1e87, 0xffffffffffffffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x80f, 0x4}}]}, {0x34, 0x6, "8c93d933f5b541a00289530c4856c5518200ebfa5c5277079f909fb19b3609208b7f90051a2a87cf7f304f4171d3d9b2"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_U32_HASH={0x8, 0x2, 0x7c}, @TCA_U32_SEL={0x124, 0x5, {0xc, 0x1a, 0x40, 0x0, 0x49, 0x1, 0x4, 0x0, [{0x593e, 0x0, 0x0, 0x5}, {0x8, 0x5, 0x8, 0x7}, {0x3, 0x11d, 0x80, 0x2}, {0x80, 0x10, 0x100, 0x6}, {0x1ff, 0x101, 0x1, 0x7}, {0x3, 0x2, 0x8001, 0x1}, {0xe, 0xffffffff, 0x1}, {0x1, 0x9, 0x6, 0x2}, {0x4, 0x6, 0x80, 0x8}, {0x40, 0x8, 0x10000, 0x80000000}, {0x80000001, 0x9, 0x8, 0x5}, {0x38d, 0x1, 0x5, 0x9}, {0x5, 0xd, 0x0, 0x5}, {0x469, 0x4, 0x6d9, 0xf}, {0xffffffff, 0x2, 0x3, 0xfffe0000}, {0x6f, 0x0, 0x6, 0x2}, {0x1000, 0x6, 0x6, 0x8001}]}}, @TCA_U32_ACT={0x10c, 0x7, [@m_ct={0x108, 0x5, 0x0, 0x0, {{0x7}, {0x58, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @multicast2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @loopback}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @TCA_CT_LABELS={0x14, 0x7, "68b09bda84936c9ce80932c338ed3f5c"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}]}, {0x8b, 0x6, "bc4eb6e91fb43faa760b989ba39ab52452f03e25da0f9981d7f997a3740761f8bcd2d65994c34818dfb29727daeb89eda2fdf8da802edb980ba81b47e7bda5623583e6af437ca6ea9968863e98324e7af9f76687bac7784ed185cc4af53608956b1fcb7dbcb79496c6ae3069a4a6fb521a7c362f5d1eb8efe0f0e6df0753bed3c2cd547b28e095"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_U32_FLAGS={0x8, 0xb, 0x3}, @TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x3b74, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x1f, 0x3}}, @TCA_MATCHALL_ACT={0x34cc, 0x2, [@m_xt={0xfc, 0x1b, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0xcc, 0x6, "73f382f5843fb6b65882f492c6e1898213fb5ca6e2ddf2f3df559e727dfde13be3a08bdc4b1e18a3f62e2ec86e59e375ebe8158b842573f8bc0579ea76467d60560d187074b06094e4710e5b14c0bdcdf36a1f6a6977f7625a80f42050a31593fef3351b4f414035bc93034644912b0465ba9cc1420787771a4b07e8325d242a43bc319cd7223c16a4a3bed155d53ddab5c817313ef08f82b0e6718983e31dc940570d59ccc48f6ae8fa94b286537fa8115eae48dc170b5b9fb84978b341fd896903d83c259c6964"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_police={0x317c, 0x1f, 0x0, 0x0, {{0xb}, {0x3134, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xffffffff, 0x4, 0xadaa, 0x9, 0x9, 0x5, 0x7, 0x1, 0x2a, 0x4, 0x8, 0x8, 0x7, 0x7, 0x4, 0x81, 0xc0000000, 0x0, 0x1, 0x101, 0x9, 0x7f, 0x401, 0x1621695a, 0x80, 0x5, 0x86cf, 0x9, 0xffffff5f, 0x5, 0x1ff, 0x6, 0x2, 0x3, 0x4, 0x7, 0x10000, 0x0, 0xbb01, 0xe, 0x3, 0x7fff, 0xf0000000, 0x7fffffff, 0xfffffbff, 0x9, 0x80000001, 0x829, 0x6, 0xa, 0xc268, 0x100, 0x7, 0x81, 0x1, 0xb414, 0x2, 0x5, 0xe6, 0x4, 0x80, 0xfffffffb, 0x8, 0x81, 0x8691, 0x80000001, 0x0, 0x7ce4, 0xfffffffd, 0x70, 0xc, 0x8, 0xffffff00, 0x4, 0x2, 0xe0000, 0x62, 0xfffffff7, 0x4, 0x4, 0x9, 0xcec0, 0xc4ad, 0x624800, 0xfff, 0x49c4, 0x9, 0x60c2, 0x204, 0x9, 0x5, 0x101, 0x180, 0xa, 0x18000000, 0xfffffffb, 0x5, 0x201, 0x0, 0x6, 0x401, 0x0, 0x1ff, 0x0, 0x10, 0x8, 0xfffffffb, 0x2, 0xffff6953, 0x7d, 0x9, 0xfffffff7, 0x1, 0x4, 0x80000001, 0x7, 0x3ae, 0x3, 0x6, 0x5, 0x0, 0x7fffffff, 0xd0c, 0x6, 0x6832, 0x9, 0x5, 0x1, 0x0, 0x7, 0x98, 0x4, 0x5dac, 0xfff, 0x80b, 0x3, 0x6, 0x5, 0x80000001, 0x7, 0x7fffffff, 0x800, 0xff, 0x0, 0x9, 0x9, 0x1, 0x7, 0x3, 0xfcfa, 0x1ff, 0x5, 0x1, 0x0, 0x4, 0x7, 0x7fffffff, 0x1, 0x400, 0x0, 0x2, 0x7ff, 0x4, 0x2, 0x58a, 0x4, 0x6, 0xea, 0xeda6, 0x46625de2, 0x6fe2, 0x5, 0x7, 0x9, 0x1000, 0x9, 0x7, 0x9, 0x1, 0x8, 0x4a5, 0x1, 0x7, 0x39, 0x8, 0x8, 0x401, 0x5, 0x10000, 0x2, 0x7ff, 0xf, 0xffffffff, 0x80000000, 0x6, 0x6, 0x6, 0x9, 0x6, 0xfffffff8, 0xa000000, 0x6, 0x0, 0x401, 0x27, 0xb800, 0x4, 0x8001, 0x1ff, 0xf, 0x40e, 0x47, 0x67, 0x8000, 0x7ff, 0xc0, 0xfff, 0x2, 0x5, 0xfffffffe, 0xc35b, 0x9, 0xffffffff, 0x34, 0x8, 0x2, 0x7, 0x7ff, 0xfffffffb, 0xd35, 0x1000, 0x3c3, 0x10000, 0x5, 0x4, 0x6, 0x7, 0x3, 0x4, 0x200, 0xc2c, 0x8, 0xfff, 0xfffffffe, 0x7, 0x7, 0x2, 0xf0c, 0x239, 0x4, 0x7fffffff, 0x3, 0xd, 0xc95, 0x70c1, 0xa06]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x80, 0x3, 0x80000000, 0x6ba, 0xfffffff7, 0xffffffff, 0x0, 0x2, 0xfffffffe, 0xfffffff7, 0x7f, 0x9, 0xefb0, 0x4, 0x1, 0xfffffffc, 0x1000, 0x0, 0x5, 0xffff, 0x7ff, 0x8000, 0x101, 0xb, 0x1d8a, 0x7fff, 0x2, 0x4, 0x0, 0x47, 0x8000, 0x4, 0x4, 0x81, 0x6, 0x8, 0xa, 0xa, 0x6, 0x712, 0x58bb, 0x2, 0x7ff, 0x0, 0x6, 0x3, 0xf0e, 0x7e, 0x24d8, 0xe, 0x47, 0x100, 0x2a87, 0x5, 0x6, 0x0, 0xe1, 0x5, 0x7, 0x4, 0x10, 0x6, 0x6, 0x4, 0x7, 0xffff3410, 0x81, 0x1, 0x3, 0xb920, 0x1000, 0x6f, 0x9, 0xfff, 0x7, 0x2, 0x6, 0xa06b, 0x2f0b49f0, 0x101, 0x1, 0x100, 0x2, 0xd, 0x0, 0xfffffff8, 0x3, 0x4, 0x8, 0x9, 0x3, 0x7, 0x5, 0x3, 0x0, 0x1, 0x1cb5, 0xffffffff, 0x7f, 0x1, 0x80000001, 0x2, 0xf, 0x3, 0xfd9d, 0x3, 0x6, 0x7, 0xcf59, 0x9, 0x0, 0x7643, 0x6, 0x8, 0x0, 0x9, 0x100, 0x0, 0x8000, 0x40, 0x322a, 0x4bb0, 0x8, 0x10000, 0x800, 0x2, 0x79, 0x5, 0x0, 0x2, 0xd0, 0x8, 0x9, 0xa309, 0xfffffff7, 0x4, 0x195, 0x1, 0x0, 0x2, 0x401, 0xffffff58, 0x7, 0xfffffff8, 0x3ffed258, 0x2f4a, 0x8, 0x6, 0x1, 0x0, 0x40, 0xc, 0x6, 0x9, 0x5, 0x8, 0x7ff, 0x332f0c85, 0x8, 0x1, 0x8, 0x7400000, 0x7, 0x80a1, 0x911a, 0xcc, 0x5, 0xf3, 0xfffffff9, 0x9, 0x7ac5, 0x8, 0x9, 0xf, 0x6, 0x2, 0x480, 0xfffffeff, 0x2, 0x3, 0x5, 0x7, 0xfffffff7, 0x3ff, 0x2e, 0x4, 0x4, 0x2, 0x8, 0x3, 0x4, 0x7, 0x2060, 0x6, 0x8, 0x8cc2, 0x0, 0xbbeb, 0x0, 0x10001, 0xf7, 0x3, 0x6a68, 0x9, 0x5, 0x6, 0x3, 0x6, 0xfffffffd, 0x1, 0xc00, 0x8000, 0xfa92, 0x7, 0x4, 0x0, 0xd0, 0x8, 0x4, 0x7, 0x0, 0x5c, 0x2, 0x8f88, 0xa8c, 0x297d3356, 0x8, 0x7, 0x4, 0x3, 0x80000000, 0x1, 0xffff46c8, 0xd, 0x401, 0x0, 0x823, 0x8001, 0x2, 0x3, 0x80, 0x1, 0x3, 0x5, 0x5, 0x101, 0x400, 0xe, 0x5, 0xffff, 0x7, 0x6079f1aa, 0x21f, 0x2, 0xfff]}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xffffffffffff597a}, @TCA_POLICE_RATE={0x404, 0x2, [0xfffffffe, 0x10, 0x4, 0xac, 0x80000001, 0x5, 0x3ff, 0x59c, 0x9, 0x40df, 0x8, 0x4, 0xe, 0x379, 0x7, 0x2, 0xfffffffa, 0x0, 0x7c, 0x5, 0xf6d, 0x7, 0x0, 0x6, 0x9, 0x0, 0xf7, 0xfffffffe, 0x401, 0x9, 0x6, 0x4, 0xf, 0x10001, 0x6, 0x9, 0x7, 0x5, 0x2, 0xc, 0xf, 0x6, 0x6, 0x6, 0x6, 0x9, 0x9, 0xffff8e02, 0x7, 0xe, 0xffff8001, 0x9, 0xb0, 0x8, 0x74, 0x10000, 0x8, 0x5, 0x3ff, 0x9, 0x4, 0x4, 0x1, 0xefb, 0x33f, 0xe5e2, 0x0, 0x2a7e, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x2, 0x6, 0x7fffffff, 0x104, 0x10001, 0x6, 0x0, 0x0, 0xf5d, 0x4, 0x704bdcec, 0xf, 0x1, 0x1, 0x2, 0x5, 0x3, 0x80, 0xd7, 0x81, 0x81, 0x6, 0x2, 0x5d, 0x1, 0x9, 0xb0d3, 0x2, 0x2, 0x1, 0x8, 0x759c, 0x8, 0x7, 0x1ef, 0x7fff, 0x949, 0xf, 0x1000, 0xffff6def, 0x0, 0x7, 0x1, 0x9, 0x8, 0x3, 0x6, 0x2, 0x1, 0x10001, 0x1, 0x4, 0xf6, 0xffffffff, 0x4, 0x5, 0x200, 0x1, 0x2, 0x3, 0x6, 0x9, 0x0, 0x8, 0x100, 0x6, 0x400, 0x6d20, 0xab2a, 0x6, 0xebc, 0x9, 0xfff, 0xb, 0x3, 0x1, 0x8001, 0xfffff6c0, 0x5, 0x593a, 0x2, 0xe, 0x2, 0x200, 0x6, 0x4, 0x8000, 0x6, 0x2, 0x4, 0x9e, 0x8d, 0x70, 0x0, 0x9, 0x1, 0x7, 0x5, 0x9, 0x8001, 0x8000, 0x8, 0x3, 0x6ff0, 0x0, 0x2, 0xa, 0x5, 0x5, 0x0, 0x23, 0x1, 0x5, 0xd, 0x0, 0x3ff, 0x7db, 0x9, 0x9f, 0x7a5, 0x1, 0x4, 0x1, 0x8, 0x200, 0x20000, 0x7, 0x5, 0x6, 0x7fff, 0x0, 0x2, 0x3, 0x9, 0x9, 0x0, 0x1, 0xfffffffe, 0xffff0000, 0xfffff975, 0x8, 0x50, 0xffffffff, 0x0, 0x5, 0x4, 0x8, 0x8000, 0x9, 0x10, 0xfffffffd, 0xaca2, 0x1, 0xffff, 0x10000, 0x0, 0x35d0, 0x4, 0x55, 0x2, 0x4, 0x4, 0xd, 0x401, 0x6, 0x1, 0x6, 0x40000000, 0x4, 0xde3, 0x8, 0x7f, 0x6, 0x2, 0x40, 0x8, 0xac, 0x9, 0x2, 0x3, 0x3, 0x5, 0x2]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x321b}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x5, 0x3, 0x1, 0x2, 0xb, 0x3, 0x80000001, 0x1, 0x9, 0x0, 0xb, 0x8, 0x4, 0x1, 0x328, 0x1, 0x7, 0x9, 0x0, 0xc15, 0x10000, 0x1, 0x865a, 0x6, 0x3c5, 0x8000, 0x8, 0x8001, 0x6e08, 0x1, 0x100, 0x5, 0xffffffff, 0x8, 0xc7, 0x2, 0x1, 0x200, 0x1, 0x1, 0x1, 0x1, 0x0, 0x800, 0x401, 0x7f, 0x1, 0x1, 0x9, 0x5, 0x70, 0x2, 0x13a6, 0x6, 0xcb, 0x7, 0x4, 0x101, 0x4, 0x1, 0x30d, 0x7, 0xd5, 0x1, 0x7, 0xc, 0x7fff, 0x0, 0x1, 0xc0000000, 0x7, 0x9, 0x3, 0x1, 0x4, 0x10001, 0x6, 0x3, 0x1000, 0x2, 0x7, 0x6, 0x8001, 0x1, 0xfffffff9, 0x9, 0x8, 0x4, 0xffffffff, 0x0, 0xd83, 0x8001, 0x3ff, 0xfe70, 0xd, 0x9, 0x10f, 0x40, 0x3, 0x2, 0x76, 0x5, 0x7, 0x6, 0x40, 0xff, 0x2, 0x6, 0x80, 0x5b, 0x0, 0x82d, 0x7f, 0xffffffc0, 0x4, 0x3ff, 0x4, 0x73, 0x7, 0x4, 0x101, 0x8, 0x8, 0x84, 0x1, 0x74a, 0x5678, 0x8, 0x0, 0x8, 0x3, 0x1, 0x3ff, 0x200, 0x7, 0x18e, 0x0, 0x4, 0x8, 0x0, 0x6, 0x8, 0xc, 0x81, 0x4, 0x4, 0x1ff, 0x3, 0x4, 0x3, 0x1, 0x1000, 0x0, 0x0, 0xff, 0xa, 0x6, 0x2, 0x7ff, 0xdedf, 0x1, 0xcef, 0x2, 0x1, 0x5, 0x4, 0x1000, 0x2, 0x3, 0x1, 0x9, 0x1, 0xf, 0x4, 0x9, 0x6, 0x1000, 0x47, 0x6, 0x8285, 0x5, 0x35, 0x2, 0x20a, 0x8001, 0x346b, 0x4, 0x5, 0x9, 0x6a37, 0x7, 0x4, 0x10000, 0xc4d1, 0xffff, 0x7fffffff, 0x4, 0x7ff, 0x7, 0x400, 0x7, 0x4, 0xfffffff7, 0xec72, 0xff, 0x1ff, 0xa, 0x9, 0x7ff, 0x80000000, 0x7, 0x2, 0x3, 0xfffffffc, 0x9, 0x100, 0x80, 0x6d1, 0xfffff802, 0xff, 0x40, 0xfffffffa, 0x9, 0x2, 0x1, 0xff, 0x7, 0xc44, 0x0, 0x2, 0x8001, 0x2, 0x1, 0x2, 0x80000000, 0x2, 0x6, 0x5, 0xf2, 0x401, 0xb9b7, 0x4, 0x5, 0x9, 0x1, 0x84, 0x0, 0x8, 0x1ff, 0xe, 0x2, 0xb, 0x8, 0xffff, 0xffff11e7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x7, 0xc, 0xa, 0x800, {0x2, 0x1, 0x1, 0x3, 0xfff2, 0x7}, {0x1, 0x1, 0x6, 0x9f, 0x5, 0x39452c95}, 0x101, 0x0, 0xd}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x2, 0x8, 0x0, 0x5, 0xa92, 0x7, 0xffff, 0x2, 0x10000, 0x0, 0x7, 0x0, 0x7, 0x7, 0xffffffff, 0x1, 0x6, 0xb, 0x5, 0x0, 0x7f, 0x0, 0x6, 0x80000001, 0x401, 0x2, 0x5, 0x800, 0xf, 0x7fffffff, 0x9, 0xf8b, 0xd5, 0xfffffff7, 0x81, 0xffff3a6f, 0x7, 0x4ff8, 0xfffffff8, 0x8, 0x3ff, 0x7, 0x7, 0x0, 0x8, 0x101, 0x2, 0xfffffff7, 0x50, 0x1, 0x1443, 0x5, 0x0, 0x1, 0x7c9, 0x5, 0x2, 0x7fff, 0x8, 0x0, 0x1, 0x7, 0x7, 0x8000, 0x8000, 0x0, 0x4, 0x1, 0xfffffffa, 0x8, 0xf70, 0x0, 0x2, 0xc, 0x7, 0x2, 0x5, 0x9, 0x83d, 0x5, 0x7, 0x70000000, 0x6, 0x6, 0xa939, 0x200, 0x4, 0x1, 0x0, 0x3ff, 0x170, 0xbdf, 0x6, 0x3, 0x5, 0x1, 0x9, 0x479, 0x30, 0x6, 0x7, 0x9, 0x8, 0x5, 0x4, 0x80, 0x5, 0x2398, 0x8001, 0x4, 0x40, 0x4, 0x2, 0x0, 0x6, 0x9, 0x9, 0x4, 0x2, 0x7fffffff, 0x0, 0x1, 0x0, 0x1ab053fb, 0x1000, 0x2, 0x45d, 0x6, 0x6, 0x3, 0xfff, 0xf4d, 0x82, 0xffffb542, 0x5, 0x2, 0xd09, 0x80000001, 0x7fff, 0x0, 0x9, 0xc, 0x8, 0xe, 0x5, 0x1e94, 0x9, 0x7f, 0x8, 0xe75e, 0x8001, 0x101, 0x4, 0x1000, 0x0, 0xf, 0x3, 0x0, 0xf7b, 0x6, 0xfffffff9, 0x0, 0x7, 0x2, 0x2, 0x9, 0x5, 0x2, 0x1, 0x5, 0x80000, 0x10000, 0xe, 0xe3, 0x7, 0x9, 0x0, 0x401, 0x81, 0xc7, 0x0, 0x3, 0x10001, 0x4, 0x8001, 0x78, 0xfffffffe, 0xfffffff7, 0x10001, 0x631d2ee8, 0xb, 0x0, 0x5, 0x3940f836, 0x3, 0x8, 0xffffffff, 0x7, 0x52b6, 0x9, 0x6, 0xe70a, 0x4, 0xe17, 0x0, 0x0, 0xfffffe00, 0x6b0, 0x6, 0x8001, 0x7, 0x3, 0x430, 0x0, 0x0, 0x6, 0xffffffff, 0x5, 0x9, 0x0, 0x6, 0x0, 0x0, 0x7, 0x4c1, 0x1, 0x6, 0xe0de, 0x8, 0x8, 0xc, 0x1, 0x9, 0xec, 0x0, 0x7fff, 0xffff, 0x5, 0x42f, 0x5, 0x0, 0x5, 0x1, 0xda81, 0x81, 0x92, 0xc1, 0x6, 0x8, 0x9, 0xdf11, 0x9, 0x80000000, 0x101, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x5, 0x5, 0xcf, 0x35c9, {0x7, 0x2, 0x1000, 0xf2, 0x6, 0x33c}, {0x5, 0x2, 0x9, 0x941, 0x8, 0x85df}, 0x3b6b28d2, 0x5, 0x7f}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x3, 0x8, 0x1, 0x7, 0x0, 0x6, 0x0, 0x7, 0x4edb, 0x7, 0x5, 0xfffffffd, 0x8, 0x3ff, 0x3, 0x5, 0x2, 0xfffffff7, 0xa, 0x9, 0x3, 0x91a4, 0x200, 0x6, 0x8, 0x9, 0x0, 0x3, 0x6, 0xfff, 0x80000000, 0x2, 0x7, 0x0, 0xe804, 0x59c, 0x10001, 0x5, 0xffffffff, 0xfffffff0, 0x2, 0x80000001, 0x40, 0x3, 0xb, 0x8, 0x6, 0x2, 0x0, 0x7, 0x30, 0x0, 0xfffffc00, 0xfffffffa, 0x7, 0x1, 0x0, 0x6, 0x200, 0x3, 0xe, 0x3, 0x1, 0x7, 0x9, 0x9, 0x9, 0x6, 0x4726, 0x3, 0x8, 0x2, 0x80, 0x2, 0x5f5eb9ee, 0x9, 0x6, 0x6, 0x19, 0x2, 0xffffffff, 0x9, 0x1, 0x0, 0xb, 0x4, 0x5, 0xfffff800, 0xfffffff8, 0x10, 0x9, 0xfffffffa, 0x5, 0x401, 0x80000000, 0x200, 0xb0, 0x7, 0x7, 0x904802e, 0x80, 0x2, 0x4, 0x0, 0x5, 0x80000000, 0x800000e, 0xfffffe00, 0x3, 0x100, 0x2, 0x7f, 0x40, 0x3, 0x4, 0x1df4, 0x0, 0x100, 0xf, 0x3c19, 0x1, 0xfffffffc, 0x9, 0x8001, 0x4334, 0xd, 0xd, 0x8, 0x7ff, 0x1, 0x1000, 0x8, 0x4, 0x400, 0x1, 0xff, 0x9, 0x3, 0x8, 0xf, 0x8, 0xfff, 0x8, 0x80, 0x0, 0x8, 0x8, 0x5, 0xfffffffa, 0xc769, 0x3, 0x0, 0x3, 0x4, 0x9, 0x4, 0x8, 0x620b, 0x0, 0x2, 0x6f316a1, 0x1000, 0x3, 0x5, 0x5, 0x1ff, 0x5, 0xfffeffff, 0x4, 0x7, 0x1, 0x0, 0x9, 0x80000001, 0x6, 0xfff, 0x0, 0x7, 0x5, 0x8, 0x7, 0x9, 0x0, 0x40, 0x800, 0x0, 0x15f, 0x10001, 0x4, 0x2, 0x0, 0x7f, 0x7fffffff, 0x7, 0x9, 0x1, 0x6, 0x0, 0x4, 0x1000, 0x400, 0x2, 0x5, 0x7, 0x5cad4123, 0x2, 0xff, 0x47, 0x200, 0x8, 0xec84, 0x3, 0x0, 0x5941, 0x9, 0xda, 0xd8, 0x1, 0x3ff, 0xfff, 0x3, 0x7, 0x9, 0xfffffc01, 0x9, 0xb, 0x9, 0xb, 0x9, 0x7, 0x0, 0xe, 0x401, 0x1c00000, 0xe0000000, 0x1, 0xe, 0x7, 0xa6, 0x6, 0x3, 0x4, 0x1, 0xfff, 0x4, 0x200, 0x8469, 0x22, 0xc9, 0x8, 0x10, 0x0, 0x7, 0xa449, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x27a5, 0x6, 0x6, 0x7fffffff, 0x80000001, 0x6, 0x3, 0x0, 0xe5a9, 0x0, 0xffff, 0xa3e13ef, 0x10, 0x4, 0xfffffffb, 0x5, 0x0, 0x6, 0xaaf, 0x62, 0x4, 0xc67d, 0x81, 0x1ff, 0x9, 0x81, 0xfffffffe, 0x0, 0x7fffffff, 0x1ff, 0x2, 0x2, 0x1e4, 0x10001, 0x8, 0x3, 0xf20, 0x7, 0x3, 0xb5f, 0x9e3, 0x3, 0xb7, 0x460e, 0xe4, 0xfffffff9, 0x1, 0x1, 0x10001, 0x7, 0x5, 0xe, 0x6, 0x6, 0x3, 0x10000, 0x6, 0x7, 0xc, 0x81, 0x9, 0x1, 0xc, 0x5, 0x6, 0x3d, 0x4, 0x3, 0x2, 0xf1, 0x7ff, 0x5, 0x9, 0x7fff, 0x3, 0xfffffffc, 0x5, 0x6, 0x9, 0x0, 0x6, 0x5, 0xb, 0x5, 0x9, 0xf, 0x5, 0x6, 0x4, 0x4, 0x4, 0x6, 0x6, 0x60d, 0x951, 0x0, 0x6, 0x5, 0xff, 0x7713, 0x5, 0x28, 0xff, 0x9, 0x6, 0x2, 0xfffffffb, 0x66, 0x9, 0x7fff, 0x0, 0x4, 0x9, 0x6de171cc, 0x906d, 0x7f, 0x40, 0x5, 0x0, 0x6, 0x3, 0xfffffffe, 0x2, 0x5, 0x15a, 0x4, 0x7, 0x0, 0x1, 0xac, 0x0, 0x23e, 0x7f, 0xfffffffb, 0xc, 0x9, 0x7, 0x7ff, 0x6c9a, 0x5, 0x9, 0x4, 0xe25, 0x5, 0x200, 0x0, 0x2, 0x237c, 0x2, 0xb, 0x6, 0x3, 0xfb4, 0x7, 0xd, 0xdf, 0x2, 0x4, 0x6, 0xf, 0xffff, 0x1000, 0x5, 0x3, 0x100, 0x7, 0x1, 0x6, 0x7, 0xffffcdda, 0x43c, 0x9, 0x3ff, 0x56, 0x4, 0x80000000, 0x7, 0xfffffff9, 0x7, 0xb, 0x9, 0x7, 0xffff18c5, 0x4, 0x4, 0xdad, 0x9, 0x9, 0x8, 0x9, 0x0, 0xfffffffd, 0x4, 0x5, 0x9, 0x9, 0x0, 0x8, 0x3, 0x8, 0x2, 0x80000000, 0x7, 0xd2, 0x6, 0x8, 0xf, 0x5, 0x5, 0x4, 0x7fffffff, 0x5, 0xad, 0x1, 0x0, 0x659, 0x0, 0x2, 0x9, 0x3, 0x3, 0x0, 0x1, 0x7, 0x3, 0x3, 0x5, 0x7, 0x3ff, 0x9, 0x86, 0x6, 0x10, 0xa, 0x0, 0x8, 0xba, 0x9, 0xffffdf38, 0xbce, 0x6, 0x4, 0xa4c7, 0x5, 0x0, 0x8, 0xac, 0x80000, 0xe76, 0x9, 0x4, 0x40, 0x40, 0x1, 0x2]}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x0, 0x0, 0xdd99, 0x81, 0xfffff788, 0xfc05, 0x0, 0x3, 0x140000, 0x1000, 0x1, 0x1, 0x3, 0x6, 0x8, 0xc, 0x3ff, 0x6, 0x2b6, 0x8, 0x4aff, 0x7474, 0x2, 0x4, 0x8, 0x1, 0xd, 0x4, 0x1, 0x4, 0x4, 0xd15, 0x7, 0xffffaff6, 0x8, 0x9, 0xffff4ae3, 0x400000, 0x4, 0x6, 0x5, 0x0, 0x4a1, 0x9, 0x77c6, 0xf340ee6c, 0x2, 0x1, 0x4, 0xffffffff, 0xa, 0x8001, 0x0, 0x0, 0x4d9, 0x6, 0x0, 0xffffff7b, 0x6, 0x1, 0x2, 0x9, 0xfffffff8, 0xca3, 0x3, 0x7fffffff, 0xffffffff, 0xfffffff8, 0x9, 0x5, 0x3, 0x0, 0x80, 0x5, 0x6, 0x8001, 0xffff, 0xffe3, 0x3, 0xe9a5, 0x3e4, 0x1000, 0x57, 0xb, 0x6, 0x6, 0x580000, 0x0, 0x2, 0x9, 0x8, 0xef38, 0x6, 0x7fffffff, 0x1, 0x37, 0x5, 0x60000000, 0x0, 0x3, 0x8, 0x8, 0x8000, 0x3, 0x1, 0x7e34, 0x8, 0x1ff, 0x67, 0x9, 0x6, 0xca, 0x27f, 0x7, 0x80000001, 0xc1c, 0x418b, 0x20, 0x2, 0x6, 0xa, 0x0, 0x1, 0x81, 0x7, 0x2, 0x4, 0xbe24, 0x4, 0x4f2, 0x7ff, 0xfffffffb, 0x4, 0x6, 0x4, 0x87d9, 0x81, 0x1, 0x8, 0x1c, 0x4, 0x8, 0x7fffffff, 0x938, 0x6b, 0x0, 0x7, 0x6, 0xffffff19, 0x800, 0x0, 0x7, 0x6, 0xfffffffc, 0x2, 0x3, 0x6, 0x9, 0x4, 0x4a73, 0xe1, 0xb71, 0xfffffff9, 0x4, 0xffffffff, 0x1, 0x9, 0x19a, 0x9, 0x8, 0x62, 0x7, 0xfffffe00, 0x1, 0x6, 0x6, 0x3, 0x16c, 0x5, 0x1, 0x8, 0x0, 0x4, 0x4, 0x9, 0x0, 0x6fc, 0x400, 0xfffffff9, 0xfffffffc, 0x0, 0x9, 0x80000001, 0x800, 0x5, 0x7, 0x3, 0x9, 0x81, 0x7, 0x10000, 0x2, 0x56d, 0x8, 0x4, 0x1, 0x4, 0xf92, 0x7, 0x3ba, 0x7, 0xce25, 0xfa, 0xa, 0x200, 0x8, 0x8e, 0x3, 0x1, 0x1000, 0x9, 0x8, 0x6, 0x7fffffff, 0x1, 0xfffffff7, 0x1, 0x5, 0x5, 0x33, 0x8, 0xfffffff7, 0x2, 0x3, 0xc, 0x10, 0x9, 0xd14, 0x7, 0x6, 0x5, 0x8, 0x511, 0xffff, 0x8001, 0x7ff, 0x5172b490, 0x6, 0x3, 0x4b5, 0xbf, 0x3, 0x99, 0x4, 0x5]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x20000, 0x1, 0x10, 0xffffffff, 0x0, {0x6, 0x2, 0x2, 0x8, 0x2, 0xfffffffb}, {0x6, 0x0, 0x101, 0x7, 0x3, 0x1}, 0x9, 0x1, 0x2c0}}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x9, 0x6, 0xffffffbb, 0x9, 0x0, 0x3, 0x3, 0x7ff, 0xc7, 0x7, 0x7ff, 0x3, 0x4, 0x80000000, 0x7ff, 0x80000000, 0x3, 0x6, 0x3, 0x5, 0x5, 0x5, 0x7fff, 0x3, 0x5, 0x80, 0x4, 0x5, 0x7, 0x1, 0x1, 0x3, 0x9, 0x48, 0x10, 0x16, 0x8001, 0xffffffff, 0x10, 0xff, 0x6, 0x9, 0x4, 0xe, 0x2040, 0x7, 0x9, 0x5aa1, 0x1, 0x3, 0x9af, 0x4, 0x9, 0x8, 0x7, 0xc, 0x800, 0xfffffff7, 0x8, 0xfffffeff, 0x800, 0x4, 0x1, 0xc8, 0x3, 0x4, 0x8, 0x73f1, 0x5, 0x7f, 0x11cc, 0x6, 0x9, 0x95, 0x5, 0xfd, 0x0, 0x4, 0x6, 0x6e, 0x258800, 0x6, 0x7ff, 0x48d0, 0x3, 0xd, 0x1, 0x7, 0x6, 0x5, 0x8000, 0x7ff, 0xffff, 0x8, 0x519c, 0x5, 0x0, 0x10000, 0x9d31, 0x8, 0x2, 0x6, 0x7, 0x6, 0x8, 0x0, 0xeaf4, 0x5, 0xfffffff1, 0x3a79e569, 0xffffffff, 0x400, 0x2, 0xc38a, 0x4, 0x2, 0x2, 0x5, 0x401, 0x0, 0x3, 0x4d55, 0xbe6, 0x2, 0x9, 0x800, 0x100, 0x3b, 0x7, 0x7ff, 0x7, 0x7fffffff, 0x1, 0x7, 0x6, 0x10, 0x1, 0x8, 0x4, 0x401, 0xe117, 0x7, 0xf5d, 0xfffffffb, 0x8, 0x2dd, 0x10, 0x2, 0x10000, 0x800, 0x8, 0x2, 0x8, 0x8001, 0xfffffffb, 0xc3, 0x7, 0xfaa1, 0x0, 0x80, 0x8, 0x1, 0xffffff35, 0x0, 0xfffffffc, 0x2, 0x0, 0x3ff, 0x19ee, 0x7fff, 0x9, 0x401, 0x8, 0xf111, 0x0, 0x2, 0x2, 0x1, 0x8, 0x3f34, 0x7ff, 0x4, 0x6, 0xfc25, 0x8, 0x9, 0x2, 0x5, 0x9c8b, 0xfffffff7, 0x9, 0x0, 0x7, 0x766, 0x1, 0xdbbb, 0x200, 0x9, 0x40, 0x7, 0x7, 0x5, 0x8, 0x0, 0x62710000, 0x4, 0x4, 0x404, 0x6, 0x7fffffff, 0x4, 0x2, 0x30000000, 0x7, 0x5a, 0x0, 0x10, 0x101, 0x400, 0x7fffffff, 0x0, 0x50, 0x9, 0x3a1, 0x4, 0x5, 0x4, 0x3, 0x800, 0xffffff81, 0x400, 0x425, 0x83, 0x3, 0x3, 0xdd0, 0x9, 0x4d98, 0x2, 0x0, 0x4, 0x4, 0x1ff, 0x2, 0xd, 0x3, 0x3, 0xe, 0x2, 0x5, 0x4, 0x2, 0x4, 0xbb1, 0x40000]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xd, 0x9, 0x4, 0x9, 0x4, 0x0, 0x1, 0x2, 0x7, 0x4, 0x0, 0x3ff, 0x1, 0x80, 0x1, 0x3, 0x1, 0x5, 0xc1, 0x8, 0x10000, 0x4, 0x9, 0x2, 0x8, 0xb4, 0x6, 0x6, 0xfffff801, 0x10001, 0x4, 0x6, 0x6, 0xf, 0x2, 0x1, 0xff, 0x9, 0x7fffffff, 0x7ff, 0x9, 0x8, 0x1, 0xb7, 0x80000001, 0x401, 0x80, 0x7, 0x7, 0x3, 0x9a, 0x5, 0x2, 0x7f, 0x9, 0x7fff, 0xffff6b5b, 0x5, 0x10000, 0xc, 0x8, 0x4, 0x200, 0xffff6639, 0x2, 0x9, 0x4, 0x5, 0xa2, 0x4, 0xa, 0xfffffffa, 0x800, 0xffff, 0x8000, 0x1c, 0x7, 0x5, 0x3, 0xe, 0x1ff, 0x6, 0x0, 0x67, 0x7, 0x5, 0x7, 0xc, 0x9, 0xb61, 0x101, 0x6, 0x401, 0x3da, 0x2, 0x8, 0x1000, 0x10, 0x9, 0x77a, 0x8, 0x5, 0x8, 0x7, 0x367b08ef, 0xf089, 0x1, 0x9, 0x7, 0x6, 0x80000001, 0x3, 0x1, 0xa, 0x7, 0xcaf, 0x2, 0x4e5fa8f, 0x5, 0x3, 0x8, 0x1, 0xfffffff9, 0x7, 0x2, 0x9, 0x1000, 0xfffffff7, 0xfffffffe, 0xf, 0x3b6, 0x463e8c6, 0x0, 0x9, 0x2, 0x6, 0x1, 0x7, 0x7, 0x9, 0x1ff, 0xfffffff8, 0x800, 0x6, 0x0, 0xa8b00000, 0x3, 0x8e, 0x6, 0x7, 0x56000000, 0x9, 0x0, 0xb667, 0x5, 0x81, 0x1, 0x5, 0xd, 0x7, 0x3ff, 0x0, 0x8, 0x8, 0xa4, 0x9712, 0x5, 0x0, 0xc70, 0xf, 0xf, 0x6, 0x8001, 0xcbd1, 0x5, 0x3, 0x21e5, 0x4, 0x7fff, 0x7, 0x40, 0x9, 0x10001, 0x80, 0x1, 0x6, 0xf1, 0x6, 0xfffffffd, 0x6, 0x9, 0xc07, 0x3, 0xa, 0x400, 0x9, 0xe, 0x13, 0x5, 0xb, 0x40, 0x4, 0xc405, 0x9, 0x5, 0xc, 0xfffffff7, 0x0, 0x7, 0x1ff, 0x81, 0x3, 0xf6d8, 0x400, 0x3, 0x2e, 0x9, 0xf4042cd1, 0x7, 0x0, 0x7ff, 0xf, 0xe, 0x8, 0x1, 0x4, 0x6, 0x8, 0x1000, 0x5, 0xa, 0x9, 0x5655, 0x0, 0xfffffffe, 0x3, 0xffffffff, 0x8000, 0x6, 0x5, 0x2, 0xd, 0x2, 0x1, 0x2, 0x625, 0x308, 0x7, 0x4, 0x6, 0x0, 0x9, 0x80000000, 0x0, 0x0, 0xea8b]}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x10001, 0x5, 0x0, 0xaab, 0x2, 0x2, 0xb, 0x1, 0x6d0, 0x80000001, 0x8, 0x6, 0xe57, 0xd7ed, 0x0, 0xe2c5, 0x1, 0x3, 0x7, 0x7, 0x4, 0xed4, 0x9, 0x7, 0x9e, 0x6, 0x1, 0xb7, 0x80, 0x9, 0x0, 0x9, 0x9, 0x9, 0x6, 0x81, 0x2, 0x9, 0xffff7012, 0x2, 0x2, 0xff, 0x5, 0x7fffffff, 0x2, 0x9, 0xbcc, 0x2, 0x2, 0xfffff460, 0x7, 0x8, 0xfffffffa, 0x8, 0xbda, 0x80000001, 0x9, 0xeb2e, 0x67, 0x2, 0x800, 0x0, 0x6, 0x96, 0xc, 0x8, 0xffff, 0x7, 0xfffffff9, 0x400, 0x1db, 0x8, 0x1, 0x1, 0x80000000, 0xe2, 0x6, 0x6, 0x4fa3, 0xd84, 0x10000, 0xffffff82, 0x5, 0x400, 0x1, 0xf, 0x7, 0x1ca, 0x8, 0x139539d5, 0x10000040, 0x8, 0x4, 0x8, 0x0, 0x489, 0x74f, 0x4, 0xcdd2, 0x10001, 0x16000000, 0x4000, 0x1, 0x55, 0x7, 0x101, 0x7, 0x3, 0x80000000, 0xfffffffc, 0x5f9b, 0xffffffff, 0x7, 0x7, 0x17, 0x6, 0x3, 0x911, 0x48, 0xa2, 0xfffffffd, 0x2c660, 0x7fffffff, 0x2, 0x3, 0x1, 0x4, 0xfffffff9, 0x9, 0x4f73e055, 0x5, 0x9, 0x4, 0x1000, 0x100, 0x8001, 0x5, 0x8, 0xe, 0x0, 0x1, 0x4, 0x5, 0xb, 0x3, 0x8001, 0x4, 0x9, 0x4, 0x7, 0x9, 0xf6, 0xb, 0x4da0, 0x6, 0x2, 0x0, 0x7, 0x278a2c3c, 0x3, 0x2, 0x0, 0x80000000, 0x9, 0xffffffff, 0xb0bbaf1, 0x5, 0x3, 0x10001, 0x40, 0x81, 0x7, 0x200, 0x5, 0x5, 0xe48, 0xfffffffe, 0x9, 0x6, 0x1, 0x7f, 0x0, 0x2be, 0x0, 0x2, 0x29, 0xffffff80, 0x2, 0x1, 0x4, 0x6b, 0x4919, 0x3fca, 0xe539, 0x1, 0x87fb, 0x4, 0x5, 0xa14, 0x0, 0x1000, 0x3, 0xffff, 0x0, 0xc, 0x3, 0xf517, 0xfffffff8, 0x10001, 0x6, 0x200, 0xf, 0xc6da, 0x9, 0x80000001, 0x3, 0x2, 0x2, 0x4, 0x80, 0x8, 0x7, 0x7ff, 0x7fffffff, 0xc7d0, 0x3400000, 0x5, 0x2, 0x7, 0x2, 0xffffff18, 0xfffffffd, 0x1, 0x9, 0xfffff801, 0x0, 0x3, 0xf5, 0x1, 0x0, 0x0, 0x4, 0xd, 0x5, 0x0, 0x2, 0x51, 0x1000, 0x8, 0x8, 0x2, 0x1ff, 0xffff, 0x5, 0x1]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0xff98}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x7fff, 0x69d, 0x0, 0x0, 0x0, 0x8, 0x9, 0x3477, 0x7, 0xd6, 0x1, 0x0, 0x4, 0x8, 0x7, 0x1, 0x0, 0x7, 0x3, 0x6, 0x8, 0x6, 0xffffffff, 0x1, 0x8, 0x9, 0x400, 0x800000, 0xffffff04, 0x4, 0x9, 0x6, 0x7ff, 0x3, 0xf8b, 0x7, 0x101, 0x2, 0x7, 0x5, 0x4, 0x2, 0xf867, 0x2, 0x5, 0x1aaf, 0x100, 0x1, 0x845, 0x10, 0xfffffff9, 0x2f326af2, 0x1, 0xffff0001, 0x8, 0x0, 0x101, 0x6, 0x9, 0x2, 0x5, 0x6, 0x80000000, 0x200, 0x9, 0xf, 0x2, 0x1, 0x42, 0x4, 0xf, 0x3, 0x81, 0xd, 0x35, 0x6, 0x3, 0x6, 0xfffffff9, 0x3, 0x6, 0x2, 0x800, 0x80000001, 0xae, 0xda, 0x6b, 0x2, 0x65, 0xfffffffc, 0x5, 0x0, 0x0, 0x0, 0x4a4f, 0x0, 0x5, 0xb1b3, 0xef, 0x80000000, 0x7104, 0xc, 0x3, 0x2, 0xd, 0x2, 0x4c06, 0x3fcb, 0xa0, 0x8000, 0x8, 0x7, 0x49e4eb69, 0x298c4bf3, 0x617, 0x0, 0x8, 0x8, 0xc3, 0x9ca7, 0x2c, 0x1, 0x7fffffff, 0x245780, 0x5, 0x19a0, 0x6, 0x1, 0x200, 0x3, 0x62, 0x3, 0x2, 0x7f, 0x81, 0x7, 0xffff, 0x8, 0xb517, 0x0, 0xffffff80, 0x7ff, 0x4, 0xfff, 0x800, 0x2577, 0x7, 0x9, 0x8, 0x80000000, 0x4, 0xc, 0x2, 0x4, 0xffffff01, 0xd, 0x69, 0x8, 0x1, 0x8, 0xcf1, 0xc83, 0xe, 0xbab, 0x4, 0xa2a, 0x6, 0x3, 0x8, 0x4, 0x6, 0x9, 0xfffeffff, 0xfff, 0x7, 0x0, 0x5, 0x5, 0x9, 0x2, 0x7, 0x3, 0xae2, 0x0, 0x235, 0x9, 0x2, 0x6, 0x1, 0x1, 0xbd, 0x619a, 0xa, 0x2, 0x6, 0x6, 0xf, 0x7fffffff, 0x6, 0x8, 0x4, 0x9, 0x9a5, 0x4, 0x3, 0x4, 0x4, 0x5, 0x8001, 0x0, 0x80, 0x8, 0x7fff, 0x7, 0x80000000, 0x0, 0x6, 0x9, 0x8, 0x5, 0x9, 0x9, 0x10000, 0xfffffffc, 0x5, 0x7, 0x2, 0x9, 0xe81b, 0x4, 0xffff, 0xfeff, 0x7, 0xff, 0x2, 0x1, 0x7, 0x5, 0xeb, 0xa8000000, 0x466, 0x3ff, 0x2, 0x401, 0x6, 0x2, 0x6, 0x9, 0xffffffc0, 0x2, 0x1, 0x1, 0xffffffff, 0x8, 0x80]}]]}, {0x1e, 0x6, "63cf48ead98846bd214a39356481ce401e989c3785549a750fe5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_mpls={0x124, 0xc, 0x0, 0x0, {{0x9}, {0x4c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x5, 0x1ff, 0x8, 0xa34, 0x1}, 0x4}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4a4a3}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x800, 0xfffffe00, 0x10000001, 0x2, 0x1}, 0x2}}]}, {0xae, 0x6, "83df40a410c95c92e7829f002ffa5cdd41d2089ac7e3aa2ab9e7e71691636e31f07ece3a608f837bc59335f5c0f94fb9da0be8c804f4372b5a18a8bb904d92e252f264563808bbb79192a9ebd806654995fe6c88aafa46ea93e66744970041d99f71e6109908314aceba78f85b839a143bc1add9f1ab9a18cb295d58a9ed414be96596138e8a1404e85cbe5da9826a894cf19bf6120d74590e663ae7d2bd816d183aa424368a67926c8e"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_skbmod={0x12c, 0xc, 0x0, 0x0, {{0xb}, {0x20, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x5}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0xac80}]}, {0xe4, 0x6, "77f132e256f9fb9059c3487ff30fa64f7f4443ca1f341ad441607fb50d8ca4b99e58c68ca6479b4fd168eb0649d4a87606a5ba863618154ca151a9c73be3d26fba4da996f0604fb06cf4f3323d6610d12041985859d6ac4ea431354e4f2c3e21b3f9e0bb76ab092dfc389b4d41edcb8d8f907db0c31cd2cfe08f41e36ceec6f46baafb7c43e71975eb9156f4ad66089e7326ed8f72416b255527cc86715d8ac79802f9c68affe41f068b83f2ec998ead9856be8806d2516bf4d4947580369ae570dfe8c0b48ef8c5fd6bffefe8630cf8542922e6672d18ee83a545e36929c803"}, {0xc}, {0xc, 0x8, {0x2}}}}]}, @TCA_MATCHALL_ACT={0x68c, 0x2, [@m_ctinfo={0xc0, 0x16, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x9, 0x6, 0x7, 0x7ff, 0x7}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x101}]}, {0x71, 0x6, "5a1cf5588ed931c2d474f51fe50751e7e9ef12c45161b5ecbd2eeea5612faa2d6e11294dc0c465a165f11513cafebc73de495bc9f10d343fe26505d54f3a3325c8d1dd34afefb36f42311ea721a3878fb8fb03ca5ff64b2ad3fdce4000d2ecbaf2883420adf40d7493ca864a22"}, {0xc, 0x7, {0xec377200306db93d}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_bpf={0x40, 0xd, 0x0, 0x0, {{0x8}, {0x10, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0xa, 0x6, "98e13bf4dff3"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_bpf={0xd0, 0x10, 0x0, 0x0, {{0x8}, {0x80, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x3ff, 0x1, 0x6, 0x5}, {0x9, 0xc, 0x5, 0x8}, {0x3, 0x3, 0x3, 0x4}, {0x4, 0x4, 0x4, 0xce8}, {0xffff, 0x4, 0x6, 0xd}, {0x2, 0xf, 0x8, 0x1}, {0x2, 0x0, 0x80, 0xfff}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7d, 0x5, 0x994a270fb91efd82, 0x1, 0x5}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x200, 0x400, 0x0, 0x8, 0x3ff}}]}, {0x29, 0x6, "1fc62d81852e21e6309836de4a6bb94c64ebcc8b1314a9758f9363947d0db5e1fec550c92a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_nat={0xe4, 0x20, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x4, 0x5, 0x9e, 0x3}, @rand_addr=0x64010100, @private=0xa010102, 0xff, 0x1}}]}, {0x91, 0x6, "f3c6f22656ea5f05c2cfa76612b67e7a84bea660edd51cd1500c35d58af8724354c26460ab9e4b547b1760ee2f6a8c0b47289a6f7c6812c92beb5500b8fcfe4c55bf5805840b4567519dd56c70e6390126831d8f4f678bfc0c6dc8766cd9cff94f9b28a241a8bed42d80efc3560fc36d4e59dcf2d3114fa409e270c66ee81886cab6af0d70cf587371c3ea9ee4"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_gact={0x180, 0x19, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0xb09, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x3, 0x0, 0x7, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xb39, 0x3000000d}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0xac, 0x3, 0xffffff77, 0xd6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1e14, 0x6}}]}, {0xff, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_nat={0x124, 0x1e, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xaa, 0x10000, 0x10000000, 0x0, 0x6110}, @multicast2, @multicast2, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xf936ec32, 0xfffffff8, 0x7, 0x6, 0x5}, @broadcast, @dev={0xac, 0x14, 0x14, 0x30}, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7c30, 0x8, 0x8, 0x28a8, 0x6}, @broadcast, @rand_addr=0x64010100, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8001, 0xd1, 0x2, 0x109, 0x1}, @multicast1, @multicast2, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xcb, 0x5, 0x8, 0x7, 0x84}, @multicast2, @private=0xa010102, 0xffffff00, 0x1}}]}, {0x33, 0x6, "6ae9492e25e1e93c7ddb4cd42bcfde24650ca5e225bc57a7ec53b17d3bb9f0dacaa51580133a76391c5818fa229f36"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x130, 0x9, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7fff}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x1}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}]}, {0xdd, 0x6, "447239f72290eb31d49ef9b1c75bb797682b81df877d42f3c72ba804e26dee5c7c92ea284406bc1015851f9b91b30bee9592512be23b898646d6655a264212360a4435bd8aff161886d26ee6782ee938a542355932cead4b12167990d718671375f71787f573a9a89d72a3a78ece6494c20096a69b1f7c43a13c22df1bc2c7705666c55151df92eb646f4259157c3f60c06a3a996a16b717f946aab597e2ec85fdec0d51e49fbb5ccd89f258cffea581aae951f92a322d4163a71d1d195dfc86fac00b667d0510e2fbdb6624dae24fd22381f185a606706dcb"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x6}]}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @TCA_CHAIN={0x8, 0xb, 0xd477003}, @TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x43dc}, 0x1, 0x0, 0x0, 0x8840}, 0x40) 3m9.798768609s ago: executing program 8 (id=1000): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000307ffdf0800000008000000e2ffffff", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r1 = gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="85000000d3f400009600000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$binfmt_register(r2, &(0x7f0000000140)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x1000, 0x3a, '\xfc\xec\xd1\xcb\x9a\x964\xf4\xa2\x89f\x12\x11\fG\\x00#\x00', 0x3a, '/dev\x14bus/usb/00#/00#\x00', 0x3a, './file0'}, 0x51) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_io_uring_setup(0x6454, &(0x7f00000002c0)={0x0, 0x8ed6b, 0x13290}, &(0x7f0000000440), &(0x7f0000000080)) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000480)=""/135, 0x87) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000e2ff00000000000000000000000051f3109b1967da4ab653551a8c88fd0c6abed18c6099123745660729b395fd05769b14469577004d239e61d70e1745428316ae22dcd32efa0391d6011f612b79dba17b0240bed28619f71b66fc"], 0x48) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000990000000b00010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r6 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r6, &(0x7f0000000980)={&(0x7f0000001d80)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)=""/198, 0xc6}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000a40)=""/156, 0x9c}, {&(0x7f0000000c00)=""/247, 0xf7}, {&(0x7f0000000200)}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x7}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_DELETE_BATCH(0x18, 0x0, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000100)=@req3, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3m9.314798081s ago: executing program 8 (id=1003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) 3m9.314616161s ago: executing program 41 (id=1003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) 3m7.7990931s ago: executing program 4 (id=1015): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x1, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="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"/300], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r6, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r6, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}], 0x2, 0x840) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) syz_usbip_server_init(0x1) iopl(0x3) r8 = socket(0xa, 0x40000000002, 0x0) getsockopt$SO_TIMESTAMP(r8, 0x1, 0x3e, 0x0, &(0x7f0000000080)) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) brk(0x20ffc000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000300), 0x5}, 0x100000, 0x5dd4, 0x5, 0x3, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 3m6.593846377s ago: executing program 4 (id=1017): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x1, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="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"/300], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r6, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r6, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}], 0x2, 0x840) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) syz_usbip_server_init(0x1) iopl(0x3) r8 = socket(0xa, 0x40000000002, 0x0) getsockopt$SO_TIMESTAMP(r8, 0x1, 0x3e, 0x0, &(0x7f0000000080)) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) brk(0x20ffc000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000300), 0x5}, 0x100000, 0x5dd4, 0x5, 0x3, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 3m5.514443473s ago: executing program 4 (id=1026): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$eJzs3U1v28gdx/EfZfmxQFC0xSIIsvFs0gUcNFUkeeOFkR7KUpTNrSQKJF3Yp0W6sRdB5GybpEDjy9aXPgDtG+htL3voiyjQc899Az0WWLS3Ar2oIClKskRZip+Sdr8fI9GI/JPzJ4fRhBY5FAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAkOXUyuWKpYbX2tk1kzm1wG+eMj9d27zupoW7U+uVrPiPlpZ0PZ10/TuD2e/Ef93WzfTdTS3FL0s6+sY733z47WIhW/6UhM5Cr7vCF6+Onj7qdPafn622rnWW5S7FWCYqzLDUltvyQt9r2luu8ULfbG5slO9v10NT9xpuuBdGbtM4gVuI/MCsOXdNZXNz3bilPX+ntVWzG2428cPvV8vlDfPRYq/5739UCp1tr9HwWltJTDw7jlnsHyGu3TTm4Elnf31aknFQZZag6rSgarlarVSq1crGg80HH5bLxbEJ5REaixgctG9P4+MqXdAnN3B+hbj//7slNbSklna0K5P746imQL6aE+b3ZP3/+/fdU+sd7v+zXv76YPYNJf3/rfTdrUn9/4RcjEyyQN4ca8L0s/280Csd6akeqaOO9vX8Yta7enEZXu7PllSUPIXy5akpW1tyZXpTjDa1oQ2V9bG2VVcoo7o8NeQq1J5CRXLVTNokkCtbkXwFMlqTo7syqmhTm1qXkauS9uRrRy1tqSZb/+52uwd6kuz39VNyVBZUmSWo2D8Gx4Mm9f8//Txd4vX6f/z/6R87M8QAb1y3d/4/2VzexNXLywgAAAAAAFw0K/ntu5V8d/+upK7qXsMtv+m0AAAAAADABUq++b8Zv8zHpXdlTTj/7159bgAAAAAA4GJYyT12lqSV5KJ+a3An1CwXAeTeHAAAAAAAAN4uyff/txakbjK02qqs1zr/BwAAAAAA/wN+OzTGfjEbY7ebfa1fkBS2F60//3NRwbx13N79rnVox3Psw17M2BUAUf2GVVQ6UG8yXu+CpOSd4960euMD9wbBtNKBfaWvDqaN9W8FIwkszGW/vshJ4NrRUAIbxd47/V7vpTHv9ep9fFRQMietZaXuNdyS4zceVmTb1wqRuxv94tmTX0pBfzsPnnT2S5981nmc5HIcTzo+jPP4/EQ6hWm5vEzGW0juucjb4mXVsyp/12quWEm95Wz752QfFoYrmm37f63bacztlfR15ShrAVm/6hUqpaTJBlufjA5hDbKojG55XkNMyGIpyeJOGnNn7U76kuWXtsLS9+akamm8DYLhLKrDWUzfF9a/xvbFlCziY2E9zuIv8YomZLH+elmMtQgAvCkHg14oGcR8fIz90X73LJ9y03v3H56s5eUfu+kNh3NSsffdRHoT4qR+RfEn+loatpCO4l68kfOJXu71K0ua8IlePkfvFtf1p8EzkHpp9+YU+1n8p9vtPqwk9f5hpFf9Il7gi4n1ho3qXLwL7788/FkyAH7s0/1P959Vq+sb5Q/K5QdVzSeb0Xuh7wEA5Jj+jJ2TEUuD/qzfd3/QP6t+/I/309KJfvdb/UsKSvpEn6mjx7qXPUJgNb/elaHLEO6Nn7XGscvSaGxF9yae1SV96VBstR87r2yRk/9fGMSuX3YzAABwpW5P6YdH+/+8c/d72Xn32o3c8+6TffnoE4InxVaueE8AAPD14QZfWSvRb6wg8NofVzY3K3a07ZrAd35sAq+25RqvFbmBs223tlzTDvzId/yGaQda9GpuaMKddtsPIlP3A9P2Q283efK76T36PXSbdivynLDdcO3QNY7fimwnMjUvdEx750cNL9x2g2ThsO06Xt1z7MjzWyb0l+W4JWNC1x0K9GpuK/LqXlxsmXbgNe1gz/zEb+w0XVNzQyfw2pGfrjCry2vV/aCZrLak7mkPOgQA4Gvjxaujp486nf3npxSOlRay69FOCV7IW+Eb3kQAADCCXhoAAAAAAAAAAAAAAAAAAAAAgLffLPf/nVrIbgrMpswrJ1jqT/n5tZnWbGkw5cu/nSvDMxQKo1N6I+12py/+17RQzItZjgsLkjrZ7h+OOb7QrVidKVhpoXjx+3BZyjsSLq3wg4OTx+FYTDwzd9Zivy2K5//nkFd49uWEWdOPqMWT+3DhtA08WShKer5wjia4+s8iAFfrvwEAAP//pJI9bA==") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 3m5.323217314s ago: executing program 4 (id=1027): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000340)={[{@nojournal_checksum}, {}]}, 0x0, 0x4ee, &(0x7f0000000c40)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000", @ANYRES32, @ANYBLOB="00000000000000000000dc84b1c2c6a6d6dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000000580)={0x0, 0x1, 0x8, 0x74ff9241, @vifc_lcl_ifindex, @loopback}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kfree\x00', r2}, 0x18) fsetxattr$security_selinux(r0, &(0x7f0000000200), &(0x7f0000000280)='system_u:object_r:su_exec_t:s0\x00', 0x1f, 0x1) r3 = syz_io_uring_setup(0x10d, &(0x7f0000000140), &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x29c780}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syslog(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f00000008c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}, {@mblk_io_submit}]}, 0x3, 0x44a, &(0x7f0000000400)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000880)=ANY=[], 0xff34, 0x0) chown(&(0x7f0000000340)='./file0\x00', 0xee01, 0x0) r7 = syz_io_uring_setup(0x62b4, &(0x7f0000000940)={0x0, 0x80000004, 0x0, 0x2, 0x4}, &(0x7f00000003c0), &(0x7f0000000640)) io_uring_register$IORING_REGISTER_BUFFERS2(r7, 0xf, &(0x7f0000001c80)={0x1, 0x0, 0x1000000, &(0x7f0000001140)=[{0x0}], 0x0}, 0x20) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0xfffffdcf) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000640)={'syztnl0\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x1, 0x5, 0x69, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7, 0x10, 0x10001, 0x8cd6}}) mknod$loop(&(0x7f00000009c0)='./file0/../file0\x00', 0x841a, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000001140)=@deltfilter={0x4374, 0x2d, 0x532, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0x3}, {0x4, 0xd}, {0xfff2}}, [@TCA_RATE={0x6, 0x5, {0xff}}, @filter_kind_options=@f_bpf={{0x8}, {0x24, 0x2, [@TCA_BPF_CLASSID={0x8, 0x3, {0xfff3, 0x8}}, @TCA_BPF_CLASSID={0x8, 0x3, {0x0, 0xdb912443785a19c0}}, @TCA_BPF_FD={0x8}, @TCA_BPF_CLASSID={0x8, 0x3, {0x5d8930fca15c05f4, 0xfff2}}]}}, @filter_kind_options=@f_u32={{0x8}, {0x778, 0x2, [@TCA_U32_ACT={0x51c, 0x7, [@m_ctinfo={0x14c, 0x6, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0xc, 0x7, 0xffffffffffffffff, 0x6, 0x2}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x341}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x6}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x10001}]}, {0xe8, 0x6, "c0757fa478fede1dbe2a307850416c5b008332e36f48cabeef841a0f47234d89f010cc1a572daeae116f07f38be0db67d0f029ef176ee8315b19d2c537d8115a09bbc324294ab9be433d6a21c976285e64be25546deea2ad06928dc99d0597c55c9083fbb774377516382e6e91dcfe0db6429770664e43975e20a87c006a5aaf7c6f9988f5f145e3428998db4dc95e102f941783e51d5647893764a8051e08269352fbff25e3905def08be37b0ac5c8980bd12481f82d05fed0b56cd5f873c19f8b30f123924317158e18d8731fc7d5fb8e028152c656cfad9263a4addc6a3ccaee125a9"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mpls={0xa0, 0x18, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x3d44400, 0x3, 0x5, 0x6, 0x2}, 0x2}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x448d7}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x45, 0x6, "10cd9fb36dc4efb69e253d05cd5d0b823131ccc01ed1dc5e1223dc2f46c3928cf3af557d58c0bbfe80bf9480fc5577ffbe4c96b40fe80bdab505775981282511e5"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_vlan={0x14c, 0x11, 0x0, 0x0, {{0x9}, {0x48, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xfffffff1, 0x1, 0x20000000, 0xfffff800}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x81e}]}, {0xd9, 0x6, "a7fd5621099ed59ef1d226f59006cc63be972655dce1752d9184ca3910855f3e3802887dfc67cc8d610e9103a040e13523ddca01dd6bcec4f19d64b09545f9593de7e90222f6b0353fc58f6d3caef57d9ca3e6fc6b19a1820a75bcc4fcffa1c5cc9f5e220bbc097cd6ae88bb9704231e2ebcd6425e8e041a5ca2a0fb8cdb17a968dc193d8a9fe09ad8b1e1c1b8eaa9e8b64ce63b3653d7e6c10216e811ae927e8ef8933d4299542522ae563e3eed25771c983640dbdbd3a213295e77718ab7eeebaad02269d1f54a124979a5ee68356e090efccdd1"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_nat={0x180, 0x1f, 0x0, 0x0, {{0x8}, {0xa4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x3, 0x2, 0xde4b, 0xd79}, @multicast2, @multicast2, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x9436, 0x20000000, 0x4, 0x8}, @broadcast, @remote}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xb, 0x1, 0x5, 0x401, 0x3}, @private=0xa010100, @remote, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x46df, 0x10000000, 0x4, 0x7ff}, @dev={0xac, 0x14, 0x14, 0x3e}, @empty, 0xffffff00}}]}, {0xb8, 0x6, "ce97c0164a88016641483dc33ecdf87d0c20891694fa72f3d7919d5b639475e0bbd1d6b327a5c7d6b71cc321de471c1923c60bb2257d205ad0eb0ff12e1d91fb21e486ee0e0c35d1a0b86e76a0b6fe69fa0fc99e40b37a801c0887516b46ce114aa1c1d077260b88bf2265b90a1bcc061c53ddd9b9babbd797ad3643bb7e037d281b447180d29f48ea85de6231c525b6410f1c7a37eafb689090d4d5cb2317c4b8fa4d68471d217db9e0007af75dda720cf565f7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_gact={0x60, 0x7, 0x0, 0x0, {{0x9}, {0x4}, {0x34, 0x6, "8c93d933f5b541a00289530c4856c5518200ebfa5c5277079f909fb19b3609208b7f90051a2a87cf7f304f4171d3d9b2"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_U32_HASH={0x8, 0x2, 0x7c}, @TCA_U32_SEL={0x134, 0x5, {0xc, 0x1a, 0x40, 0x0, 0x49, 0x1, 0x4, 0x0, [{0x593e, 0x0, 0x0, 0x5}, {0x8, 0x5, 0x8, 0x7}, {0x3, 0x11d, 0x80, 0x2}, {0x80, 0x10, 0x100, 0x6}, {0x1ff, 0x101, 0x1, 0x7}, {0x3, 0x2, 0x8001, 0x1}, {0xe, 0xffffffff, 0x1}, {0x1, 0x9, 0x6, 0x2}, {0x4, 0x6, 0x80, 0x8}, {0x40, 0x8, 0x10000, 0x80000000}, {0x80000001, 0x9, 0x8, 0x5}, {0x80000001, 0x4, 0x5, 0xde5a}, {0x38d, 0x1, 0x5, 0x9}, {0x5, 0xd, 0x0, 0x5}, {0x469, 0x4, 0x6d9, 0xf}, {0xffffffff, 0x2, 0x3, 0xfffe0000}, {0x6f, 0x0, 0x6, 0x2}, {0x1000, 0x6, 0x6, 0x8001}]}}, @TCA_U32_ACT={0x10c, 0x7, [@m_ct={0x108, 0x5, 0x0, 0x0, {{0x7}, {0x58, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @multicast2}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @loopback}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @TCA_CT_LABELS={0x14, 0x7, "68b09bda84936c9ce80932c338ed3f5c"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}]}, {0x8b, 0x6, "bc4eb6e91fb43faa760b989ba39ab52452f03e25da0f9981d7f997a3740761f8bcd2d65994c34818dfb29727daeb89eda2fdf8da802edb980ba81b47e7bda5623583e6af437ca6ea9968863e98324e7af9f76687bac7784ed185cc4af53608956b1fcb7dbcb79496c6ae3069a4a6fb521a7c362f5d1eb8efe0f0e6df0753bed3c2cd547b28e095"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_U32_FLAGS={0x8, 0xb, 0x3}, @TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x3b74, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x1f, 0x3}}, @TCA_MATCHALL_ACT={0x34cc, 0x2, [@m_xt={0xfc, 0x1b, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0xcc, 0x6, "73f382f5843fb6b65882f492c6e1898213fb5ca6e2ddf2f3df559e727dfde13be3a08bdc4b1e18a3f62e2ec86e59e375ebe8158b842573f8bc0579ea76467d60560d187074b06094e4710e5b14c0bdcdf36a1f6a6977f7625a80f42050a31593fef3351b4f414035bc93034644912b0465ba9cc1420787771a4b07e8325d242a43bc319cd7223c16a4a3bed155d53ddab5c817313ef08f82b0e6718983e31dc940570d59ccc48f6ae8fa94b286537fa8115eae48dc170b5b9fb84978b341fd896903d83c259c6964"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_police={0x317c, 0x1f, 0x0, 0x0, {{0xb}, {0x3134, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xffffffff, 0x4, 0xadaa, 0x9, 0x9, 0x5, 0x7, 0x1, 0x2a, 0x4, 0x8, 0x8, 0x7, 0x7, 0x4, 0x81, 0xc0000000, 0x0, 0x1, 0x101, 0x9, 0x7f, 0x401, 0x1621695a, 0x80, 0x5, 0x86cf, 0x9, 0xffffff5f, 0x5, 0x1ff, 0x6, 0x2, 0x3, 0x4, 0x7, 0x10000, 0x0, 0xbb01, 0xe, 0x3, 0x7fff, 0xf0000000, 0x7fffffff, 0xfffffbff, 0x9, 0x80000001, 0x829, 0x6, 0xa, 0xc268, 0x100, 0x7, 0x81, 0x1, 0xb414, 0x2, 0x5, 0xe6, 0x4, 0x80, 0xfffffffb, 0x8, 0x81, 0x8691, 0x80000001, 0x0, 0x7ce4, 0xfffffffd, 0x70, 0xc, 0x8, 0xffffff00, 0x4, 0x2, 0xe0000, 0x62, 0xfffffff7, 0x4, 0x4, 0x9, 0xcec0, 0xc4ad, 0x624800, 0xfff, 0x49c4, 0x9, 0x60c2, 0x204, 0x9, 0x5, 0x101, 0x180, 0xa, 0x18000000, 0xfffffffb, 0x5, 0x201, 0x0, 0x6, 0x401, 0x0, 0x1ff, 0x0, 0x10, 0x8, 0xfffffffb, 0x2, 0xffff6953, 0x7d, 0x9, 0xfffffff7, 0x1, 0x4, 0x80000001, 0x7, 0x3ae, 0x3, 0x6, 0x5, 0x0, 0x7fffffff, 0xd0c, 0x6, 0x6832, 0x9, 0x5, 0x1, 0x0, 0x7, 0x98, 0x4, 0x5dac, 0xfff, 0x80b, 0x3, 0x6, 0x5, 0x80000001, 0x7, 0x7fffffff, 0x800, 0xff, 0x0, 0x9, 0x9, 0x1, 0x7, 0x3, 0xfcfa, 0x1ff, 0x5, 0x1, 0x0, 0x4, 0x7, 0x7fffffff, 0x1, 0x400, 0x0, 0x2, 0x7ff, 0x4, 0x2, 0x58a, 0x4, 0x6, 0xea, 0xeda6, 0x46625de2, 0x6fe2, 0x5, 0x7, 0x9, 0x1000, 0x9, 0x7, 0x9, 0x1, 0x8, 0x4a5, 0x1, 0x7, 0x39, 0x8, 0x8, 0x401, 0x5, 0x10000, 0x2, 0x7ff, 0xf, 0xffffffff, 0x80000000, 0x6, 0x6, 0x6, 0x9, 0x6, 0xfffffff8, 0xa000000, 0x6, 0x0, 0x401, 0x27, 0xb800, 0x4, 0x8001, 0x1ff, 0xf, 0x40e, 0x47, 0x67, 0x8000, 0x7ff, 0xc0, 0xfff, 0x2, 0x5, 0xfffffffe, 0xc35b, 0x9, 0xffffffff, 0x34, 0x8, 0x2, 0x7, 0x7ff, 0xfffffffb, 0xd35, 0x1000, 0x3c3, 0x10000, 0x5, 0x4, 0x6, 0x7, 0x3, 0x4, 0x200, 0xc2c, 0x8, 0xfff, 0xfffffffe, 0x7, 0x7, 0x2, 0xf0c, 0x239, 0x4, 0x7fffffff, 0x3, 0xd, 0xc95, 0x70c1, 0xa06]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x80, 0x3, 0x80000000, 0x6ba, 0xfffffff7, 0xffffffff, 0x0, 0x2, 0xfffffffe, 0xfffffff7, 0x7f, 0x9, 0xefb0, 0x4, 0x1, 0xfffffffc, 0x1000, 0x0, 0x5, 0xffff, 0x7ff, 0x8000, 0x101, 0xb, 0x1d8a, 0x7fff, 0x2, 0x4, 0x0, 0x47, 0x8000, 0x4, 0x4, 0x81, 0x6, 0x8, 0xa, 0xa, 0x6, 0x712, 0x58bb, 0x2, 0x7ff, 0x0, 0x6, 0x3, 0xf0e, 0x7e, 0x24d8, 0xe, 0x47, 0x100, 0x2a87, 0x5, 0x6, 0x0, 0xe1, 0x5, 0x7, 0x4, 0x10, 0x6, 0x6, 0x4, 0x7, 0xffff3410, 0x81, 0x1, 0x3, 0xb920, 0x1000, 0x6f, 0x9, 0xfff, 0x7, 0x2, 0x6, 0xa06b, 0x2f0b49f0, 0x101, 0x1, 0x100, 0x2, 0xd, 0x0, 0xfffffff8, 0x3, 0x4, 0x8, 0x9, 0x3, 0x7, 0x5, 0x3, 0x0, 0x1, 0x1cb5, 0xffffffff, 0x7f, 0x1, 0x80000001, 0x2, 0xf, 0x3, 0xfd9d, 0x3, 0x6, 0x7, 0xcf59, 0x9, 0x0, 0x7643, 0x6, 0x8, 0x0, 0x9, 0x100, 0x0, 0x8000, 0x40, 0x322a, 0x4bb0, 0x8, 0x10000, 0x800, 0x2, 0x79, 0x5, 0x0, 0x2, 0xd0, 0x8, 0x9, 0xa309, 0xfffffff7, 0x4, 0x195, 0x1, 0x0, 0x2, 0x401, 0xffffff58, 0x7, 0xfffffff8, 0x3ffed258, 0x2f4a, 0x8, 0x6, 0x1, 0x0, 0x40, 0xc, 0x6, 0x9, 0x5, 0x8, 0x7ff, 0x332f0c85, 0x8, 0x1, 0x8, 0x7400000, 0x7, 0x80a1, 0x911a, 0xcc, 0x5, 0xf3, 0xfffffff9, 0x9, 0x7ac5, 0x8, 0x9, 0xf, 0x6, 0x2, 0x480, 0xfffffeff, 0x2, 0x3, 0x5, 0x7, 0xfffffff7, 0x3ff, 0x2e, 0x4, 0x4, 0x2, 0x8, 0x3, 0x4, 0x7, 0x2060, 0x6, 0x8, 0x8cc2, 0x0, 0xbbeb, 0x0, 0x10001, 0xf7, 0x3, 0x6a68, 0x9, 0x5, 0x6, 0x3, 0x6, 0xfffffffd, 0x1, 0xc00, 0x8000, 0xfa92, 0x7, 0x4, 0x0, 0xd0, 0x8, 0x4, 0x7, 0x0, 0x5c, 0x2, 0x8f88, 0xa8c, 0x297d3356, 0x8, 0x7, 0x4, 0x3, 0x80000000, 0x1, 0xffff46c8, 0xd, 0x401, 0x0, 0x823, 0x8001, 0x2, 0x3, 0x80, 0x1, 0x3, 0x5, 0x5, 0x101, 0x400, 0xe, 0x5, 0xffff, 0x7, 0x6079f1aa, 0x21f, 0x2, 0xfff]}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xffffffffffff597a}, @TCA_POLICE_RATE={0x404, 0x2, [0xfffffffe, 0x10, 0x4, 0xac, 0x80000001, 0x5, 0x3ff, 0x59c, 0x9, 0x40df, 0x8, 0x4, 0xe, 0x379, 0x7, 0x2, 0xfffffffa, 0x0, 0x7c, 0x5, 0xf6d, 0x7, 0x0, 0x6, 0x9, 0x0, 0xf7, 0xfffffffe, 0x401, 0x9, 0x6, 0x4, 0xf, 0x10001, 0x6, 0x9, 0x7, 0x5, 0x2, 0xc, 0xf, 0x6, 0x6, 0x6, 0x6, 0x9, 0x9, 0xffff8e02, 0x7, 0xe, 0xffff8001, 0x9, 0xb0, 0x8, 0x74, 0x10000, 0x8, 0x5, 0x3ff, 0x9, 0x4, 0x4, 0x1, 0xefb, 0x33f, 0xe5e2, 0x0, 0x2a7e, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x2, 0x6, 0x7fffffff, 0x104, 0x10001, 0x6, 0x0, 0x0, 0xf5d, 0x4, 0x704bdcec, 0xf, 0x1, 0x1, 0x2, 0x5, 0x3, 0x80, 0xd7, 0x81, 0x81, 0x6, 0x2, 0x5d, 0x1, 0x9, 0xb0d3, 0x2, 0x2, 0x1, 0x8, 0x759c, 0x8, 0x7, 0x1ef, 0x7fff, 0x949, 0xf, 0x1000, 0xffff6def, 0x0, 0x7, 0x1, 0x9, 0x8, 0x3, 0x6, 0x2, 0x1, 0x10001, 0x1, 0x4, 0xf6, 0xffffffff, 0x4, 0x5, 0x200, 0x1, 0x2, 0x3, 0x6, 0x9, 0x0, 0x8, 0x100, 0x6, 0x400, 0x6d20, 0xab2a, 0x6, 0xebc, 0x9, 0xfff, 0xb, 0x3, 0x1, 0x8001, 0xfffff6c0, 0x5, 0x593a, 0x2, 0xe, 0x2, 0x200, 0x6, 0x4, 0x8000, 0x6, 0x2, 0x4, 0x9e, 0x8d, 0x70, 0x0, 0x9, 0x1, 0x7, 0x5, 0x9, 0x8001, 0x8000, 0x8, 0x3, 0x6ff0, 0x0, 0x2, 0xa, 0x5, 0x5, 0x0, 0x23, 0x1, 0x5, 0xd, 0x0, 0x3ff, 0x7db, 0x9, 0x9f, 0x7a5, 0x1, 0x4, 0x1, 0x8, 0x200, 0x20000, 0x7, 0x5, 0x6, 0x7fff, 0x0, 0x2, 0x3, 0x9, 0x9, 0x0, 0x1, 0xfffffffe, 0xffff0000, 0xfffff975, 0x8, 0x50, 0xffffffff, 0x0, 0x5, 0x4, 0x8, 0x8000, 0x9, 0x10, 0xfffffffd, 0xaca2, 0x1, 0xffff, 0x10000, 0x0, 0x35d0, 0x4, 0x55, 0x2, 0x4, 0x4, 0xd, 0x401, 0x6, 0x1, 0x6, 0x40000000, 0x4, 0xde3, 0x8, 0x7f, 0x6, 0x2, 0x40, 0x8, 0xac, 0x9, 0x2, 0x3, 0x3, 0x5, 0x2]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x321b}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x5, 0x3, 0x1, 0x2, 0xb, 0x3, 0x80000001, 0x1, 0x9, 0x0, 0xb, 0x8, 0x4, 0x1, 0x328, 0x1, 0x7, 0x9, 0x0, 0xc15, 0x10000, 0x1, 0x865a, 0x6, 0x3c5, 0x8000, 0x8, 0x8001, 0x6e08, 0x1, 0x100, 0x5, 0xffffffff, 0x8, 0xc7, 0x2, 0x1, 0x200, 0x1, 0x1, 0x1, 0x1, 0x0, 0x800, 0x401, 0x7f, 0x1, 0x1, 0x9, 0x5, 0x70, 0x2, 0x13a6, 0x6, 0xcb, 0x7, 0x4, 0x101, 0x4, 0x1, 0x30d, 0x7, 0xd5, 0x1, 0x7, 0xc, 0x7fff, 0x0, 0x1, 0xc0000000, 0x7, 0x9, 0x3, 0x1, 0x4, 0x10001, 0x6, 0x3, 0x1000, 0x2, 0x7, 0x6, 0x8001, 0x1, 0xfffffff9, 0x9, 0x8, 0x4, 0xffffffff, 0x0, 0xd83, 0x8001, 0x3ff, 0xfe70, 0xd, 0x9, 0x10f, 0x40, 0x3, 0x2, 0x76, 0x5, 0x7, 0x6, 0x40, 0xff, 0x2, 0x6, 0x80, 0x5b, 0x0, 0x82d, 0x7f, 0xffffffc0, 0x4, 0x3ff, 0x4, 0x73, 0x7, 0x4, 0x101, 0x8, 0x8, 0x84, 0x1, 0x74a, 0x5678, 0x8, 0x0, 0x8, 0x3, 0x1, 0x3ff, 0x200, 0x7, 0x18e, 0x0, 0x4, 0x8, 0x0, 0x6, 0x8, 0xc, 0x81, 0x4, 0x4, 0x1ff, 0x3, 0x4, 0x3, 0x1, 0x1000, 0x0, 0x0, 0xff, 0xa, 0x6, 0x2, 0x7ff, 0xdedf, 0x1, 0xcef, 0x2, 0x1, 0x5, 0x4, 0x1000, 0x2, 0x3, 0x1, 0x9, 0x1, 0xf, 0x4, 0x9, 0x6, 0x1000, 0x47, 0x6, 0x8285, 0x5, 0x35, 0x2, 0x20a, 0x8001, 0x346b, 0x4, 0x5, 0x9, 0x6a37, 0x7, 0x4, 0x10000, 0xc4d1, 0xffff, 0x7fffffff, 0x4, 0x7ff, 0x7, 0x400, 0x7, 0x4, 0xfffffff7, 0xec72, 0xff, 0x1ff, 0xa, 0x9, 0x7ff, 0x80000000, 0x7, 0x2, 0x3, 0xfffffffc, 0x9, 0x100, 0x80, 0x6d1, 0xfffff802, 0xff, 0x40, 0xfffffffa, 0x9, 0x2, 0x1, 0xff, 0x7, 0xc44, 0x0, 0x2, 0x8001, 0x2, 0x1, 0x2, 0x80000000, 0x2, 0x6, 0x5, 0xf2, 0x401, 0xb9b7, 0x4, 0x5, 0x9, 0x1, 0x84, 0x0, 0x8, 0x1ff, 0xe, 0x2, 0xb, 0x8, 0xffff, 0xffff11e7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x7, 0xc, 0xa, 0x800, {0x2, 0x1, 0x1, 0x3, 0xfff2, 0x7}, {0x1, 0x1, 0x6, 0x9f, 0x5, 0x39452c95}, 0x101, 0x0, 0xd}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x2, 0x8, 0x0, 0x5, 0xa92, 0x7, 0xffff, 0x2, 0x10000, 0x0, 0x7, 0x0, 0x7, 0x7, 0xffffffff, 0x1, 0x6, 0xb, 0x5, 0x0, 0x7f, 0x0, 0x6, 0x80000001, 0x401, 0x2, 0x5, 0x800, 0xf, 0x7fffffff, 0x9, 0xf8b, 0xd5, 0xfffffff7, 0x81, 0xffff3a6f, 0x7, 0x4ff8, 0xfffffff8, 0x8, 0x3ff, 0x7, 0x7, 0x0, 0x8, 0x101, 0x2, 0xfffffff7, 0x50, 0x1, 0x1443, 0x5, 0x0, 0x1, 0x7c9, 0x5, 0x2, 0x7fff, 0x8, 0x0, 0x1, 0x7, 0x7, 0x8000, 0x8000, 0x0, 0x4, 0x1, 0xfffffffa, 0x8, 0xf70, 0x0, 0x2, 0xc, 0x7, 0x2, 0x5, 0x9, 0x83d, 0x5, 0x7, 0x70000000, 0x6, 0x6, 0xa939, 0x200, 0x4, 0x1, 0x0, 0x3ff, 0x170, 0xbdf, 0x6, 0x3, 0x5, 0x1, 0x9, 0x479, 0x30, 0x6, 0x7, 0x9, 0x8, 0x5, 0x4, 0x80, 0x5, 0x2398, 0x8001, 0x4, 0x40, 0x4, 0x2, 0x0, 0x6, 0x9, 0x9, 0x4, 0x2, 0x7fffffff, 0x0, 0x1, 0x0, 0x1ab053fb, 0x1000, 0x2, 0x45d, 0x6, 0x6, 0x3, 0xfff, 0xf4d, 0x82, 0xffffb542, 0x5, 0x2, 0xd09, 0x80000001, 0x7fff, 0x0, 0x9, 0xc, 0x8, 0xe, 0x5, 0x1e94, 0x9, 0x7f, 0x8, 0xe75e, 0x8001, 0x101, 0x4, 0x1000, 0x0, 0xf, 0x3, 0x0, 0xf7b, 0x6, 0xfffffff9, 0x0, 0x7, 0x2, 0x2, 0x9, 0x5, 0x2, 0x1, 0x5, 0x80000, 0x10000, 0xe, 0xe3, 0x7, 0x9, 0x0, 0x401, 0x81, 0xc7, 0x0, 0x3, 0x10001, 0x4, 0x8001, 0x78, 0xfffffffe, 0xfffffff7, 0x10001, 0x631d2ee8, 0xb, 0x0, 0x5, 0x3940f836, 0x3, 0x8, 0xffffffff, 0x7, 0x52b6, 0x9, 0x6, 0xe70a, 0x4, 0xe17, 0x0, 0x0, 0xfffffe00, 0x6b0, 0x6, 0x8001, 0x7, 0x3, 0x430, 0x0, 0x0, 0x6, 0xffffffff, 0x5, 0x9, 0x0, 0x6, 0x0, 0x0, 0x7, 0x4c1, 0x1, 0x6, 0xe0de, 0x8, 0x8, 0xc, 0x1, 0x9, 0xec, 0x0, 0x7fff, 0xffff, 0x5, 0x42f, 0x5, 0x0, 0x5, 0x1, 0xda81, 0x81, 0x92, 0xc1, 0x6, 0x8, 0x9, 0xdf11, 0x9, 0x80000000, 0x101, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x5, 0x5, 0xcf, 0x35c9, {0x7, 0x2, 0x1000, 0xf2, 0x6, 0x33c}, {0x5, 0x2, 0x9, 0x941, 0x8, 0x85df}, 0x3b6b28d2, 0x5, 0x7f}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x3, 0x8, 0x1, 0x7, 0x0, 0x6, 0x0, 0x7, 0x4edb, 0x7, 0x5, 0xfffffffd, 0x8, 0x3ff, 0x3, 0x5, 0x2, 0xfffffff7, 0xa, 0x9, 0x3, 0x91a4, 0x200, 0x6, 0x8, 0x9, 0x0, 0x3, 0x6, 0xfff, 0x80000000, 0x2, 0x7, 0x0, 0xe804, 0x59c, 0x10001, 0x5, 0xffffffff, 0xfffffff0, 0x2, 0x80000001, 0x40, 0x3, 0xb, 0x8, 0x6, 0x2, 0x0, 0x7, 0x30, 0x0, 0xfffffc00, 0xfffffffa, 0x7, 0x1, 0x0, 0x6, 0x200, 0x3, 0xe, 0x3, 0x1, 0x7, 0x9, 0x9, 0x9, 0x6, 0x4726, 0x3, 0x8, 0x2, 0x80, 0x2, 0x5f5eb9ee, 0x9, 0x6, 0x6, 0x19, 0x2, 0xffffffff, 0x9, 0x1, 0x0, 0xb, 0x4, 0x5, 0xfffff800, 0xfffffff8, 0x10, 0x9, 0xfffffffa, 0x5, 0x401, 0x80000000, 0x200, 0xb0, 0x7, 0x7, 0x904802e, 0x80, 0x2, 0x4, 0x0, 0x5, 0x80000000, 0x800000e, 0xfffffe00, 0x3, 0x100, 0x2, 0x7f, 0x40, 0x3, 0x4, 0x1df4, 0x0, 0x100, 0xf, 0x3c19, 0x1, 0xfffffffc, 0x9, 0x8001, 0x4334, 0xd, 0xd, 0x8, 0x7ff, 0x1, 0x1000, 0x8, 0x4, 0x400, 0x1, 0xff, 0x9, 0x3, 0x8, 0xf, 0x8, 0xfff, 0x8, 0x80, 0x0, 0x8, 0x8, 0x5, 0xfffffffa, 0xc769, 0x3, 0x0, 0x3, 0x4, 0x9, 0x4, 0x8, 0x620b, 0x0, 0x2, 0x6f316a1, 0x1000, 0x3, 0x5, 0x5, 0x1ff, 0x5, 0xfffeffff, 0x4, 0x7, 0x1, 0x0, 0x9, 0x80000001, 0x6, 0xfff, 0x0, 0x7, 0x5, 0x8, 0x7, 0x9, 0x0, 0x40, 0x800, 0x0, 0x15f, 0x10001, 0x4, 0x2, 0x0, 0x7f, 0x7fffffff, 0x7, 0x9, 0x1, 0x6, 0x0, 0x4, 0x1000, 0x400, 0x2, 0x5, 0x7, 0x5cad4123, 0x2, 0xff, 0x47, 0x200, 0x8, 0xec84, 0x3, 0x0, 0x5941, 0x9, 0xda, 0xd8, 0x1, 0x3ff, 0xfff, 0x3, 0x7, 0x9, 0xfffffc01, 0x9, 0xb, 0x9, 0xb, 0x9, 0x7, 0x0, 0xe, 0x401, 0x1c00000, 0xe0000000, 0x1, 0xe, 0x7, 0xa6, 0x6, 0x3, 0x4, 0x1, 0xfff, 0x4, 0x200, 0x8469, 0x22, 0xc9, 0x8, 0x10, 0x0, 0x7, 0xa449, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x27a5, 0x6, 0x6, 0x7fffffff, 0x80000001, 0x6, 0x3, 0x0, 0xe5a9, 0x0, 0xffff, 0xa3e13ef, 0x10, 0x4, 0xfffffffb, 0x5, 0x0, 0x6, 0xaaf, 0x62, 0x4, 0xc67d, 0x81, 0x1ff, 0x9, 0x81, 0xfffffffe, 0x0, 0x7fffffff, 0x1ff, 0x2, 0x2, 0x1e4, 0x10001, 0x8, 0x3, 0xf20, 0x7, 0x3, 0xb5f, 0x9e3, 0x3, 0xb7, 0x460e, 0xe4, 0xfffffff9, 0x1, 0x1, 0x10001, 0x7, 0x5, 0xe, 0x6, 0x6, 0x3, 0x10000, 0x6, 0x7, 0xc, 0x81, 0x9, 0x1, 0xc, 0x5, 0x6, 0x3d, 0x4, 0x3, 0x2, 0xf1, 0x7ff, 0x5, 0x9, 0x7fff, 0x3, 0xfffffffc, 0x5, 0x6, 0x9, 0x0, 0x6, 0x5, 0xb, 0x5, 0x9, 0xf, 0x5, 0x6, 0x4, 0x4, 0x4, 0x6, 0x6, 0x60d, 0x951, 0x0, 0x6, 0x5, 0xff, 0x7713, 0x5, 0x28, 0xff, 0x9, 0x6, 0x2, 0xfffffffb, 0x66, 0x9, 0x7fff, 0x0, 0x4, 0x9, 0x6de171cc, 0x906d, 0x7f, 0x40, 0x5, 0x0, 0x6, 0x3, 0xfffffffe, 0x2, 0x5, 0x15a, 0x4, 0x7, 0x0, 0x1, 0xac, 0x0, 0x23e, 0x7f, 0xfffffffb, 0xc, 0x9, 0x7, 0x7ff, 0x6c9a, 0x5, 0x9, 0x4, 0xe25, 0x5, 0x200, 0x0, 0x2, 0x237c, 0x2, 0xb, 0x6, 0x3, 0xfb4, 0x7, 0xd, 0xdf, 0x2, 0x4, 0x6, 0xf, 0xffff, 0x1000, 0x5, 0x3, 0x100, 0x7, 0x1, 0x6, 0x7, 0xffffcdda, 0x43c, 0x9, 0x3ff, 0x56, 0x4, 0x80000000, 0x7, 0xfffffff9, 0x7, 0xb, 0x9, 0x7, 0xffff18c5, 0x4, 0x4, 0xdad, 0x9, 0x9, 0x8, 0x9, 0x0, 0xfffffffd, 0x4, 0x5, 0x9, 0x9, 0x0, 0x8, 0x3, 0x8, 0x2, 0x80000000, 0x7, 0xd2, 0x6, 0x8, 0xf, 0x5, 0x5, 0x4, 0x7fffffff, 0x5, 0xad, 0x1, 0x0, 0x659, 0x0, 0x2, 0x9, 0x3, 0x3, 0x0, 0x1, 0x7, 0x3, 0x3, 0x5, 0x7, 0x3ff, 0x9, 0x86, 0x6, 0x10, 0xa, 0x0, 0x8, 0xba, 0x9, 0xffffdf38, 0xbce, 0x6, 0x4, 0xa4c7, 0x5, 0x0, 0x8, 0xac, 0x80000, 0xe76, 0x9, 0x4, 0x40, 0x40, 0x1, 0x2]}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x0, 0x0, 0xdd99, 0x81, 0xfffff788, 0xfc05, 0x0, 0x3, 0x140000, 0x1000, 0x1, 0x1, 0x3, 0x6, 0x8, 0xc, 0x3ff, 0x6, 0x2b6, 0x8, 0x4aff, 0x7474, 0x2, 0x4, 0x8, 0x1, 0xd, 0x4, 0x1, 0x4, 0x4, 0xd15, 0x7, 0xffffaff6, 0x8, 0x9, 0xffff4ae3, 0x400000, 0x4, 0x6, 0x5, 0x0, 0x4a1, 0x9, 0x77c6, 0xf340ee6c, 0x2, 0x1, 0x4, 0xffffffff, 0xa, 0x8001, 0x0, 0x0, 0x4d9, 0x6, 0x0, 0xffffff7b, 0x6, 0x1, 0x2, 0x9, 0xfffffff8, 0xca3, 0x3, 0x7fffffff, 0xffffffff, 0xfffffff8, 0x9, 0x5, 0x3, 0x0, 0x80, 0x5, 0x6, 0x8001, 0xffff, 0xffe3, 0x3, 0xe9a5, 0x3e4, 0x1000, 0x57, 0xb, 0x6, 0x6, 0x580000, 0x0, 0x2, 0x9, 0x8, 0xef38, 0x6, 0x7fffffff, 0x1, 0x37, 0x5, 0x60000000, 0x0, 0x3, 0x8, 0x8, 0x8000, 0x3, 0x1, 0x7e34, 0x8, 0x1ff, 0x67, 0x9, 0x6, 0xca, 0x27f, 0x7, 0x80000001, 0xc1c, 0x418b, 0x20, 0x2, 0x6, 0xa, 0x0, 0x1, 0x81, 0x7, 0x2, 0x4, 0xbe24, 0x4, 0x4f2, 0x7ff, 0xfffffffb, 0x4, 0x6, 0x4, 0x87d9, 0x81, 0x1, 0x8, 0x1c, 0x4, 0x8, 0x7fffffff, 0x938, 0x6b, 0x0, 0x7, 0x6, 0xffffff19, 0x800, 0x0, 0x7, 0x6, 0xfffffffc, 0x2, 0x3, 0x6, 0x9, 0x4, 0x4a73, 0xe1, 0xb71, 0xfffffff9, 0x4, 0xffffffff, 0x1, 0x9, 0x19a, 0x9, 0x8, 0x62, 0x7, 0xfffffe00, 0x1, 0x6, 0x6, 0x3, 0x16c, 0x5, 0x1, 0x8, 0x0, 0x4, 0x4, 0x9, 0x0, 0x6fc, 0x400, 0xfffffff9, 0xfffffffc, 0x0, 0x9, 0x80000001, 0x800, 0x5, 0x7, 0x3, 0x9, 0x81, 0x7, 0x10000, 0x2, 0x56d, 0x8, 0x4, 0x1, 0x4, 0xf92, 0x7, 0x3ba, 0x7, 0xce25, 0xfa, 0xa, 0x200, 0x8, 0x8e, 0x3, 0x1, 0x1000, 0x9, 0x8, 0x6, 0x7fffffff, 0x1, 0xfffffff7, 0x1, 0x5, 0x5, 0x33, 0x8, 0xfffffff7, 0x2, 0x3, 0xc, 0x10, 0x9, 0xd14, 0x7, 0x6, 0x5, 0x8, 0x511, 0xffff, 0x8001, 0x7ff, 0x5172b490, 0x6, 0x3, 0x4b5, 0xbf, 0x3, 0x99, 0x4, 0x5]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x20000, 0x1, 0x10, 0xffffffff, 0x0, {0x6, 0x2, 0x2, 0x8, 0x2, 0xfffffffb}, {0x6, 0x0, 0x101, 0x7, 0x3, 0x1}, 0x9, 0x1, 0x2c0}}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x9, 0x6, 0xffffffbb, 0x9, 0x0, 0x3, 0x3, 0x7ff, 0xc7, 0x7, 0x7ff, 0x3, 0x4, 0x80000000, 0x7ff, 0x80000000, 0x3, 0x6, 0x3, 0x5, 0x5, 0x5, 0x7fff, 0x3, 0x5, 0x80, 0x4, 0x5, 0x7, 0x1, 0x1, 0x3, 0x9, 0x48, 0x10, 0x16, 0x8001, 0xffffffff, 0x10, 0xff, 0x6, 0x9, 0x4, 0xe, 0x2040, 0x7, 0x9, 0x5aa1, 0x1, 0x3, 0x9af, 0x4, 0x9, 0x8, 0x7, 0xc, 0x800, 0xfffffff7, 0x8, 0xfffffeff, 0x800, 0x4, 0x1, 0xc8, 0x3, 0x4, 0x8, 0x73f1, 0x5, 0x7f, 0x11cc, 0x6, 0x9, 0x95, 0x5, 0xfd, 0x0, 0x4, 0x6, 0x6e, 0x258800, 0x6, 0x7ff, 0x48d0, 0x3, 0xd, 0x1, 0x7, 0x6, 0x5, 0x8000, 0x7ff, 0xffff, 0x8, 0x519c, 0x5, 0x0, 0x10000, 0x9d31, 0x8, 0x2, 0x6, 0x7, 0x6, 0x8, 0x0, 0xeaf4, 0x5, 0xfffffff1, 0x3a79e569, 0xffffffff, 0x400, 0x2, 0xc38a, 0x4, 0x2, 0x2, 0x5, 0x401, 0x0, 0x3, 0x4d55, 0xbe6, 0x2, 0x9, 0x800, 0x100, 0x3b, 0x7, 0x7ff, 0x7, 0x7fffffff, 0x1, 0x7, 0x6, 0x10, 0x1, 0x8, 0x4, 0x401, 0xe117, 0x7, 0xf5d, 0xfffffffb, 0x8, 0x2dd, 0x10, 0x2, 0x10000, 0x800, 0x8, 0x2, 0x8, 0x8001, 0xfffffffb, 0xc3, 0x7, 0xfaa1, 0x0, 0x80, 0x8, 0x1, 0xffffff35, 0x0, 0xfffffffc, 0x2, 0x0, 0x3ff, 0x19ee, 0x7fff, 0x9, 0x401, 0x8, 0xf111, 0x0, 0x2, 0x2, 0x1, 0x8, 0x3f34, 0x7ff, 0x4, 0x6, 0xfc25, 0x8, 0x9, 0x2, 0x5, 0x9c8b, 0xfffffff7, 0x9, 0x0, 0x7, 0x766, 0x1, 0xdbbb, 0x200, 0x9, 0x40, 0x7, 0x7, 0x5, 0x8, 0x0, 0x62710000, 0x4, 0x4, 0x404, 0x6, 0x7fffffff, 0x4, 0x2, 0x30000000, 0x7, 0x5a, 0x0, 0x10, 0x101, 0x400, 0x7fffffff, 0x0, 0x50, 0x9, 0x3a1, 0x4, 0x5, 0x4, 0x3, 0x800, 0xffffff81, 0x400, 0x425, 0x83, 0x3, 0x3, 0xdd0, 0x9, 0x4d98, 0x2, 0x0, 0x4, 0x4, 0x1ff, 0x2, 0xd, 0x3, 0x3, 0xe, 0x2, 0x5, 0x4, 0x2, 0x4, 0xbb1, 0x40000]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xd, 0x9, 0x4, 0x9, 0x4, 0x0, 0x1, 0x2, 0x7, 0x4, 0x0, 0x3ff, 0x1, 0x80, 0x1, 0x3, 0x1, 0x5, 0xc1, 0x8, 0x10000, 0x4, 0x9, 0x2, 0x8, 0xb4, 0x6, 0x6, 0xfffff801, 0x10001, 0x4, 0x6, 0x6, 0xf, 0x2, 0x1, 0xff, 0x9, 0x7fffffff, 0x7ff, 0x9, 0x8, 0x1, 0xb7, 0x80000001, 0x401, 0x80, 0x7, 0x7, 0x3, 0x9a, 0x5, 0x2, 0x7f, 0x9, 0x7fff, 0xffff6b5b, 0x5, 0x10000, 0xc, 0x8, 0x4, 0x200, 0xffff6639, 0x2, 0x9, 0x4, 0x5, 0xa2, 0x4, 0xa, 0xfffffffa, 0x800, 0xffff, 0x8000, 0x1c, 0x7, 0x5, 0x3, 0xe, 0x1ff, 0x6, 0x0, 0x67, 0x7, 0x5, 0x7, 0xc, 0x9, 0xb61, 0x101, 0x6, 0x401, 0x3da, 0x2, 0x8, 0x1000, 0x10, 0x9, 0x77a, 0x8, 0x5, 0x8, 0x7, 0x367b08ef, 0xf089, 0x1, 0x9, 0x7, 0x6, 0x80000001, 0x3, 0x1, 0xa, 0x7, 0xcaf, 0x2, 0x4e5fa8f, 0x5, 0x3, 0x8, 0x1, 0xfffffff9, 0x7, 0x2, 0x9, 0x1000, 0xfffffff7, 0xfffffffe, 0xf, 0x3b6, 0x463e8c6, 0x0, 0x9, 0x2, 0x6, 0x1, 0x7, 0x7, 0x9, 0x1ff, 0xfffffff8, 0x800, 0x6, 0x0, 0xa8b00000, 0x3, 0x8e, 0x6, 0x7, 0x56000000, 0x9, 0x0, 0xb667, 0x5, 0x81, 0x1, 0x5, 0xd, 0x7, 0x3ff, 0x0, 0x8, 0x8, 0xa4, 0x9712, 0x5, 0x0, 0xc70, 0xf, 0xf, 0x6, 0x8001, 0xcbd1, 0x5, 0x3, 0x21e5, 0x4, 0x7fff, 0x7, 0x40, 0x9, 0x10001, 0x80, 0x1, 0x6, 0xf1, 0x6, 0xfffffffd, 0x6, 0x9, 0xc07, 0x3, 0xa, 0x400, 0x9, 0xe, 0x13, 0x5, 0xb, 0x40, 0x4, 0xc405, 0x9, 0x5, 0xc, 0xfffffff7, 0x0, 0x7, 0x1ff, 0x81, 0x3, 0xf6d8, 0x400, 0x3, 0x2e, 0x9, 0xf4042cd1, 0x7, 0x0, 0x7ff, 0xf, 0xe, 0x8, 0x1, 0x4, 0x6, 0x8, 0x1000, 0x5, 0xa, 0x9, 0x5655, 0x0, 0xfffffffe, 0x3, 0xffffffff, 0x8000, 0x6, 0x5, 0x2, 0xd, 0x2, 0x1, 0x2, 0x625, 0x308, 0x7, 0x4, 0x6, 0x0, 0x9, 0x80000000, 0x0, 0x0, 0xea8b]}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x10001, 0x5, 0x0, 0xaab, 0x2, 0x2, 0xb, 0x1, 0x6d0, 0x80000001, 0x8, 0x6, 0xe57, 0xd7ed, 0x0, 0xe2c5, 0x1, 0x3, 0x7, 0x7, 0x4, 0xed4, 0x9, 0x7, 0x9e, 0x6, 0x1, 0xb7, 0x80, 0x9, 0x0, 0x9, 0x9, 0x9, 0x6, 0x81, 0x2, 0x9, 0xffff7012, 0x2, 0x2, 0xff, 0x5, 0x7fffffff, 0x2, 0x9, 0xbcc, 0x2, 0x2, 0xfffff460, 0x7, 0x8, 0xfffffffa, 0x8, 0xbda, 0x80000001, 0x9, 0xeb2e, 0x67, 0x2, 0x800, 0x0, 0x6, 0x96, 0xc, 0x8, 0xffff, 0x7, 0xfffffff9, 0x400, 0x1db, 0x8, 0x1, 0x1, 0x80000000, 0xe2, 0x6, 0x6, 0x4fa3, 0xd84, 0x10000, 0xffffff82, 0x5, 0x400, 0x1, 0xf, 0x7, 0x1ca, 0x8, 0x139539d5, 0x10000040, 0x8, 0x4, 0x8, 0x0, 0x489, 0x74f, 0x4, 0xcdd2, 0x10001, 0x16000000, 0x4000, 0x1, 0x55, 0x7, 0x101, 0x7, 0x3, 0x80000000, 0xfffffffc, 0x5f9b, 0xffffffff, 0x7, 0x7, 0x17, 0x6, 0x3, 0x911, 0x48, 0xa2, 0xfffffffd, 0x2c660, 0x7fffffff, 0x2, 0x3, 0x1, 0x4, 0xfffffff9, 0x9, 0x4f73e055, 0x5, 0x9, 0x4, 0x1000, 0x100, 0x8001, 0x5, 0x8, 0xe, 0x0, 0x1, 0x4, 0x5, 0xb, 0x3, 0x8001, 0x4, 0x9, 0x4, 0x7, 0x9, 0xf6, 0xb, 0x4da0, 0x6, 0x2, 0x0, 0x7, 0x278a2c3c, 0x3, 0x2, 0x0, 0x80000000, 0x9, 0xffffffff, 0xb0bbaf1, 0x5, 0x3, 0x10001, 0x40, 0x81, 0x7, 0x200, 0x5, 0x5, 0xe48, 0xfffffffe, 0x9, 0x6, 0x1, 0x7f, 0x0, 0x2be, 0x0, 0x2, 0x29, 0xffffff80, 0x2, 0x1, 0x4, 0x6b, 0x4919, 0x3fca, 0xe539, 0x1, 0x87fb, 0x4, 0x5, 0xa14, 0x0, 0x1000, 0x3, 0xffff, 0x0, 0xc, 0x3, 0xf517, 0xfffffff8, 0x10001, 0x6, 0x200, 0xf, 0xc6da, 0x9, 0x80000001, 0x3, 0x2, 0x2, 0x4, 0x80, 0x8, 0x7, 0x7ff, 0x7fffffff, 0xc7d0, 0x3400000, 0x5, 0x2, 0x7, 0x2, 0xffffff18, 0xfffffffd, 0x1, 0x9, 0xfffff801, 0x0, 0x3, 0xf5, 0x1, 0x0, 0x0, 0x4, 0xd, 0x5, 0x0, 0x2, 0x51, 0x1000, 0x8, 0x8, 0x2, 0x1ff, 0xffff, 0x5, 0x1]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0xff98}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x7fff, 0x69d, 0x0, 0x0, 0x0, 0x8, 0x9, 0x3477, 0x7, 0xd6, 0x1, 0x0, 0x4, 0x8, 0x7, 0x1, 0x0, 0x7, 0x3, 0x6, 0x8, 0x6, 0xffffffff, 0x1, 0x8, 0x9, 0x400, 0x800000, 0xffffff04, 0x4, 0x9, 0x6, 0x7ff, 0x3, 0xf8b, 0x7, 0x101, 0x2, 0x7, 0x5, 0x4, 0x2, 0xf867, 0x2, 0x5, 0x1aaf, 0x100, 0x1, 0x845, 0x10, 0xfffffff9, 0x2f326af2, 0x1, 0xffff0001, 0x8, 0x0, 0x101, 0x6, 0x9, 0x2, 0x5, 0x6, 0x80000000, 0x200, 0x9, 0xf, 0x2, 0x1, 0x42, 0x4, 0xf, 0x3, 0x81, 0xd, 0x35, 0x6, 0x3, 0x6, 0xfffffff9, 0x3, 0x6, 0x2, 0x800, 0x80000001, 0xae, 0xda, 0x6b, 0x2, 0x65, 0xfffffffc, 0x5, 0x0, 0x0, 0x0, 0x4a4f, 0x0, 0x5, 0xb1b3, 0xef, 0x80000000, 0x7104, 0xc, 0x3, 0x2, 0xd, 0x2, 0x4c06, 0x3fcb, 0xa0, 0x8000, 0x8, 0x7, 0x49e4eb69, 0x298c4bf3, 0x617, 0x0, 0x8, 0x8, 0xc3, 0x9ca7, 0x2c, 0x1, 0x7fffffff, 0x245780, 0x5, 0x19a0, 0x6, 0x1, 0x200, 0x3, 0x62, 0x3, 0x2, 0x7f, 0x81, 0x7, 0xffff, 0x8, 0xb517, 0x0, 0xffffff80, 0x7ff, 0x4, 0xfff, 0x800, 0x2577, 0x7, 0x9, 0x8, 0x80000000, 0x4, 0xc, 0x2, 0x4, 0xffffff01, 0xd, 0x69, 0x8, 0x1, 0x8, 0xcf1, 0xc83, 0xe, 0xbab, 0x4, 0xa2a, 0x6, 0x3, 0x8, 0x4, 0x6, 0x9, 0xfffeffff, 0xfff, 0x7, 0x0, 0x5, 0x5, 0x9, 0x2, 0x7, 0x3, 0xae2, 0x0, 0x235, 0x9, 0x2, 0x6, 0x1, 0x1, 0xbd, 0x619a, 0xa, 0x2, 0x6, 0x6, 0xf, 0x7fffffff, 0x6, 0x8, 0x4, 0x9, 0x9a5, 0x4, 0x3, 0x4, 0x4, 0x5, 0x8001, 0x0, 0x80, 0x8, 0x7fff, 0x7, 0x80000000, 0x0, 0x6, 0x9, 0x8, 0x5, 0x9, 0x9, 0x10000, 0xfffffffc, 0x5, 0x7, 0x2, 0x9, 0xe81b, 0x4, 0xffff, 0xfeff, 0x7, 0xff, 0x2, 0x1, 0x7, 0x5, 0xeb, 0xa8000000, 0x466, 0x3ff, 0x2, 0x401, 0x6, 0x2, 0x6, 0x9, 0xffffffc0, 0x2, 0x1, 0x1, 0xffffffff, 0x8, 0x80]}]]}, {0x1e, 0x6, "63cf48ead98846bd214a39356481ce401e989c3785549a750fe5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_mpls={0x124, 0xc, 0x0, 0x0, {{0x9}, {0x4c, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x5, 0x1ff, 0x8, 0xa34, 0x1}, 0x4}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4a4a3}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x800, 0xfffffe00, 0x10000001, 0x2, 0x1}, 0x2}}]}, {0xae, 0x6, "83df40a410c95c92e7829f002ffa5cdd41d2089ac7e3aa2ab9e7e71691636e31f07ece3a608f837bc59335f5c0f94fb9da0be8c804f4372b5a18a8bb904d92e252f264563808bbb79192a9ebd806654995fe6c88aafa46ea93e66744970041d99f71e6109908314aceba78f85b839a143bc1add9f1ab9a18cb295d58a9ed414be96596138e8a1404e85cbe5da9826a894cf19bf6120d74590e663ae7d2bd816d183aa424368a67926c8e"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_skbmod={0x12c, 0xc, 0x0, 0x0, {{0xb}, {0x20, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x5}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0xac80}]}, {0xe4, 0x6, "77f132e256f9fb9059c3487ff30fa64f7f4443ca1f341ad441607fb50d8ca4b99e58c68ca6479b4fd168eb0649d4a87606a5ba863618154ca151a9c73be3d26fba4da996f0604fb06cf4f3323d6610d12041985859d6ac4ea431354e4f2c3e21b3f9e0bb76ab092dfc389b4d41edcb8d8f907db0c31cd2cfe08f41e36ceec6f46baafb7c43e71975eb9156f4ad66089e7326ed8f72416b255527cc86715d8ac79802f9c68affe41f068b83f2ec998ead9856be8806d2516bf4d4947580369ae570dfe8c0b48ef8c5fd6bffefe8630cf8542922e6672d18ee83a545e36929c803"}, {0xc}, {0xc, 0x8, {0x2}}}}]}, @TCA_MATCHALL_ACT={0x68c, 0x2, [@m_ctinfo={0xc0, 0x16, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x9, 0x6, 0x7, 0x7ff, 0x7}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x101}]}, {0x71, 0x6, "5a1cf5588ed931c2d474f51fe50751e7e9ef12c45161b5ecbd2eeea5612faa2d6e11294dc0c465a165f11513cafebc73de495bc9f10d343fe26505d54f3a3325c8d1dd34afefb36f42311ea721a3878fb8fb03ca5ff64b2ad3fdce4000d2ecbaf2883420adf40d7493ca864a22"}, {0xc, 0x7, {0xec377200306db93d}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_bpf={0x40, 0xd, 0x0, 0x0, {{0x8}, {0x10, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0xa, 0x6, "98e13bf4dff3"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_bpf={0xd0, 0x10, 0x0, 0x0, {{0x8}, {0x80, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x3ff, 0x1, 0x6, 0x5}, {0x9, 0xc, 0x5, 0x8}, {0x3, 0x3, 0x3, 0x4}, {0x4, 0x4, 0x4, 0xce8}, {0xffff, 0x4, 0x6, 0xd}, {0x2, 0xf, 0x8, 0x1}, {0x2, 0x0, 0x80, 0xfff}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7d, 0x5, 0x994a270fb91efd82, 0x1, 0x5}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x200, 0x400, 0x0, 0x8, 0x3ff}}]}, {0x29, 0x6, "1fc62d81852e21e6309836de4a6bb94c64ebcc8b1314a9758f9363947d0db5e1fec550c92a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_nat={0xe4, 0x20, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x4, 0x5, 0x9e, 0x3}, @rand_addr=0x64010100, @private=0xa010102, 0xff, 0x1}}]}, {0x91, 0x6, "f3c6f22656ea5f05c2cfa76612b67e7a84bea660edd51cd1500c35d58af8724354c26460ab9e4b547b1760ee2f6a8c0b47289a6f7c6812c92beb5500b8fcfe4c55bf5805840b4567519dd56c70e6390126831d8f4f678bfc0c6dc8766cd9cff94f9b28a241a8bed42d80efc3560fc36d4e59dcf2d3114fa409e270c66ee81886cab6af0d70cf587371c3ea9ee4"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_gact={0x180, 0x19, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0xb09, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x3, 0x0, 0x7, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xb39, 0x3000000d}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0xac, 0x3, 0xffffff77, 0xd6}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1e14, 0x6}}]}, {0xff, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_nat={0x124, 0x1e, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xaa, 0x10000, 0x10000000, 0x0, 0x6110}, @multicast2, @multicast2, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xf936ec32, 0xfffffff8, 0x7, 0x6, 0x5}, @broadcast, @dev={0xac, 0x14, 0x14, 0x30}, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7c30, 0x8, 0x8, 0x28a8, 0x6}, @broadcast, @rand_addr=0x64010100, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8001, 0xd1, 0x2, 0x109, 0x1}, @multicast1, @multicast2, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xcb, 0x5, 0x8, 0x7, 0x84}, @multicast2, @private=0xa010102, 0xffffff00, 0x1}}]}, {0x33, 0x6, "6ae9492e25e1e93c7ddb4cd42bcfde24650ca5e225bc57a7ec53b17d3bb9f0dacaa51580133a76391c5818fa229f36"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x130, 0x9, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7fff}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x1}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}]}, {0xdd, 0x6, "447239f72290eb31d49ef9b1c75bb797682b81df877d42f3c72ba804e26dee5c7c92ea284406bc1015851f9b91b30bee9592512be23b898646d6655a264212360a4435bd8aff161886d26ee6782ee938a542355932cead4b12167990d718671375f71787f573a9a89d72a3a78ece6494c20096a69b1f7c43a13c22df1bc2c7705666c55151df92eb646f4259157c3f60c06a3a996a16b717f946aab597e2ec85fdec0d51e49fbb5ccd89f258cffea581aae951f92a322d4163a71d1d195dfc86fac00b667d0510e2fbdb6624dae24fd22381f185a606706dcb"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x6}]}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @TCA_CHAIN={0x8, 0xb, 0xd477003}, @TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x4374}, 0x1, 0x0, 0x0, 0x8840}, 0x40) 3m5.056837845s ago: executing program 4 (id=1031): r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f0000000780)={[{@dioread_lock}, {@noblock_validity}, {@stripe={'stripe', 0x3d, 0x9}}, {@init_itable}, {@auto_da_alloc}, {@grpjquota, 0x2e}, {@nouid32}, {@errors_remount}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4c2, &(0x7f0000000980)="$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") syz_usb_connect(0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000f94f51404919a5853aa3010203010902240001000000000904000002ff5d010009"], 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'veth1_to_batadv\x00'}}, 0x1e) r2 = socket$pppoe(0x18, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000001ff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) ustat(0x1, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x1000) connect$pppoe(r2, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000200)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, 'veth1_to_batadv\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'pim6reg0\x00'}}, 0x1e) io_uring_setup(0x1de0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x20821, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e24, @empty}, 0x1, 0x1, 0x1, 0x2}}, 0x26) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000002c0)={0x34, r7, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 3m4.546413139s ago: executing program 4 (id=1032): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 3m4.545879868s ago: executing program 42 (id=1032): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$eJzs3U1v28gdx/EfZfmxQFC0xSIIsvFs0gUcNFUkeeOFkR7KUpTNrSQKJF3Yp0W6sRdB5GybpEDjy9aXPgDtG+htL3voiyjQc899Az0WWLS3Ar2oIClKskRZip+Sdr8fI9GI/JPzJ4fRhBY5FAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAkOXUyuWKpYbX2tk1kzm1wG+eMj9d27zupoW7U+uVrPiPlpZ0PZ10/TuD2e/Ef93WzfTdTS3FL0s6+sY733z47WIhW/6UhM5Cr7vCF6+Onj7qdPafn622rnWW5S7FWCYqzLDUltvyQt9r2luu8ULfbG5slO9v10NT9xpuuBdGbtM4gVuI/MCsOXdNZXNz3bilPX+ntVWzG2428cPvV8vlDfPRYq/5739UCp1tr9HwWltJTDw7jlnsHyGu3TTm4Elnf31aknFQZZag6rSgarlarVSq1crGg80HH5bLxbEJ5REaixgctG9P4+MqXdAnN3B+hbj//7slNbSklna0K5P746imQL6aE+b3ZP3/+/fdU+sd7v+zXv76YPYNJf3/rfTdrUn9/4RcjEyyQN4ca8L0s/280Csd6akeqaOO9vX8Yta7enEZXu7PllSUPIXy5akpW1tyZXpTjDa1oQ2V9bG2VVcoo7o8NeQq1J5CRXLVTNokkCtbkXwFMlqTo7syqmhTm1qXkauS9uRrRy1tqSZb/+52uwd6kuz39VNyVBZUmSWo2D8Gx4Mm9f8//Txd4vX6f/z/6R87M8QAb1y3d/4/2VzexNXLywgAAAAAAFw0K/ntu5V8d/+upK7qXsMtv+m0AAAAAADABUq++b8Zv8zHpXdlTTj/7159bgAAAAAA4GJYyT12lqSV5KJ+a3An1CwXAeTeHAAAAAAAAN4uyff/txakbjK02qqs1zr/BwAAAAAA/wN+OzTGfjEbY7ebfa1fkBS2F60//3NRwbx13N79rnVox3Psw17M2BUAUf2GVVQ6UG8yXu+CpOSd4960euMD9wbBtNKBfaWvDqaN9W8FIwkszGW/vshJ4NrRUAIbxd47/V7vpTHv9ep9fFRQMietZaXuNdyS4zceVmTb1wqRuxv94tmTX0pBfzsPnnT2S5981nmc5HIcTzo+jPP4/EQ6hWm5vEzGW0juucjb4mXVsyp/12quWEm95Wz752QfFoYrmm37f63bacztlfR15ShrAVm/6hUqpaTJBlufjA5hDbKojG55XkNMyGIpyeJOGnNn7U76kuWXtsLS9+akamm8DYLhLKrDWUzfF9a/xvbFlCziY2E9zuIv8YomZLH+elmMtQgAvCkHg14oGcR8fIz90X73LJ9y03v3H56s5eUfu+kNh3NSsffdRHoT4qR+RfEn+loatpCO4l68kfOJXu71K0ua8IlePkfvFtf1p8EzkHpp9+YU+1n8p9vtPqwk9f5hpFf9Il7gi4n1ho3qXLwL7788/FkyAH7s0/1P959Vq+sb5Q/K5QdVzSeb0Xuh7wEA5Jj+jJ2TEUuD/qzfd3/QP6t+/I/309KJfvdb/UsKSvpEn6mjx7qXPUJgNb/elaHLEO6Nn7XGscvSaGxF9yae1SV96VBstR87r2yRk/9fGMSuX3YzAABwpW5P6YdH+/+8c/d72Xn32o3c8+6TffnoE4InxVaueE8AAPD14QZfWSvRb6wg8NofVzY3K3a07ZrAd35sAq+25RqvFbmBs223tlzTDvzId/yGaQda9GpuaMKddtsPIlP3A9P2Q283efK76T36PXSbdivynLDdcO3QNY7fimwnMjUvdEx750cNL9x2g2ThsO06Xt1z7MjzWyb0l+W4JWNC1x0K9GpuK/LqXlxsmXbgNe1gz/zEb+w0XVNzQyfw2pGfrjCry2vV/aCZrLak7mkPOgQA4Gvjxaujp486nf3npxSOlRay69FOCV7IW+Eb3kQAADCCXhoAAAAAAAAAAAAAAAAAAAAAgLffLPf/nVrIbgrMpswrJ1jqT/n5tZnWbGkw5cu/nSvDMxQKo1N6I+12py/+17RQzItZjgsLkjrZ7h+OOb7QrVidKVhpoXjx+3BZyjsSLq3wg4OTx+FYTDwzd9Zivy2K5//nkFd49uWEWdOPqMWT+3DhtA08WShKer5wjia4+s8iAFfrvwEAAP//pJI9bA==") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 3m0.569357941s ago: executing program 3 (id=1050): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') socket$phonet_pipe(0x23, 0x5, 0x2) socket$phonet_pipe(0x23, 0x5, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0xc46, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x82e}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a00000000000000000000000000000000000000000000000000000000000000020001000000000000000702000000ff05000500000000000a00000000000000ff0100000000000000000000000000010000000000000000020008"], 0x80}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x2000000000000122, &(0x7f0000000780)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000840000007b8af8ff04000000bfa200000000000007020000f8ffffffb703000008000000b704b3723a70b700000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$binfmt_script(r5, 0x0, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0x2}], 0x1, 0x0, 0x0, 0x2c}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r7 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r6, 0x5) r8 = accept4$inet6(r6, 0x0, 0x0, 0x80000) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r7, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)='1', 0x1}], 0x1) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000009c0)={[{@dioread_lock}, {@nouid32}, {@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7ff}}, {@auto_da_alloc}, {@journal_ioprio, 0x2e}, {@nouid32}, {@errors_remount}, {@data_journal}, {@grpid}], [], 0x2c}, 0x1, 0x4c2, &(0x7f0000000280)="$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") 3m0.378666822s ago: executing program 3 (id=1052): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 3m0.149209524s ago: executing program 3 (id=1053): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mknod$loop(0x0, 0x100000000000600d, 0x1) 3m0.092466764s ago: executing program 3 (id=1054): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r6, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r7, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r8 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$SG_GET_REQUEST_TABLE(r9, 0x2201, &(0x7f00000018c0)) 2m59.693830736s ago: executing program 3 (id=1057): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000e70f00000700000000002000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r0, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) write$cgroup_pid(r0, &(0x7f00000031c0), 0x12) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_usb_connect(0x2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000280)={r4, 0x11, 0x6}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@getchain={0x2c, 0x11, 0x839, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r7}, [{0x8, 0xb, 0x4}]}, 0x2c}}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)) dup(0xffffffffffffffff) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20000023896) r10 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r10, 0x5404, &(0x7f0000000000)={0xb29, 0x0, 0xfffffffe, 0x0, 0x0, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/16], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r12}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 2m59.438725528s ago: executing program 3 (id=1060): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000307ffdf0800000008000000e2ffffff", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r2 = gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="85000000d3f400009600000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$binfmt_register(r3, &(0x7f0000000140)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x1000, 0x3a, '\xfc\xec\xd1\xcb\x9a\x964\xf4\xa2\x89f\x12\x11\fG\\x00#\x00', 0x3a, '/dev\x14bus/usb/00#/00#\x00', 0x3a, './file0'}, 0x51) process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_io_uring_setup(0x6454, &(0x7f00000002c0)={0x0, 0x8ed6b, 0x13290}, &(0x7f0000000440), &(0x7f0000000080)) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000480)=""/135, 0x87) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000e2ff00000000000000000000000051f3109b1967da4ab653551a8c88fd0c6abed18c6099123745660729b395fd05769b14469577004d239e61d70e1745428316ae22dcd32efa0391d6011f612b79dba17b0240bed28619f71b66fc"], 0x48) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000990000000b00010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r7 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r7, &(0x7f0000000980)={&(0x7f0000001d80)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)=""/198, 0xc6}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000a40)=""/156, 0x9c}, {&(0x7f0000000c00)=""/247, 0xf7}, {&(0x7f0000000200)}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$MAP_DELETE_BATCH(0x18, 0x0, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000100)=@req3, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2m59.438442198s ago: executing program 43 (id=1060): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000307ffdf0800000008000000e2ffffff", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r2 = gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="85000000d3f400009600000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$binfmt_register(r3, &(0x7f0000000140)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x1000, 0x3a, '\xfc\xec\xd1\xcb\x9a\x964\xf4\xa2\x89f\x12\x11\fG\\x00#\x00', 0x3a, '/dev\x14bus/usb/00#/00#\x00', 0x3a, './file0'}, 0x51) process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_io_uring_setup(0x6454, &(0x7f00000002c0)={0x0, 0x8ed6b, 0x13290}, &(0x7f0000000440), &(0x7f0000000080)) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000480)=""/135, 0x87) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000e2ff00000000000000000000000051f3109b1967da4ab653551a8c88fd0c6abed18c6099123745660729b395fd05769b14469577004d239e61d70e1745428316ae22dcd32efa0391d6011f612b79dba17b0240bed28619f71b66fc"], 0x48) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000990000000b00010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r7 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r7, &(0x7f0000000980)={&(0x7f0000001d80)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)=""/198, 0xc6}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000a40)=""/156, 0x9c}, {&(0x7f0000000c00)=""/247, 0xf7}, {&(0x7f0000000200)}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$MAP_DELETE_BATCH(0x18, 0x0, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000100)=@req3, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2m35.599302844s ago: executing program 7 (id=1196): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/asound/seq/clients\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x42, 0x0) pselect6(0x40, &(0x7f0000000580), 0x0, &(0x7f0000000d00)={0xd0}, 0x0, 0x0) close(r2) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r3, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) 2m35.506087024s ago: executing program 7 (id=1197): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000e70f00000700000000002000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r0, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) write$cgroup_pid(r0, &(0x7f00000031c0), 0x12) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_usb_connect(0x2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000280)={r4, 0x11, 0x6}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@getchain={0x2c, 0x11, 0x839, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r7}, [{0x8, 0xb, 0x4}]}, 0x2c}}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)) dup(0xffffffffffffffff) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20000023896) r10 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r10, 0x5404, &(0x7f0000000000)={0xb29, 0x0, 0xfffffffe, 0x0, 0x0, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/16], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000201000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r12}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 2m34.344557301s ago: executing program 7 (id=1206): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000f9ff00000000002b"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) getpgrp(0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x667, &(0x7f00000002c0)="$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") sigaltstack(&(0x7f0000000080)={&(0x7f0000000c00)=""/146, 0x0, 0x92}, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r5, &(0x7f0000000000)='./file0\x00', 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a00)='jbd2_checkpoint_stats\x00', r2, 0x0, 0x4}, 0x18) mknod$loop(0x0, 0x100000000000600d, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000001c40)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x6, 0x7d07, {{0x2b, 0x4, 0x0, 0x35, 0xac, 0x65, 0x0, 0x1, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x6, 0x9, "5d2502468086e4"}, {0x0, 0x5, "e95985"}, {0x0, 0xf, "d5ebf09fbbcbdd8f941026c627"}, {0x5, 0xd, "61b53ffed72947efd35cc1"}, {0x7, 0x8, "75ba8bed096e"}, {0x2, 0x3, 'H'}]}, @generic={0x86, 0x12, "a3bcb4b29bb4dbcb881dd786bbf535eb"}, @timestamp_addr={0x44, 0x14, 0x22, 0x1, 0x2, [{@remote, 0xb}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x20, 0xe1, 0x0, 0xd, [0x0, 0x80000000, 0x7f, 0x8, 0x5, 0x0, 0x27]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x2, 0x5, 'a6D'}, {0x5, 0xb, "ea86afd9aaa3a8d379"}]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@bridge_delneigh={0x38, 0x1d, 0x2, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0x0, r6, 0x0, 0x0, 0x761f2e424b08527}, [@NDA_PROTOCOL={0x5, 0xc, 0x34}, @NDA_NH_ID={0x8, 0xd, 0x9}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}]}, 0x38}, 0x1, 0x0, 0x0, 0x18}, 0x4010) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") r7 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$SG_GET_REQUEST_TABLE(r8, 0x2201, &(0x7f00000018c0)) 2m34.037173783s ago: executing program 7 (id=1209): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x5) ppoll(&(0x7f00000001c0)=[{r0, 0x2}], 0x1, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000380)="cf81bf", 0x3}], 0x10000058}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1600) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001f80), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100fdfffffffcdbdf25280000000a4bd55c70616e3000000006000600"], 0x30}}, 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x10008c0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x253, &(0x7f00000004c0)="$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") listen(0xffffffffffffffff, 0x0) r3 = gettid() r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r4, &(0x7f0000000200)=""/209, 0xd1) syz_clone3(&(0x7f0000000940)={0x200, &(0x7f00000003c0), 0x0, 0x0, {0x3}, 0x0, 0x0, &(0x7f0000000840)=""/186, &(0x7f0000000900)=[r3, r3], 0x2}, 0x58) 2m33.107204368s ago: executing program 7 (id=1223): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) 2m32.78290586s ago: executing program 7 (id=1239): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mknod$loop(0x0, 0x100000000000600d, 0x1) 2m32.78281002s ago: executing program 44 (id=1239): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mknod$loop(0x0, 0x100000000000600d, 0x1) 4.090757586s ago: executing program 1 (id=3805): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800006, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x13) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x3cb, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x1}, 0x8) 3.947358317s ago: executing program 1 (id=3808): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7ffffffffffff, &(0x7f0000000200)={[{@resuid}, {@delalloc}, {@nouid32}, {@commit={'commit', 0x3d, 0x5}}, {@norecovery}]}, 0x9, 0x613, &(0x7f0000000d80)="$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") 3.888180737s ago: executing program 1 (id=3810): syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001900)) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000700)={0x0, "f0176c04daeeae36e66c27a087f4a4c936987def00657e2ca9bfd8ef1caacc368637ae59c0b06ded2010b44fde59071c58350e27c03bb4abbda22349eef8fcbf", 0x1d}, 0x48, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0xc, 0x4}, {0x9, 0x1}]}, 0x14, 0x0) 3.799843768s ago: executing program 1 (id=3813): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x2, 0x500, &(0x7f0000000500)="$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") syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000180)='./file1\x00', r0, r1) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000700)={0x0, "f0176c04daeeae36e66c27a087f4a4c936987def00657e2ca9bfd8ef1caacc368637ae59c0b06ded2010b44fde59071c58350e27c03bb4abbda22349eef8fcbf", 0x1d}, 0x48, 0x0) r2 = add_key$keyring(0x0, &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0xc, 0x4}, {0x9, 0x1}]}, 0x14, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)="fb9c", 0xfffff, r2) 3.169025091s ago: executing program 1 (id=3819): syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2008803, &(0x7f0000000080), 0x1, 0x63d, &(0x7f0000000100)="$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") 2.682788204s ago: executing program 2 (id=3829): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002"], 0x80}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6e}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={r3, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000002100)={0x0, 0x3c, "fe7261f4938ab5a8a353a19c6086a953db52a89faa01d14ee09956c9b0b9ca74c75f501a6a8f4c01872d031b31d85ca6da4018dede3b5fc21aaedc2c"}, &(0x7f0000002180)=0x44) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002980)={0x0, 0x41, "cea1efc2d6a31cf2520e077eaa5a818650ee18dd63c70424d416360fbb689eb4b75ca7ac14559ad9986b43a197e780c587d88e18575b3a222c766a2719814c4f47"}, &(0x7f0000002a00)=0x49) unshare(0x20020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r4 = socket$caif_seqpacket(0x25, 0x5, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="120000000200000008000000ebd00000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000006a3df47ce9282aff6bd90929d87ffc09701ceb4263b3e9150c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1e48, &(0x7f0000000440)=[{0x0, 0x8, 0x7c, 0x9}]}) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) r7 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, 0xffffffffffffffff, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) syz_clone3(&(0x7f0000000d40)={0x400, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[0x0], 0x1}, 0x58) sendmsg(r4, &(0x7f0000000240)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @multicast1}, 0x2, 0x1, 0x4, 0x4}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1a8}, 0x50) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/file1\x00', 0x1c0) r8 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r8, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbff}, 0xc) close(0x3) 2.553482245s ago: executing program 2 (id=3831): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = gettid() sched_getscheduler(r1) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000002480)=ANY=[], 0x1, 0x11f4, &(0x7f0000001280)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) ioctl$FS_IOC_RESVSP(r2, 0x4030582a, &(0x7f0000000300)={0x113e, 0x0, 0x0, 0x10000}) 2.450668655s ago: executing program 1 (id=3832): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYBLOB="00000000000000000000000000000000000000000c2138c1e066a9cee2b4b674993f9de597008dea0956759c7cedec7b28e2baee4ab5fa77ede2638ab21deebe3f2d04769920fc5785826c004fa32ec8cdb8597b7501f0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{}, {0xe}, 0x3, 0x4}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) listen(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2405}, 0x0, 0x0, 0xffffffffffffffff, 0xd) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semctl$SEM_STAT_ANY(0x0, 0x4, 0x14, 0x0) 2.450183286s ago: executing program 45 (id=3832): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYBLOB="00000000000000000000000000000000000000000c2138c1e066a9cee2b4b674993f9de597008dea0956759c7cedec7b28e2baee4ab5fa77ede2638ab21deebe3f2d04769920fc5785826c004fa32ec8cdb8597b7501f0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{}, {0xe}, 0x3, 0x4}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) listen(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2405}, 0x0, 0x0, 0xffffffffffffffff, 0xd) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semctl$SEM_STAT_ANY(0x0, 0x4, 0x14, 0x0) 2.080146387s ago: executing program 0 (id=3839): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x92dcd0, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000001c0), 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)='$', 0x1, 0x30040090, 0x0, 0x0) 2.078227197s ago: executing program 2 (id=3840): r0 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) r1 = openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000b00)={0x7c, 0x0, 0x1, 0x70bd28, 0x25dfdbf9, {{}, {@void, @val={0xc, 0x99, {0x100, 0x57}}}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x10, 0xcd, [0x9, 0x5, 0x6, 0x5, 0x80, 0x3]}, @NL80211_ATTR_FRAME={0x48, 0x33, @reassoc_req={{{0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x7}, @device_a, @device_b, @initial, {0x1, 0xff0}}, 0x10, 0x9, @device_b, {0x0, 0x20, @random="eaa39a2498f9fc82421a618c03ca4f6408e01c66a7270df37785f6adc8d35676"}, @void, @void}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4840}, 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f0000000080), &(0x7f0000000180)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, &(0x7f0000000dc0)={0x60c, "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"}) write$UHID_CREATE2(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a00000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x1, 0x7}, 0x0, 0x0, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000002300), 0x0, 0x14a042) close_range(r2, 0xffffffffffffffff, 0x0) close(r1) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000100), &(0x7f0000000140), 0x0) r7 = openat$binfmt(0xffffffffffffff9c, r0, 0x2, 0x0) write(r7, &(0x7f0000000180)="01010101", 0x4) close(r7) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000280), &(0x7f00000002c0), 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1ff) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000700)={[&(0x7f0000000380)='\\,@{}$^-\xd7\'\xc4.!&\\\x00', &(0x7f0000000480)='-(+^(.\x00', &(0x7f00000004c0)='))\'}@{\x00', &(0x7f0000000900)='\x00\xcb\x00\x00\xdd\x94\xacp\xd7\xb2\x119\x18Sq\xf2?F\x99\xdf\x01\x9e\xd5\xd6\xae\x12./\xe3\xd3\xe5?\xadB\xfb\x8f\xe5]\xd1}Jh\xdc\xac\xe9\x8a\x94\xba\xb4\xa0\x8e\xa2\xb6\xd2\xa2\r\x90\xdcx\xa1\x80\xf9\xba\xd3\xb3\x15\xbe\x1a`\v\xed\xaeK?\x10\xae\x11i\xde\x93\xa8?\xe1\xbbyj\r\xaa\xdeql\xfe\fs\x8f\xe8\xa4J\xe0\xec]\x940xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x4c, &(0x7f0000000300), 0x4) write$binfmt_elf64(r6, &(0x7f0000000580)=ANY=[], 0x78) recvmmsg(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/8, 0xc}}], 0x4b, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_ifreq(r5, 0x8929, &(0x7f00000002c0)={'veth0_macvtap\x00', @ifru_flags=0x8000}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) getsockopt$sock_buf(r4, 0x1, 0x1c, 0x0, &(0x7f0000000040)) r7 = getpid() setreuid(0xee00, 0x0) syz_pidfd_open(r7, 0x0) setns(0xffffffffffffffff, 0x10000000) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3b, 0x8, 0x4, 0x0, 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x2, @perf_bp={0x0, 0x2}, 0x8a90, 0x10000000, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.045936624s ago: executing program 2 (id=3853): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x42, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') pselect6(0x40, &(0x7f0000000580), 0x0, &(0x7f0000000d00)={0xd0}, 0x0, 0x0) close(r2) close(r1) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) 889.740285ms ago: executing program 6 (id=3855): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x2, 0x500, &(0x7f0000000500)="$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") syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000180)='./file1\x00', r0, r1) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000700)={0x0, "f0176c04daeeae36e66c27a087f4a4c936987def00657e2ca9bfd8ef1caacc368637ae59c0b06ded2010b44fde59071c58350e27c03bb4abbda22349eef8fcbf", 0x1d}, 0x48, 0x0) r2 = add_key$keyring(&(0x7f0000000440), 0x0, 0x0, 0x0, 0xfffffffffffffffc) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0xc, 0x4}, {0x9, 0x1}]}, 0x14, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)="fb9c", 0xfffff, r2) 788.663105ms ago: executing program 6 (id=3856): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800006, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x3cb, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x1}, 0x8) 724.051265ms ago: executing program 6 (id=3857): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100100, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) openat$full(0xffffffffffffff9c, 0x0, 0x120001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, 0x0, 0x0) 673.454895ms ago: executing program 9 (id=3858): bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = gettid() openat$binfmt_register(0xffffff9c, 0x0, 0x1, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000001d80)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)=""/198, 0xc6}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000a40)=""/156, 0x9c}, {&(0x7f0000000c00)=""/247, 0xf7}, {&(0x7f0000000200)}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x7}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_DELETE_BATCH(0x18, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000100)=@req3, 0x1c) 672.939866ms ago: executing program 6 (id=3859): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001900)) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000700)={0x0, "f0176c04daeeae36e66c27a087f4a4c936987def00657e2ca9bfd8ef1caacc368637ae59c0b06ded2010b44fde59071c58350e27c03bb4abbda22349eef8fcbf", 0x1d}, 0x48, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0xc, 0x4}, {0x9, 0x1}]}, 0x14, 0x0) 652.076896ms ago: executing program 6 (id=3860): r0 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) r1 = openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000b00)={0x7c, 0x0, 0x1, 0x70bd28, 0x25dfdbf9, {{}, {@void, @val={0xc, 0x99, {0x100, 0x57}}}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x10, 0xcd, [0x9, 0x5, 0x6, 0x5, 0x80, 0x3]}, @NL80211_ATTR_FRAME={0x48, 0x33, @reassoc_req={{{0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x7}, @device_a, @device_b, @initial, {0x1, 0xff0}}, 0x10, 0x9, @device_b, {0x0, 0x20, @random="eaa39a2498f9fc82421a618c03ca4f6408e01c66a7270df37785f6adc8d35676"}, @void, @void}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4840}, 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f0000000080), &(0x7f0000000180)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, &(0x7f0000000dc0)={0x60c, "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"}) write$UHID_CREATE2(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a00000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x1, 0x7}, 0x0, 0x0, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000002300), 0x0, 0x14a042) close_range(r2, 0xffffffffffffffff, 0x0) close(r1) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000100), &(0x7f0000000140), 0x0) r7 = openat$binfmt(0xffffffffffffff9c, r0, 0x2, 0x0) write(r7, &(0x7f0000000180)="01010101", 0x4) close(r7) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) close(0xffffffffffffffff) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000280), &(0x7f00000002c0), 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1ff) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000700)={[&(0x7f0000000380)='\\,@{}$^-\xd7\'\xc4.!&\\\x00', &(0x7f0000000480)='-(+^(.\x00', &(0x7f00000004c0)='))\'}@{\x00', &(0x7f0000000900)='\x00\xcb\x00\x00\xdd\x94\xacp\xd7\xb2\x119\x18Sq\xf2?F\x99\xdf\x01\x9e\xd5\xd6\xae\x12./\xe3\xd3\xe5?\xadB\xfb\x8f\xe5]\xd1}Jh\xdc\xac\xe9\x8a\x94\xba\xb4\xa0\x8e\xa2\xb6\xd2\xa2\r\x90\xdcx\xa1\x80\xf9\xba\xd3\xb3\x15\xbe\x1a`\v\xed\xaeK?\x10\xae\x11i\xde\x93\xa8?\xe1\xbbyj\r\xaa\xdeql\xfe\fs\x8f\xe8\xa4J\xe0\xec]\x940x0}) socket$kcm(0x10, 0x2, 0x0) sendto$packet(r2, &(0x7f0000000100)="f257a8ea7bc273dfaeab96850806", 0x2a, 0x0, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r5 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r5, &(0x7f0000000000)={0x1d, r4}, 0x10) socket(0x10, 0x803, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r9, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000040000000000", @ANYRES32=r10, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r11, 0x4b47, &(0x7f0000000080)={0x0, 0x7f, 0xf3d}) 266.160168ms ago: executing program 9 (id=3866): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x2, 0x500, &(0x7f0000000500)="$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") syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000180)='./file1\x00', r0, r1) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000700)={0x0, "f0176c04daeeae36e66c27a087f4a4c936987def00657e2ca9bfd8ef1caacc368637ae59c0b06ded2010b44fde59071c58350e27c03bb4abbda22349eef8fcbf", 0x1d}, 0x48, 0x0) r2 = add_key$keyring(&(0x7f0000000440), 0x0, 0x0, 0x0, 0xfffffffffffffffc) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0xc, 0x4}, {0x9, 0x1}]}, 0x14, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)="fb9c", 0xfffff, r2) 150.603969ms ago: executing program 2 (id=3867): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = gettid() sched_getscheduler(r2) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000002480)=ANY=[], 0x1, 0x11f4, &(0x7f0000001280)="$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") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) ioctl$FS_IOC_RESVSP(r3, 0x4030582a, &(0x7f0000000300)={0x113e, 0x0, 0x0, 0x10000}) 149.778209ms ago: executing program 9 (id=3868): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800006, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x13) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x3cb, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x1}, 0x8) 87.112719ms ago: executing program 5 (id=3833): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000fd0f000003"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r1}, &(0x7f0000000680), &(0x7f00000006c0)=r2}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x24c02, 0x0) listen(r0, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) unshare(0x28000400) r6 = socket(0x2a, 0x2, 0x0) getsockname$packet(r6, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)={0xbc, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}}}]}, @CTA_EXPECT_MASK={0x30, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @remote}}}]}, @CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @local}}}]}]}, 0xbc}}, 0x0) 49.440139ms ago: executing program 0 (id=3869): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100100, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) openat$full(0xffffffffffffff9c, 0x0, 0x120001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, 0x0, 0x0) 610.04µs ago: executing program 5 (id=3870): syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001900)) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000700)={0x0, "f0176c04daeeae36e66c27a087f4a4c936987def00657e2ca9bfd8ef1caacc368637ae59c0b06ded2010b44fde59071c58350e27c03bb4abbda22349eef8fcbf", 0x1d}, 0x48, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0xc, 0x4}, {0x9, 0x1}]}, 0x14, 0x0) 0s ago: executing program 5 (id=3871): bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = gettid() openat$binfmt_register(0xffffff9c, 0x0, 0x1, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000001d80)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)=""/198, 0xc6}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000a40)=""/156, 0x9c}, {&(0x7f0000000c00)=""/247, 0xf7}, {&(0x7f0000000200)}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x7}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_DELETE_BATCH(0x18, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000100)=@req3, 0x1c) kernel console output (not intermixed with test programs): 0246 ORIG_RAX: 0000000000000085 [ 303.047755][T17531] RAX: ffffffffffffffda RBX: 00007fbac1945fa0 RCX: 00007fbac1780809 [ 303.047783][T17531] RDX: 000000000000070d RSI: 100000000000600d RDI: 0000000000000000 [ 303.047794][T17531] RBP: 00007fbabfdf70a0 R08: 0000000000000000 R09: 0000000000000000 [ 303.047805][T17531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.047816][T17531] R13: 0000000000000001 R14: 00007fbac1945fa0 R15: 00007ffdaac2db08 [ 303.047831][T17531] [ 303.158644][T17536] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2612'. [ 303.406633][T17558] FAULT_INJECTION: forcing a failure. [ 303.406633][T17558] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.406709][T17558] CPU: 1 UID: 0 PID: 17558 Comm: syz.6.2619 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 303.430197][T17558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 303.430212][T17558] Call Trace: [ 303.430220][T17558] [ 303.430273][T17558] dump_stack_lvl+0xf2/0x150 [ 303.430296][T17558] dump_stack+0x15/0x20 [ 303.430313][T17558] should_fail_ex+0x223/0x230 [ 303.430341][T17558] should_fail+0xb/0x10 [ 303.430409][T17558] should_fail_usercopy+0x1a/0x20 [ 303.430509][T17558] _copy_from_user+0x1e/0xb0 [ 303.430582][T17558] kstrtouint_from_user+0x76/0xe0 [ 303.430607][T17558] ? 0xffffffff81000000 [ 303.430619][T17558] ? selinux_file_permission+0x22a/0x360 [ 303.430648][T17558] proc_fail_nth_write+0x4f/0x150 [ 303.430702][T17558] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 303.430721][T17558] vfs_write+0x281/0x920 [ 303.430747][T17558] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 303.430777][T17558] ? __fget_files+0x17c/0x1c0 [ 303.430818][T17558] ksys_write+0xe8/0x1b0 [ 303.430846][T17558] __x64_sys_write+0x42/0x50 [ 303.430872][T17558] x64_sys_call+0x287e/0x2dc0 [ 303.430912][T17558] do_syscall_64+0xc9/0x1c0 [ 303.430928][T17558] ? clear_bhb_loop+0x55/0xb0 [ 303.430944][T17558] ? clear_bhb_loop+0x55/0xb0 [ 303.430960][T17558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.431031][T17558] RIP: 0033:0x7fbac177f2bf [ 303.431045][T17558] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 8e 02 00 48 [ 303.431063][T17558] RSP: 002b:00007fbabfdf7050 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 303.431081][T17558] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbac177f2bf [ 303.431092][T17558] RDX: 0000000000000001 RSI: 00007fbabfdf70b0 RDI: 0000000000000003 [ 303.431148][T17558] RBP: 00007fbabfdf70a0 R08: 0000000000000000 R09: 0000000000000000 [ 303.431160][T17558] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 303.431172][T17558] R13: 0000000000000000 R14: 00007fbac1945fa0 R15: 00007ffdaac2db08 [ 303.431188][T17558] [ 303.710163][T17581] FAULT_INJECTION: forcing a failure. [ 303.710163][T17581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.723276][T17581] CPU: 1 UID: 0 PID: 17581 Comm: syz.6.2627 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 303.733725][T17581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 303.733739][T17581] Call Trace: [ 303.733746][T17581] [ 303.733755][T17581] dump_stack_lvl+0xf2/0x150 [ 303.733780][T17581] dump_stack+0x15/0x20 [ 303.733796][T17581] should_fail_ex+0x223/0x230 [ 303.733874][T17581] should_fail+0xb/0x10 [ 303.767616][T17581] should_fail_usercopy+0x1a/0x20 [ 303.772653][T17581] _copy_from_user+0x1e/0xb0 [ 303.772675][T17581] kstrtouint_from_user+0x76/0xe0 [ 303.782258][T17581] ? 0xffffffff81000000 [ 303.782273][T17581] ? selinux_file_permission+0x22a/0x360 [ 303.792030][T17581] proc_fail_nth_write+0x4f/0x150 [ 303.797114][T17581] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 303.797136][T17581] vfs_write+0x281/0x920 [ 303.797205][T17581] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 303.797238][T17581] ? __fget_files+0x17c/0x1c0 [ 303.797259][T17581] ksys_write+0xe8/0x1b0 [ 303.797284][T17581] __x64_sys_write+0x42/0x50 [ 303.826081][T17581] x64_sys_call+0x287e/0x2dc0 [ 303.826108][T17581] do_syscall_64+0xc9/0x1c0 [ 303.826127][T17581] ? clear_bhb_loop+0x55/0xb0 [ 303.826147][T17581] ? clear_bhb_loop+0x55/0xb0 [ 303.826211][T17581] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.826237][T17581] RIP: 0033:0x7fbac177f2bf [ 303.826252][T17581] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 8e 02 00 48 [ 303.826270][T17581] RSP: 002b:00007fbabfdf7050 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 303.826293][T17581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbac177f2bf [ 303.826304][T17581] RDX: 0000000000000001 RSI: 00007fbabfdf70b0 RDI: 0000000000000003 [ 303.826315][T17581] RBP: 00007fbabfdf70a0 R08: 0000000000000000 R09: 0000000000000000 [ 303.826325][T17581] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 303.826336][T17581] R13: 0000000000000000 R14: 00007fbac1945fa0 R15: 00007ffdaac2db08 [ 303.826412][T17581] [ 304.271185][T17563] FAULT_INJECTION: forcing a failure. [ 304.271185][T17563] name fail_futex, interval 1, probability 0, space 0, times 1 [ 304.284057][T17563] CPU: 0 UID: 0 PID: 17563 Comm: syz.0.2620 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 304.294490][T17563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 304.294505][T17563] Call Trace: [ 304.294511][T17563] [ 304.294518][T17563] dump_stack_lvl+0xf2/0x150 [ 304.294557][T17563] dump_stack+0x15/0x20 [ 304.294572][T17563] should_fail_ex+0x223/0x230 [ 304.294596][T17563] should_fail+0xb/0x10 [ 304.294683][T17563] get_futex_key+0x109/0x740 [ 304.333007][T17563] futex_wake+0x7d/0x330 [ 304.337460][T17563] ? _raw_spin_unlock_bh+0x36/0x40 [ 304.342588][T17563] ? release_sock+0x117/0x150 [ 304.342662][T17563] do_futex+0x2ab/0x370 [ 304.351497][T17563] mm_release+0xb7/0x1e0 [ 304.351524][T17563] exit_mm_release+0x25/0x30 [ 304.360388][T17563] exit_mm+0x38/0x190 [ 304.364397][T17563] do_exit+0x55e/0x17f0 [ 304.364425][T17563] do_group_exit+0x102/0x150 [ 304.364479][T17563] ? get_signal+0xeb1/0x1000 [ 304.364499][T17563] get_signal+0xeb9/0x1000 [ 304.364521][T17563] arch_do_signal_or_restart+0x95/0x4b0 [ 304.364544][T17563] syscall_exit_to_user_mode+0x62/0x120 [ 304.364577][T17563] do_syscall_64+0xd6/0x1c0 [ 304.364592][T17563] ? clear_bhb_loop+0x55/0xb0 [ 304.364663][T17563] ? clear_bhb_loop+0x55/0xb0 [ 304.364678][T17563] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.364775][T17563] RIP: 0033:0x7f82ea0a0809 [ 304.364840][T17563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.364902][T17563] RSP: 002b:00007f82e86f6058 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 304.365004][T17563] RAX: fffffffffffffe00 RBX: 00007f82ea266080 RCX: 00007f82ea0a0809 [ 304.365019][T17563] RDX: 0000000000000104 RSI: 0000000020001500 RDI: 0000000000000003 [ 304.365033][T17563] RBP: 00007f82e86f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 304.365046][T17563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.365085][T17563] R13: 0000000000000001 R14: 00007f82ea266080 R15: 00007fffa66cf908 [ 304.365100][T17563] [ 305.565267][T17710] FAULT_INJECTION: forcing a failure. [ 305.565267][T17710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 305.578555][T17710] CPU: 0 UID: 0 PID: 17710 Comm: syz.1.2681 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 305.578610][T17710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 305.578623][T17710] Call Trace: [ 305.578630][T17710] [ 305.578639][T17710] dump_stack_lvl+0xf2/0x150 [ 305.578715][T17710] dump_stack+0x15/0x20 [ 305.578729][T17710] should_fail_ex+0x223/0x230 [ 305.578754][T17710] should_fail+0xb/0x10 [ 305.578777][T17710] should_fail_usercopy+0x1a/0x20 [ 305.628196][T17710] _copy_to_user+0x20/0xa0 [ 305.628222][T17710] do_tcp_getsockopt+0xbe2/0x1a50 [ 305.628257][T17710] ? path_openat+0x19a0/0x1fa0 [ 305.628337][T17710] ? _parse_integer+0x27/0x30 [ 305.647339][T17710] ? __rcu_read_unlock+0x4e/0x70 [ 305.647362][T17710] ? avc_has_perm_noaudit+0x1cc/0x210 [ 305.657713][T17710] ? avc_has_perm+0xd4/0x160 [ 305.662503][T17710] tcp_getsockopt+0x6e/0xe0 [ 305.667113][T17710] sock_common_getsockopt+0x5b/0x70 [ 305.672336][T17710] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 305.672369][T17710] do_sock_getsockopt+0x1ca/0x260 [ 305.683386][T17710] __x64_sys_getsockopt+0x18c/0x200 [ 305.688616][T17710] x64_sys_call+0x1288/0x2dc0 [ 305.688659][T17710] do_syscall_64+0xc9/0x1c0 [ 305.688679][T17710] ? clear_bhb_loop+0x55/0xb0 [ 305.688707][T17710] ? clear_bhb_loop+0x55/0xb0 [ 305.688721][T17710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.688779][T17710] RIP: 0033:0x7fd1f21f0809 [ 305.688795][T17710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.688822][T17710] RSP: 002b:00007fd1f0867058 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 305.688840][T17710] RAX: ffffffffffffffda RBX: 00007fd1f23b5fa0 RCX: 00007fd1f21f0809 [ 305.688854][T17710] RDX: 0000000000000006 RSI: 0000000000000006 RDI: 0000000000000003 [ 305.688868][T17710] RBP: 00007fd1f08670a0 R08: 00000000200000c0 R09: 0000000000000000 [ 305.688881][T17710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.688917][T17710] R13: 0000000000000000 R14: 00007fd1f23b5fa0 R15: 00007ffe152a3988 [ 305.688996][T17710] [ 305.704601][ T29] kauditd_printk_skb: 12065 callbacks suppressed [ 305.704615][ T29] audit: type=1400 audit(1732740730.420:93041): avc: denied { prog_load } for pid=17711 comm="syz.0.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.705984][ T29] audit: type=1326 audit(1732740730.430:93042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.706144][ T29] audit: type=1326 audit(1732740730.430:93043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.706167][ T29] audit: type=1400 audit(1732740730.430:93044): avc: denied { prog_load } for pid=17711 comm="syz.0.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.706389][ T29] audit: type=1326 audit(1732740730.430:93045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.706509][ T29] audit: type=1326 audit(1732740730.430:93046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.706624][ T29] audit: type=1326 audit(1732740730.430:93047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.706793][ T29] audit: type=1326 audit(1732740730.430:93048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=36 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.706862][ T29] audit: type=1326 audit(1732740730.430:93049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.707180][ T29] audit: type=1326 audit(1732740730.430:93050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17711 comm="syz.0.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 305.883207][T17719] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 306.166746][T17753] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2700'. [ 306.191846][T17759] FAULT_INJECTION: forcing a failure. [ 306.191846][T17759] name failslab, interval 1, probability 0, space 0, times 0 [ 306.204529][T17759] CPU: 1 UID: 0 PID: 17759 Comm: syz.0.2703 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 306.214957][T17759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 306.225070][T17759] Call Trace: [ 306.228370][T17759] [ 306.231310][T17759] dump_stack_lvl+0xf2/0x150 [ 306.235916][T17759] dump_stack+0x15/0x20 [ 306.240174][T17759] should_fail_ex+0x223/0x230 [ 306.244923][T17759] ? alloc_fs_context+0x44/0x4e0 [ 306.249857][T17759] should_failslab+0x8f/0xb0 [ 306.254482][T17759] __kmalloc_cache_noprof+0x4e/0x320 [ 306.259770][T17759] alloc_fs_context+0x44/0x4e0 [ 306.264526][T17759] fs_context_for_mount+0x21/0x30 [ 306.269555][T17759] mq_init_ns+0xab/0x300 [ 306.273806][T17759] copy_ipcs+0x218/0x3b0 [ 306.278221][T17759] create_new_namespaces+0x135/0x430 [ 306.283517][T17759] ? security_capable+0x81/0x90 [ 306.288368][T17759] unshare_nsproxy_namespaces+0xe6/0x120 [ 306.294042][T17759] ksys_unshare+0x3c9/0x6e0 [ 306.298584][T17759] __x64_sys_unshare+0x1f/0x30 [ 306.303351][T17759] x64_sys_call+0x1a3e/0x2dc0 [ 306.308027][T17759] do_syscall_64+0xc9/0x1c0 [ 306.312589][T17759] ? clear_bhb_loop+0x55/0xb0 [ 306.317256][T17759] ? clear_bhb_loop+0x55/0xb0 [ 306.321926][T17759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.327820][T17759] RIP: 0033:0x7f82ea0a0809 [ 306.332226][T17759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.351952][T17759] RSP: 002b:00007f82e8717058 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 306.360361][T17759] RAX: ffffffffffffffda RBX: 00007f82ea265fa0 RCX: 00007f82ea0a0809 [ 306.368462][T17759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000000 [ 306.376424][T17759] RBP: 00007f82e87170a0 R08: 0000000000000000 R09: 0000000000000000 [ 306.384382][T17759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.392394][T17759] R13: 0000000000000001 R14: 00007f82ea265fa0 R15: 00007fffa66cf908 [ 306.400373][T17759] [ 306.547123][T17769] IPVS: set_ctl: invalid protocol: 44 224.0.0.1:20002 [ 306.631845][T17796] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 306.631867][T17796] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 306.631904][T17796] vhci_hcd vhci_hcd.0: Device attached [ 306.639625][T17800] vhci_hcd: connection closed [ 306.639832][ T6431] vhci_hcd: stop threads [ 306.639841][ T6431] vhci_hcd: release socket [ 306.639848][ T6431] vhci_hcd: disconnect device [ 307.351087][T17847] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(3) [ 307.357694][T17847] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 307.365152][T17847] vhci_hcd vhci_hcd.0: Device attached [ 307.367591][T17848] vhci_hcd: connection closed [ 307.371197][ T157] vhci_hcd: stop threads [ 307.371207][ T157] vhci_hcd: release socket [ 307.371283][ T157] vhci_hcd: disconnect device [ 307.423234][T17851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=98 sclass=netlink_route_socket pid=17851 comm=syz.2.2738 [ 308.038130][T17917] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 308.098567][T17924] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 308.098592][T17924] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 308.098719][T17924] vhci_hcd vhci_hcd.0: Device attached [ 308.124290][T17925] vhci_hcd: connection closed [ 308.124391][ T11] vhci_hcd: stop threads [ 308.124399][ T11] vhci_hcd: release socket [ 308.124405][ T11] vhci_hcd: disconnect device [ 308.520021][T17940] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 308.732946][T17964] Â: renamed from vlan0 (while UP) [ 308.817607][T17979] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 308.824154][T17979] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 308.831709][T17979] vhci_hcd vhci_hcd.0: Device attached [ 308.843631][T17980] vhci_hcd: connection closed [ 308.843871][ T6431] vhci_hcd: stop threads [ 308.843879][ T6431] vhci_hcd: release socket [ 308.843885][ T6431] vhci_hcd: disconnect device [ 309.720063][T18050] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 309.726615][T18050] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 309.734152][T18050] vhci_hcd vhci_hcd.0: Device attached [ 309.787035][T18051] vhci_hcd: connection closed [ 309.787227][ T3418] vhci_hcd: stop threads [ 309.796168][ T3418] vhci_hcd: release socket [ 309.800588][ T3418] vhci_hcd: disconnect device [ 309.999933][T18059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=98 sclass=netlink_route_socket pid=18059 comm=syz.1.2825 [ 310.706776][ T29] kauditd_printk_skb: 20453 callbacks suppressed [ 310.706789][ T29] audit: type=1400 audit(1732740735.430:113266): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.706813][ T29] audit: type=1400 audit(1732740735.430:113267): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.706915][ T29] audit: type=1400 audit(1732740735.430:113268): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.706933][ T29] audit: type=1400 audit(1732740735.430:113269): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.707023][ T29] audit: type=1400 audit(1732740735.430:113270): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.707158][ T29] audit: type=1400 audit(1732740735.430:113271): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.707227][ T29] audit: type=1400 audit(1732740735.430:113272): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.707328][ T29] audit: type=1400 audit(1732740735.430:113273): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.892077][ T29] audit: type=1400 audit(1732740735.610:113274): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.914297][ T29] audit: type=1400 audit(1732740735.610:113275): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 311.500095][T18151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10256 sclass=netlink_route_socket pid=18151 comm=syz.1.2865 [ 311.554602][T18155] Â: renamed from vlan0 (while UP) [ 311.658747][T18168] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 311.665283][T18168] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 311.665437][T18168] vhci_hcd vhci_hcd.0: Device attached [ 311.669217][T18170] vhci_hcd: connection closed [ 311.681389][ T6431] vhci_hcd: stop threads [ 311.681464][ T6431] vhci_hcd: release socket [ 311.681470][ T6431] vhci_hcd: disconnect device [ 312.139519][T18191] FAULT_INJECTION: forcing a failure. [ 312.139519][T18191] name failslab, interval 1, probability 0, space 0, times 0 [ 312.152238][T18191] CPU: 0 UID: 0 PID: 18191 Comm: syz.9.2883 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 312.152266][T18191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 312.152277][T18191] Call Trace: [ 312.152340][T18191] [ 312.152348][T18191] dump_stack_lvl+0xf2/0x150 [ 312.152371][T18191] dump_stack+0x15/0x20 [ 312.152389][T18191] should_fail_ex+0x223/0x230 [ 312.152418][T18191] should_failslab+0x8f/0xb0 [ 312.152479][T18191] kmem_cache_alloc_noprof+0x52/0x320 [ 312.152503][T18191] ? security_inode_alloc+0x37/0x100 [ 312.152524][T18191] security_inode_alloc+0x37/0x100 [ 312.152547][T18191] inode_init_always_gfp+0x4a2/0x4f0 [ 312.152571][T18191] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 312.152669][T18191] alloc_inode+0x82/0x160 [ 312.152692][T18191] new_inode+0x1e/0x100 [ 312.152714][T18191] shmem_get_inode+0x24e/0x730 [ 312.152776][T18191] __shmem_file_setup+0x127/0x1f0 [ 312.152802][T18191] shmem_file_setup+0x3b/0x50 [ 312.152823][T18191] __se_sys_memfd_create+0x31d/0x5c0 [ 312.214795][T18200] FAULT_INJECTION: forcing a failure. [ 312.214795][T18200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 312.218577][T18191] __x64_sys_memfd_create+0x31/0x40 [ 312.270510][T18191] x64_sys_call+0x2d4c/0x2dc0 [ 312.270540][T18191] do_syscall_64+0xc9/0x1c0 [ 312.270572][T18191] ? clear_bhb_loop+0x55/0xb0 [ 312.270665][T18191] ? clear_bhb_loop+0x55/0xb0 [ 312.270680][T18191] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 312.270705][T18191] RIP: 0033:0x7f24919c0809 [ 312.270718][T18191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.270795][T18191] RSP: 002b:00007f2490036e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 312.270811][T18191] RAX: ffffffffffffffda RBX: 0000000000000464 RCX: 00007f24919c0809 [ 312.270822][T18191] RDX: 00007f2490036f10 RSI: 0000000000000000 RDI: 00007f2491a341c1 [ 312.270833][T18191] RBP: 00000000200004c0 R08: 00007f2490036bd7 R09: 00007f2490036e60 [ 312.270844][T18191] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000480 [ 312.270854][T18191] R13: 00007f2490036f10 R14: 00007f2490036ed0 R15: 0000000020000000 [ 312.270869][T18191] [ 312.270903][T18200] CPU: 1 UID: 0 PID: 18200 Comm: syz.1.2888 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 312.270928][T18200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 312.270939][T18200] Call Trace: [ 312.270945][T18200] [ 312.270952][T18200] dump_stack_lvl+0xf2/0x150 [ 312.270972][T18200] dump_stack+0x15/0x20 [ 312.270986][T18200] should_fail_ex+0x223/0x230 [ 312.271029][T18200] should_fail+0xb/0x10 [ 312.271050][T18200] should_fail_usercopy+0x1a/0x20 [ 312.271074][T18200] _copy_to_user+0x20/0xa0 [ 312.271129][T18200] simple_read_from_buffer+0xa0/0x110 [ 312.271159][T18200] proc_fail_nth_read+0xf9/0x140 [ 312.271189][T18200] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 312.271323][T18200] vfs_read+0x1a2/0x700 [ 312.271351][T18200] ? poll_select_finish+0x15f/0x420 [ 312.271371][T18200] ? __rcu_read_unlock+0x4e/0x70 [ 312.271390][T18200] ? __fget_files+0x17c/0x1c0 [ 312.271455][T18200] ksys_read+0xe8/0x1b0 [ 312.271483][T18200] __x64_sys_read+0x42/0x50 [ 312.271508][T18200] x64_sys_call+0x2874/0x2dc0 [ 312.271584][T18200] do_syscall_64+0xc9/0x1c0 [ 312.271599][T18200] ? clear_bhb_loop+0x55/0xb0 [ 312.271619][T18200] ? clear_bhb_loop+0x55/0xb0 [ 312.271638][T18200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 312.271670][T18200] RIP: 0033:0x7fd1f21ef21c [ 312.271685][T18200] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 312.271702][T18200] RSP: 002b:00007fd1f0867050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 312.271723][T18200] RAX: ffffffffffffffda RBX: 00007fd1f23b5fa0 RCX: 00007fd1f21ef21c [ 312.271737][T18200] RDX: 000000000000000f RSI: 00007fd1f08670b0 RDI: 0000000000000005 [ 312.271750][T18200] RBP: 00007fd1f08670a0 R08: 0000000000000000 R09: 0000000000000000 [ 312.271827][T18200] R10: 0000000020000d00 R11: 0000000000000246 R12: 0000000000000001 [ 312.271841][T18200] R13: 0000000000000000 R14: 00007fd1f23b5fa0 R15: 00007ffe152a3988 [ 312.271858][T18200] [ 312.542859][T18242] FAULT_INJECTION: forcing a failure. [ 312.542859][T18242] name failslab, interval 1, probability 0, space 0, times 0 [ 312.681693][T18242] CPU: 1 UID: 0 PID: 18242 Comm: syz.0.2905 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 312.681748][T18242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 312.681759][T18242] Call Trace: [ 312.681765][T18242] [ 312.681771][T18242] dump_stack_lvl+0xf2/0x150 [ 312.681791][T18242] dump_stack+0x15/0x20 [ 312.681811][T18242] should_fail_ex+0x223/0x230 [ 312.681836][T18242] should_failslab+0x8f/0xb0 [ 312.681854][T18242] kmem_cache_alloc_noprof+0x52/0x320 [ 312.681877][T18242] ? security_inode_alloc+0x37/0x100 [ 312.681976][T18242] security_inode_alloc+0x37/0x100 [ 312.681996][T18242] inode_init_always_gfp+0x4a2/0x4f0 [ 312.682015][T18242] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 312.682042][T18242] alloc_inode+0x82/0x160 [ 312.682076][T18242] new_inode+0x1e/0x100 [ 312.682171][T18242] shmem_get_inode+0x24e/0x730 [ 312.682280][T18242] __shmem_file_setup+0x127/0x1f0 [ 312.682308][T18242] shmem_file_setup+0x3b/0x50 [ 312.682334][T18242] __se_sys_memfd_create+0x31d/0x5c0 [ 312.682366][T18242] __x64_sys_memfd_create+0x31/0x40 [ 312.682399][T18242] x64_sys_call+0x2d4c/0x2dc0 [ 312.682422][T18242] do_syscall_64+0xc9/0x1c0 [ 312.682441][T18242] ? clear_bhb_loop+0x55/0xb0 [ 312.682502][T18242] ? clear_bhb_loop+0x55/0xb0 [ 312.682521][T18242] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 312.682632][T18242] RIP: 0033:0x7f82ea0a0809 [ 312.682718][T18242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.682734][T18242] RSP: 002b:00007f82e8716e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 312.682753][T18242] RAX: ffffffffffffffda RBX: 0000000000000b9e RCX: 00007f82ea0a0809 [ 312.682810][T18242] RDX: 00007f82e8716f10 RSI: 0000000000000000 RDI: 00007f82ea1141c1 [ 312.682888][T18242] RBP: 0000000020000c80 R08: 00007f82e8716bd7 R09: 00007f82e8716e60 [ 312.682902][T18242] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000c00 [ 312.682915][T18242] R13: 00007f82e8716f10 R14: 00007f82e8716ed0 R15: 0000000020000c40 [ 312.682934][T18242] [ 313.111262][T18294] Â: renamed from vlan0 (while UP) [ 313.481414][T18347] FAULT_INJECTION: forcing a failure. [ 313.481414][T18347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.494639][T18347] CPU: 0 UID: 0 PID: 18347 Comm: syz.2.2953 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 313.494667][T18347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 313.494680][T18347] Call Trace: [ 313.494722][T18347] [ 313.494729][T18347] dump_stack_lvl+0xf2/0x150 [ 313.494750][T18347] dump_stack+0x15/0x20 [ 313.494764][T18347] should_fail_ex+0x223/0x230 [ 313.494793][T18347] should_fail+0xb/0x10 [ 313.494859][T18347] should_fail_usercopy+0x1a/0x20 [ 313.494935][T18347] _copy_to_user+0x20/0xa0 [ 313.494955][T18347] do_tcp_getsockopt+0xc99/0x1a50 [ 313.494987][T18347] ? path_openat+0x19a0/0x1fa0 [ 313.495013][T18347] ? _parse_integer+0x27/0x30 [ 313.495035][T18347] ? __rcu_read_unlock+0x4e/0x70 [ 313.495055][T18347] ? avc_has_perm_noaudit+0x1cc/0x210 [ 313.495156][T18347] ? avc_has_perm+0xd4/0x160 [ 313.495176][T18347] tcp_getsockopt+0x6e/0xe0 [ 313.495202][T18347] sock_common_getsockopt+0x5b/0x70 [ 313.495230][T18347] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 313.495296][T18347] do_sock_getsockopt+0x1ca/0x260 [ 313.495316][T18347] __x64_sys_getsockopt+0x18c/0x200 [ 313.495341][T18347] x64_sys_call+0x1288/0x2dc0 [ 313.495447][T18347] do_syscall_64+0xc9/0x1c0 [ 313.495465][T18347] ? clear_bhb_loop+0x55/0xb0 [ 313.495485][T18347] ? clear_bhb_loop+0x55/0xb0 [ 313.495512][T18347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.495538][T18347] RIP: 0033:0x7f4a49ff0809 [ 313.495552][T18347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.495569][T18347] RSP: 002b:00007f4a48667058 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 313.495588][T18347] RAX: ffffffffffffffda RBX: 00007f4a4a1b5fa0 RCX: 00007f4a49ff0809 [ 313.495648][T18347] RDX: 0000000000000006 RSI: 0000000000000006 RDI: 0000000000000003 [ 313.495659][T18347] RBP: 00007f4a486670a0 R08: 00000000200000c0 R09: 0000000000000000 [ 313.495670][T18347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.495681][T18347] R13: 0000000000000000 R14: 00007f4a4a1b5fa0 R15: 00007ffd64bd6138 [ 313.495752][T18347] [ 313.751404][T18374] FAULT_INJECTION: forcing a failure. [ 313.751404][T18374] name failslab, interval 1, probability 0, space 0, times 0 [ 313.751430][T18374] CPU: 0 UID: 0 PID: 18374 Comm: syz.9.2966 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 313.751468][T18374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 313.751480][T18374] Call Trace: [ 313.751486][T18374] [ 313.751493][T18374] dump_stack_lvl+0xf2/0x150 [ 313.751516][T18374] dump_stack+0x15/0x20 [ 313.751534][T18374] should_fail_ex+0x223/0x230 [ 313.751634][T18374] should_failslab+0x8f/0xb0 [ 313.751654][T18374] kmem_cache_alloc_noprof+0x52/0x320 [ 313.751683][T18374] ? dst_alloc+0xc0/0x100 [ 313.751836][T18374] dst_alloc+0xc0/0x100 [ 313.751860][T18374] ? ip_vs_sh_schedule+0x4b2/0x5a0 [ 313.751881][T18374] ip_route_output_key_hash_rcu+0xb90/0x12d0 [ 313.751910][T18374] ? call_rcu+0x2fb/0x430 [ 313.751937][T18374] ip_route_output_flow+0x76/0x120 [ 313.752014][T18374] __ip4_datagram_connect+0x552/0x7b0 [ 313.752045][T18374] __ip6_datagram_connect+0xd4/0x830 [ 313.752086][T18374] ? _raw_spin_unlock_bh+0x36/0x40 [ 313.752109][T18374] ? lock_sock_nested+0x10f/0x140 [ 313.752139][T18374] ? __rcu_read_unlock+0x4e/0x70 [ 313.752189][T18374] udpv6_connect+0x33/0x150 [ 313.752212][T18374] inet_dgram_connect+0x11d/0x1b0 [ 313.752254][T18374] ? __pfx_inet_dgram_connect+0x10/0x10 [ 313.752281][T18374] __sys_connect+0x18f/0x1b0 [ 313.752311][T18374] __x64_sys_connect+0x41/0x50 [ 313.752330][T18374] x64_sys_call+0x22a7/0x2dc0 [ 313.752357][T18374] do_syscall_64+0xc9/0x1c0 [ 313.752375][T18374] ? clear_bhb_loop+0x55/0xb0 [ 313.752394][T18374] ? clear_bhb_loop+0x55/0xb0 [ 313.752451][T18374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.752552][T18374] RIP: 0033:0x7f24919c0809 [ 313.752569][T18374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.752655][T18374] RSP: 002b:00007f2490037058 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 313.752726][T18374] RAX: ffffffffffffffda RBX: 00007f2491b85fa0 RCX: 00007f24919c0809 [ 313.752738][T18374] RDX: 000000000000001c RSI: 0000000020000180 RDI: 0000000000000003 [ 313.752750][T18374] RBP: 00007f24900370a0 R08: 0000000000000000 R09: 0000000000000000 [ 313.752761][T18374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.752772][T18374] R13: 0000000000000000 R14: 00007f2491b85fa0 R15: 00007fff4e4b4328 [ 313.752791][T18374] [ 315.715416][ T29] kauditd_printk_skb: 12691 callbacks suppressed [ 315.715431][ T29] audit: type=1400 audit(1732740740.430:125935): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.743969][ T29] audit: type=1400 audit(1732740740.430:125936): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.766427][ T29] audit: type=1400 audit(1732740740.430:125937): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.788614][ T29] audit: type=1400 audit(1732740740.430:125938): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.811026][ T29] audit: type=1400 audit(1732740740.430:125939): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.833524][ T29] audit: type=1400 audit(1732740740.430:125940): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.855900][ T29] audit: type=1400 audit(1732740740.430:125941): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 315.922015][ T3002] audit: audit_backlog=65 > audit_backlog_limit=64 [ 315.925465][T18515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 315.928564][ T3002] audit: audit_lost=821 audit_rate_limit=0 audit_backlog_limit=64 [ 316.352943][T18548] Â: renamed from vlan0 (while UP) [ 316.632592][T18569] FAULT_INJECTION: forcing a failure. [ 316.632592][T18569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 316.645725][T18569] CPU: 1 UID: 0 PID: 18569 Comm: syz.0.3051 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 316.656155][T18569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 316.666238][T18569] Call Trace: [ 316.669513][T18569] [ 316.672444][T18569] dump_stack_lvl+0xf2/0x150 [ 316.677125][T18569] dump_stack+0x15/0x20 [ 316.681387][T18569] should_fail_ex+0x223/0x230 [ 316.686125][T18569] should_fail+0xb/0x10 [ 316.690383][T18569] should_fail_usercopy+0x1a/0x20 [ 316.695479][T18569] _copy_to_user+0x20/0xa0 [ 316.699910][T18569] simple_read_from_buffer+0xa0/0x110 [ 316.705432][T18569] proc_fail_nth_read+0xf9/0x140 [ 316.710480][T18569] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 316.716042][T18569] vfs_read+0x1a2/0x700 [ 316.720298][T18569] ? __rcu_read_unlock+0x4e/0x70 [ 316.725371][T18569] ? __fget_files+0x17c/0x1c0 [ 316.730071][T18569] ksys_read+0xe8/0x1b0 [ 316.734242][T18569] __x64_sys_read+0x42/0x50 [ 316.738875][T18569] x64_sys_call+0x2874/0x2dc0 [ 316.743571][T18569] do_syscall_64+0xc9/0x1c0 [ 316.743621][T18569] ? clear_bhb_loop+0x55/0xb0 [ 316.743638][T18569] ? clear_bhb_loop+0x55/0xb0 [ 316.743653][T18569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 316.743682][T18569] RIP: 0033:0x7f82ea09f21c [ 316.743698][T18569] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 316.787447][T18569] RSP: 002b:00007f82e8717050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 316.787469][T18569] RAX: ffffffffffffffda RBX: 00007f82ea265fa0 RCX: 00007f82ea09f21c [ 316.787481][T18569] RDX: 000000000000000f RSI: 00007f82e87170b0 RDI: 0000000000000003 [ 316.787492][T18569] RBP: 00007f82e87170a0 R08: 0000000000000000 R09: 0000000000000000 [ 316.787503][T18569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.787515][T18569] R13: 0000000000000000 R14: 00007f82ea265fa0 R15: 00007fffa66cf908 [ 316.787547][T18569] [ 318.201491][T18659] Â: renamed from vlan0 (while UP) [ 320.725494][ T29] kauditd_printk_skb: 24067 callbacks suppressed [ 320.725525][ T29] audit: type=1400 audit(1732740745.450:149173): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.727315][ T29] audit: type=1400 audit(1732740745.450:149174): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.776538][ T29] audit: type=1400 audit(1732740745.500:149175): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.776565][ T29] audit: type=1400 audit(1732740745.500:149176): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.820955][ T29] audit: type=1400 audit(1732740745.500:149177): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.843544][ T29] audit: type=1400 audit(1732740745.560:149178): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.865042][ T29] audit: type=1400 audit(1732740745.570:149179): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.888556][ T29] audit: type=1400 audit(1732740745.610:149180): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.910843][ T29] audit: type=1400 audit(1732740745.610:149181): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.910939][ T29] audit: type=1400 audit(1732740745.610:149182): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.941229][T18777] FAULT_INJECTION: forcing a failure. [ 320.941229][T18777] name failslab, interval 1, probability 0, space 0, times 0 [ 320.968835][T18777] CPU: 1 UID: 0 PID: 18777 Comm: syz.6.3136 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 320.968862][T18777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 320.968920][T18777] Call Trace: [ 320.968926][T18777] [ 320.968933][T18777] dump_stack_lvl+0xf2/0x150 [ 320.968953][T18777] dump_stack+0x15/0x20 [ 320.968970][T18777] should_fail_ex+0x223/0x230 [ 321.009031][T18777] should_failslab+0x8f/0xb0 [ 321.013686][T18777] kmem_cache_alloc_noprof+0x52/0x320 [ 321.019079][T18777] ? security_file_alloc+0x32/0x100 [ 321.019170][T18777] security_file_alloc+0x32/0x100 [ 321.019214][T18777] init_file+0x5b/0x1b0 [ 321.019235][T18777] alloc_empty_file+0xea/0x200 [ 321.019260][T18777] path_openat+0x6a/0x1fa0 [ 321.042875][T18777] ? mntput+0x49/0x70 [ 321.042908][T18777] ? terminate_walk+0x260/0x280 [ 321.051859][T18777] ? path_openat+0x1a5a/0x1fa0 [ 321.056634][T18777] ? _parse_integer_limit+0x167/0x180 [ 321.062037][T18777] do_filp_open+0x107/0x230 [ 321.062078][T18777] do_open_execat+0xd0/0x280 [ 321.062105][T18777] alloc_bprm+0x28/0x5d0 [ 321.062139][T18777] do_execveat_common+0x134/0x800 [ 321.062160][T18777] ? getname_flags+0x15a/0x3b0 [ 321.062185][T18777] __x64_sys_execveat+0x75/0x90 [ 321.062202][T18777] x64_sys_call+0x291e/0x2dc0 [ 321.094769][T18777] do_syscall_64+0xc9/0x1c0 [ 321.099296][T18777] ? clear_bhb_loop+0x55/0xb0 [ 321.103984][T18777] ? clear_bhb_loop+0x55/0xb0 [ 321.104042][T18777] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 321.114679][T18777] RIP: 0033:0x7fbac1780809 [ 321.119122][T18777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.119142][T18777] RSP: 002b:00007fbabfdf7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 321.147342][T18777] RAX: ffffffffffffffda RBX: 00007fbac1945fa0 RCX: 00007fbac1780809 [ 321.155324][T18777] RDX: 0000000020000100 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 321.163318][T18777] RBP: 00007fbabfdf70a0 R08: 0000000000000000 R09: 0000000000000000 [ 321.163410][T18777] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 [ 321.163423][T18777] R13: 0000000000000000 R14: 00007fbac1945fa0 R15: 00007ffdaac2db08 [ 321.163518][T18777] [ 321.363576][T18803] xt_hashlimit: max too large, truncated to 1048576 [ 322.918506][T18891] FAULT_INJECTION: forcing a failure. [ 322.918506][T18891] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.931603][T18891] CPU: 1 UID: 0 PID: 18891 Comm: syz.9.3189 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 322.931631][T18891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 322.931641][T18891] Call Trace: [ 322.931647][T18891] [ 322.931655][T18891] dump_stack_lvl+0xf2/0x150 [ 322.931685][T18891] dump_stack+0x15/0x20 [ 322.931700][T18891] should_fail_ex+0x223/0x230 [ 322.931731][T18891] should_fail+0xb/0x10 [ 322.975989][T18891] should_fail_usercopy+0x1a/0x20 [ 322.976020][T18891] _copy_from_iter+0xd5/0xd00 [ 322.976067][T18891] ? kmalloc_reserve+0x16e/0x190 [ 322.976087][T18891] ? __build_skb_around+0x196/0x1f0 [ 322.976161][T18891] ? __alloc_skb+0x21f/0x310 [ 322.976175][T18891] ? __virt_addr_valid+0x1ed/0x250 [ 322.976276][T18891] ? __check_object_size+0x364/0x520 [ 322.976308][T18891] netlink_sendmsg+0x460/0x6e0 [ 323.015835][T18891] ? __pfx_netlink_sendmsg+0x10/0x10 [ 323.015901][T18891] __sock_sendmsg+0x140/0x180 [ 323.015931][T18891] ____sys_sendmsg+0x312/0x410 [ 323.015955][T18891] __sys_sendmsg+0x19d/0x230 [ 323.035197][T18891] __x64_sys_sendmsg+0x46/0x50 [ 323.035226][T18891] x64_sys_call+0x2734/0x2dc0 [ 323.035247][T18891] do_syscall_64+0xc9/0x1c0 [ 323.035336][T18891] ? clear_bhb_loop+0x55/0xb0 [ 323.035354][T18891] ? clear_bhb_loop+0x55/0xb0 [ 323.035370][T18891] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.035401][T18891] RIP: 0033:0x7f24919c0809 [ 323.035414][T18891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.035508][T18891] RSP: 002b:00007f2490037058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 323.035525][T18891] RAX: ffffffffffffffda RBX: 00007f2491b85fa0 RCX: 00007f24919c0809 [ 323.035538][T18891] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 323.035553][T18891] RBP: 00007f24900370a0 R08: 0000000000000000 R09: 0000000000000000 [ 323.035568][T18891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.035580][T18891] R13: 0000000000000000 R14: 00007f2491b85fa0 R15: 00007fff4e4b4328 [ 323.035597][T18891] [ 323.221418][T18910] capability: warning: `syz.9.3196' uses 32-bit capabilities (legacy support in use) [ 323.241286][T18912] FAULT_INJECTION: forcing a failure. [ 323.241286][T18912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.241312][T18912] CPU: 1 UID: 0 PID: 18912 Comm: syz.0.3197 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 323.241387][T18912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 323.241399][T18912] Call Trace: [ 323.241406][T18912] [ 323.241413][T18912] dump_stack_lvl+0xf2/0x150 [ 323.285732][T18912] dump_stack+0x15/0x20 [ 323.285752][T18912] should_fail_ex+0x223/0x230 [ 323.285778][T18912] should_fail+0xb/0x10 [ 323.298791][T18912] should_fail_usercopy+0x1a/0x20 [ 323.303838][T18912] _copy_to_user+0x20/0xa0 [ 323.308289][T18912] simple_read_from_buffer+0xa0/0x110 [ 323.308357][T18912] proc_fail_nth_read+0xf9/0x140 [ 323.308390][T18912] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 323.324249][T18912] vfs_read+0x1a2/0x700 [ 323.328500][T18912] ? __rcu_read_unlock+0x4e/0x70 [ 323.333471][T18912] ? __fget_files+0x17c/0x1c0 [ 323.333498][T18912] ksys_read+0xe8/0x1b0 [ 323.333526][T18912] __x64_sys_read+0x42/0x50 [ 323.333555][T18912] x64_sys_call+0x2874/0x2dc0 [ 323.333617][T18912] do_syscall_64+0xc9/0x1c0 [ 323.333633][T18912] ? clear_bhb_loop+0x55/0xb0 [ 323.360770][T18912] ? clear_bhb_loop+0x55/0xb0 [ 323.360790][T18912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.371369][T18912] RIP: 0033:0x7f82ea09f21c [ 323.375792][T18912] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 323.395459][T18912] RSP: 002b:00007f82e8717050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 323.395478][T18912] RAX: ffffffffffffffda RBX: 00007f82ea265fa0 RCX: 00007f82ea09f21c [ 323.395489][T18912] RDX: 000000000000000f RSI: 00007f82e87170b0 RDI: 0000000000000003 [ 323.395500][T18912] RBP: 00007f82e87170a0 R08: 0000000000000000 R09: 0000000000000000 [ 323.395511][T18912] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 323.395538][T18912] R13: 0000000000000001 R14: 00007f82ea265fa0 R15: 00007fffa66cf908 [ 323.395559][T18912] [ 323.792868][T18941] FAULT_INJECTION: forcing a failure. [ 323.792868][T18941] name failslab, interval 1, probability 0, space 0, times 0 [ 323.805632][T18941] CPU: 0 UID: 0 PID: 18941 Comm: syz.1.3211 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 323.816092][T18941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 323.826192][T18941] Call Trace: [ 323.829537][T18941] [ 323.832476][T18941] dump_stack_lvl+0xf2/0x150 [ 323.837130][T18941] dump_stack+0x15/0x20 [ 323.841395][T18941] should_fail_ex+0x223/0x230 [ 323.846097][T18941] should_failslab+0x8f/0xb0 [ 323.850724][T18941] __kmalloc_node_noprof+0xad/0x410 [ 323.855952][T18941] ? __kvmalloc_node_noprof+0x72/0x170 [ 323.861433][T18941] ? __rcu_read_unlock+0x4e/0x70 [ 323.866389][T18941] __kvmalloc_node_noprof+0x72/0x170 [ 323.871687][T18941] xt_alloc_entry_offsets+0x47/0x50 [ 323.876907][T18941] translate_table+0xa3/0xf70 [ 323.881655][T18941] ? __memcg_slab_post_alloc_hook+0x510/0x660 [ 323.887826][T18941] ? _copy_from_user+0x8d/0xb0 [ 323.892604][T18941] do_ipt_set_ctl+0x7bd/0x8b0 [ 323.897304][T18941] ? tcp_release_cb+0xfe/0x380 [ 323.902272][T18941] nf_setsockopt+0x195/0x1b0 [ 323.906909][T18941] ip_setsockopt+0xea/0x100 [ 323.911429][T18941] tcp_setsockopt+0x93/0xb0 [ 323.916027][T18941] sock_common_setsockopt+0x64/0x80 [ 323.921271][T18941] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 323.927229][T18941] __sys_setsockopt+0x187/0x200 [ 323.932156][T18941] __x64_sys_setsockopt+0x66/0x80 [ 323.937277][T18941] x64_sys_call+0x282e/0x2dc0 [ 323.942028][T18941] do_syscall_64+0xc9/0x1c0 [ 323.946550][T18941] ? clear_bhb_loop+0x55/0xb0 [ 323.951233][T18941] ? clear_bhb_loop+0x55/0xb0 [ 323.955918][T18941] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.961835][T18941] RIP: 0033:0x7fd1f21f0809 [ 323.966264][T18941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.966332][T18941] RSP: 002b:00007fd1f0867058 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 323.966375][T18941] RAX: ffffffffffffffda RBX: 00007fd1f23b5fa0 RCX: 00007fd1f21f0809 [ 323.966386][T18941] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 323.966397][T18941] RBP: 00007fd1f08670a0 R08: 0000000000000570 R09: 0000000000000000 [ 323.966408][T18941] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000001 [ 323.966419][T18941] R13: 0000000000000000 R14: 00007fd1f23b5fa0 R15: 00007ffe152a3988 [ 323.966436][T18941] [ 325.736058][ T29] kauditd_printk_skb: 15124 callbacks suppressed [ 325.736071][ T29] audit: type=1400 audit(1732740750.460:163329): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 325.763657][ T29] audit: type=1400 audit(1732740750.460:163328): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 325.804987][ T3058] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.805241][T19059] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.811584][ T3058] audit: audit_lost=1437 audit_rate_limit=0 audit_backlog_limit=64 [ 325.818066][T19059] audit: audit_lost=1438 audit_rate_limit=0 audit_backlog_limit=64 [ 325.825966][ T3058] audit: backlog limit exceeded [ 325.835886][T19063] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.838775][T19059] audit: backlog limit exceeded [ 325.838912][ T3002] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.915541][T19067] FAULT_INJECTION: forcing a failure. [ 325.915541][T19067] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.915563][T19067] CPU: 1 UID: 0 PID: 19067 Comm: syz.2.3262 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 325.915584][T19067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 325.915596][T19067] Call Trace: [ 325.915678][T19067] [ 325.915710][T19067] dump_stack_lvl+0xf2/0x150 [ 325.915733][T19067] dump_stack+0x15/0x20 [ 325.915751][T19067] should_fail_ex+0x223/0x230 [ 325.915854][T19067] should_fail+0xb/0x10 [ 325.915880][T19067] should_fail_usercopy+0x1a/0x20 [ 325.915912][T19067] _copy_to_user+0x20/0xa0 [ 325.915928][T19067] simple_read_from_buffer+0xa0/0x110 [ 325.916032][T19067] proc_fail_nth_read+0xf9/0x140 [ 325.916066][T19067] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 325.916244][T19067] vfs_read+0x1a2/0x700 [ 325.916273][T19067] ? __rcu_read_unlock+0x4e/0x70 [ 325.916290][T19067] ? __fget_files+0x17c/0x1c0 [ 325.916325][T19067] ksys_read+0xe8/0x1b0 [ 325.916356][T19067] __x64_sys_read+0x42/0x50 [ 325.916382][T19067] x64_sys_call+0x2874/0x2dc0 [ 325.916403][T19067] do_syscall_64+0xc9/0x1c0 [ 325.916465][T19067] ? clear_bhb_loop+0x55/0xb0 [ 325.916485][T19067] ? clear_bhb_loop+0x55/0xb0 [ 325.916500][T19067] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.916526][T19067] RIP: 0033:0x7f4a49fef21c [ 325.916539][T19067] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 325.916616][T19067] RSP: 002b:00007f4a48667050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 325.916637][T19067] RAX: ffffffffffffffda RBX: 00007f4a4a1b5fa0 RCX: 00007f4a49fef21c [ 325.916651][T19067] RDX: 000000000000000f RSI: 00007f4a486670b0 RDI: 0000000000000003 [ 325.916665][T19067] RBP: 00007f4a486670a0 R08: 0000000000000000 R09: 0000000000000000 [ 325.916677][T19067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.916687][T19067] R13: 0000000000000000 R14: 00007f4a4a1b5fa0 R15: 00007ffd64bd6138 [ 325.916702][T19067] [ 326.098272][T19081] FAULT_INJECTION: forcing a failure. [ 326.098272][T19081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.098293][T19081] CPU: 0 UID: 0 PID: 19081 Comm: syz.0.3267 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 326.098320][T19081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 326.098333][T19081] Call Trace: [ 326.098384][T19081] [ 326.098392][T19081] dump_stack_lvl+0xf2/0x150 [ 326.098416][T19081] dump_stack+0x15/0x20 [ 326.098434][T19081] should_fail_ex+0x223/0x230 [ 326.098472][T19081] should_fail+0xb/0x10 [ 326.098540][T19081] should_fail_usercopy+0x1a/0x20 [ 326.098621][T19081] _copy_to_user+0x20/0xa0 [ 326.098638][T19081] simple_read_from_buffer+0xa0/0x110 [ 326.098725][T19081] proc_fail_nth_read+0xf9/0x140 [ 326.098779][T19081] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 326.098807][T19081] vfs_read+0x1a2/0x700 [ 326.098832][T19081] ? __rcu_read_unlock+0x4e/0x70 [ 326.098920][T19081] ? __fget_files+0x17c/0x1c0 [ 326.098945][T19081] ksys_read+0xe8/0x1b0 [ 326.098970][T19081] __x64_sys_read+0x42/0x50 [ 326.099004][T19081] x64_sys_call+0x2874/0x2dc0 [ 326.099047][T19081] do_syscall_64+0xc9/0x1c0 [ 326.099065][T19081] ? clear_bhb_loop+0x55/0xb0 [ 326.099081][T19081] ? clear_bhb_loop+0x55/0xb0 [ 326.099096][T19081] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.099125][T19081] RIP: 0033:0x7f82ea09f21c [ 326.099153][T19081] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 326.099169][T19081] RSP: 002b:00007f82e86f6050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 326.099186][T19081] RAX: ffffffffffffffda RBX: 00007f82ea266080 RCX: 00007f82ea09f21c [ 326.099197][T19081] RDX: 000000000000000f RSI: 00007f82e86f60b0 RDI: 0000000000000004 [ 326.099210][T19081] RBP: 00007f82e86f60a0 R08: 0000000000000000 R09: 0000000000000000 [ 326.099224][T19081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.099238][T19081] R13: 0000000000000001 R14: 00007f82ea266080 R15: 00007fffa66cf908 [ 326.099269][T19081] [ 326.448863][T19088] FAULT_INJECTION: forcing a failure. [ 326.448863][T19088] name failslab, interval 1, probability 0, space 0, times 0 [ 326.492209][T19088] CPU: 0 UID: 0 PID: 19088 Comm: syz.9.3270 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 326.492234][T19088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 326.492244][T19088] Call Trace: [ 326.492251][T19088] [ 326.492258][T19088] dump_stack_lvl+0xf2/0x150 [ 326.492400][T19088] dump_stack+0x15/0x20 [ 326.527768][T19088] should_fail_ex+0x223/0x230 [ 326.527801][T19088] should_failslab+0x8f/0xb0 [ 326.527820][T19088] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 326.527898][T19088] ? sidtab_sid2str_get+0xb8/0x140 [ 326.527927][T19088] kmemdup_noprof+0x2a/0x60 [ 326.528023][T19088] sidtab_sid2str_get+0xb8/0x140 [ 326.528200][T19088] security_sid_to_context_core+0x1eb/0x2f0 [ 326.528235][T19088] security_sid_to_context+0x27/0x30 [ 326.528294][T19088] selinux_lsmprop_to_secctx+0x2c/0x40 [ 326.528340][T19088] security_lsmprop_to_secctx+0x4a/0x90 [ 326.528397][T19088] audit_log_task_context+0x93/0x1c0 [ 326.528516][T19088] audit_log_task+0xf9/0x1c0 [ 326.528555][T19088] audit_seccomp+0x68/0x130 [ 326.528639][T19088] __seccomp_filter+0x6fa/0x1180 [ 326.528729][T19088] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 326.528750][T19088] ? vfs_write+0x596/0x920 [ 326.528779][T19088] ? __schedule+0x6fa/0x930 [ 326.528855][T19088] __secure_computing+0x9f/0x1c0 [ 326.528922][T19088] syscall_trace_enter+0xd1/0x1f0 [ 326.528945][T19088] do_syscall_64+0xaa/0x1c0 [ 326.528963][T19088] ? clear_bhb_loop+0x55/0xb0 [ 326.528981][T19088] ? clear_bhb_loop+0x55/0xb0 [ 326.529041][T19088] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.529073][T19088] RIP: 0033:0x7f24919c0809 [ 326.529212][T19088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.529229][T19088] RSP: 002b:00007f2490037058 EFLAGS: 00000246 ORIG_RAX: 000000000000010d [ 326.529246][T19088] RAX: ffffffffffffffda RBX: 00007f2491b85fa0 RCX: 00007f24919c0809 [ 326.529257][T19088] RDX: 0000000000000005 RSI: 0000000000000000 RDI: ffffffffffffffff [ 326.529323][T19088] RBP: 00007f24900370a0 R08: 0000000000000000 R09: 0000000000000000 [ 326.529336][T19088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.529350][T19088] R13: 0000000000000000 R14: 00007f2491b85fa0 R15: 00007fff4e4b4328 [ 326.529401][T19088] [ 326.771082][T19113] FAULT_INJECTION: forcing a failure. [ 326.771082][T19113] name failslab, interval 1, probability 0, space 0, times 0 [ 326.792839][T19113] CPU: 0 UID: 0 PID: 19113 Comm: syz.9.3281 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 326.792863][T19113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 326.792873][T19113] Call Trace: [ 326.792880][T19113] [ 326.819579][T19113] dump_stack_lvl+0xf2/0x150 [ 326.819603][T19113] dump_stack+0x15/0x20 [ 326.819626][T19113] should_fail_ex+0x223/0x230 [ 326.833015][T19113] should_failslab+0x8f/0xb0 [ 326.837620][T19113] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 326.837672][T19113] ? __d_alloc+0x3d/0x340 [ 326.837697][T19113] __d_alloc+0x3d/0x340 [ 326.837788][T19113] d_alloc_pseudo+0x1e/0x80 [ 326.837817][T19113] alloc_file_pseudo+0x70/0x140 [ 326.861353][T19113] __shmem_file_setup+0x1bb/0x1f0 [ 326.861381][T19113] shmem_file_setup+0x3b/0x50 [ 326.861403][T19113] __se_sys_memfd_create+0x31d/0x5c0 [ 326.861486][T19113] __x64_sys_memfd_create+0x31/0x40 [ 326.861514][T19113] x64_sys_call+0x2d4c/0x2dc0 [ 326.861604][T19113] do_syscall_64+0xc9/0x1c0 [ 326.861619][T19113] ? clear_bhb_loop+0x55/0xb0 [ 326.861635][T19113] ? clear_bhb_loop+0x55/0xb0 [ 326.861731][T19113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.861776][T19113] RIP: 0033:0x7f24919c0809 [ 326.861792][T19113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.861808][T19113] RSP: 002b:00007f2490036e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 326.861837][T19113] RAX: ffffffffffffffda RBX: 000000000000035b RCX: 00007f24919c0809 [ 326.861852][T19113] RDX: 00007f2490036f10 RSI: 0000000000000000 RDI: 00007f2491a341c1 [ 326.861866][T19113] RBP: 0000000020000440 R08: 00007f2490036bd7 R09: 00007f2490036e60 [ 326.861877][T19113] R10: 000000000000000a R11: 0000000000000202 R12: 00000000200003c0 [ 326.861887][T19113] R13: 00007f2490036f10 R14: 00007f2490036ed0 R15: 0000000020000400 [ 326.861903][T19113] [ 326.985538][T19128] FAULT_INJECTION: forcing a failure. [ 326.985538][T19128] name failslab, interval 1, probability 0, space 0, times 0 [ 327.061941][T19128] CPU: 1 UID: 0 PID: 19128 Comm: syz.6.3288 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 327.061965][T19128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 327.061976][T19128] Call Trace: [ 327.061983][T19128] [ 327.061990][T19128] dump_stack_lvl+0xf2/0x150 [ 327.062073][T19128] dump_stack+0x15/0x20 [ 327.062089][T19128] should_fail_ex+0x223/0x230 [ 327.062115][T19128] should_failslab+0x8f/0xb0 [ 327.062137][T19128] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 327.062167][T19128] ? __d_alloc+0x3d/0x340 [ 327.062194][T19128] __d_alloc+0x3d/0x340 [ 327.062274][T19128] d_alloc_pseudo+0x1e/0x80 [ 327.062297][T19128] alloc_file_pseudo+0x70/0x140 [ 327.062331][T19128] __shmem_file_setup+0x1bb/0x1f0 [ 327.062360][T19128] shmem_file_setup+0x3b/0x50 [ 327.062446][T19128] __se_sys_memfd_create+0x31d/0x5c0 [ 327.062570][T19128] __x64_sys_memfd_create+0x31/0x40 [ 327.062644][T19128] x64_sys_call+0x2d4c/0x2dc0 [ 327.062668][T19128] do_syscall_64+0xc9/0x1c0 [ 327.062686][T19128] ? clear_bhb_loop+0x55/0xb0 [ 327.062706][T19128] ? clear_bhb_loop+0x55/0xb0 [ 327.062778][T19128] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.062810][T19128] RIP: 0033:0x7fbac1780809 [ 327.062885][T19128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.199436][T19128] RSP: 002b:00007fbabfdf6e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 327.199457][T19128] RAX: ffffffffffffffda RBX: 0000000000000464 RCX: 00007fbac1780809 [ 327.199468][T19128] RDX: 00007fbabfdf6f10 RSI: 0000000000000000 RDI: 00007fbac17f41c1 [ 327.199479][T19128] RBP: 00000000200004c0 R08: 00007fbabfdf6bd7 R09: 00007fbabfdf6e60 [ 327.199490][T19128] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000480 [ 327.199501][T19128] R13: 00007fbabfdf6f10 R14: 00007fbabfdf6ed0 R15: 0000000020000000 [ 327.199518][T19128] [ 327.283859][T19135] syzkaller0: entered promiscuous mode [ 327.283946][T19135] syzkaller0: entered allmulticast mode [ 327.624443][T19158] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19158 comm=syz.6.3299 [ 327.725168][T19170] FAULT_INJECTION: forcing a failure. [ 327.725168][T19170] name failslab, interval 1, probability 0, space 0, times 0 [ 327.737866][T19170] CPU: 0 UID: 0 PID: 19170 Comm: syz.6.3304 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 327.748296][T19170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 327.748312][T19170] Call Trace: [ 327.748318][T19170] [ 327.748326][T19170] dump_stack_lvl+0xf2/0x150 [ 327.748346][T19170] dump_stack+0x15/0x20 [ 327.748372][T19170] should_fail_ex+0x223/0x230 [ 327.748401][T19170] should_failslab+0x8f/0xb0 [ 327.748468][T19170] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 327.748498][T19170] ? __d_alloc+0x3d/0x340 [ 327.748576][T19170] __d_alloc+0x3d/0x340 [ 327.748601][T19170] d_alloc_pseudo+0x1e/0x80 [ 327.748629][T19170] alloc_file_pseudo+0x70/0x140 [ 327.748653][T19170] __shmem_file_setup+0x1bb/0x1f0 [ 327.748702][T19170] shmem_file_setup+0x3b/0x50 [ 327.748724][T19170] __se_sys_memfd_create+0x31d/0x5c0 [ 327.748766][T19170] __x64_sys_memfd_create+0x31/0x40 [ 327.748799][T19170] x64_sys_call+0x2d4c/0x2dc0 [ 327.748821][T19170] do_syscall_64+0xc9/0x1c0 [ 327.748836][T19170] ? clear_bhb_loop+0x55/0xb0 [ 327.748906][T19170] ? clear_bhb_loop+0x55/0xb0 [ 327.748950][T19170] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.748975][T19170] RIP: 0033:0x7fbac1780809 [ 327.749024][T19170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.749045][T19170] RSP: 002b:00007fbabfdf6e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 327.749066][T19170] RAX: ffffffffffffffda RBX: 0000000000000b9e RCX: 00007fbac1780809 [ 327.749079][T19170] RDX: 00007fbabfdf6f10 RSI: 0000000000000000 RDI: 00007fbac17f41c1 [ 327.749093][T19170] RBP: 0000000020000c80 R08: 00007fbabfdf6bd7 R09: 00007fbabfdf6e60 [ 327.749143][T19170] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000c00 [ 327.749154][T19170] R13: 00007fbabfdf6f10 R14: 00007fbabfdf6ed0 R15: 0000000020000c40 [ 327.749169][T19170] [ 328.374156][T19217] xt_CT: No such helper "snmp_trap" [ 328.686596][T19245] FAULT_INJECTION: forcing a failure. [ 328.686596][T19245] name failslab, interval 1, probability 0, space 0, times 0 [ 328.699350][T19245] CPU: 0 UID: 0 PID: 19245 Comm: syz.9.3337 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 328.710066][T19245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 328.720128][T19245] Call Trace: [ 328.723400][T19245] [ 328.726490][T19245] dump_stack_lvl+0xf2/0x150 [ 328.731085][T19245] dump_stack+0x15/0x20 [ 328.735303][T19245] should_fail_ex+0x223/0x230 [ 328.740005][T19245] should_failslab+0x8f/0xb0 [ 328.744654][T19245] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 328.750382][T19245] ? __d_alloc+0x3d/0x340 [ 328.754721][T19245] __d_alloc+0x3d/0x340 [ 328.758913][T19245] d_alloc_pseudo+0x1e/0x80 [ 328.763454][T19245] alloc_file_pseudo+0x70/0x140 [ 328.768404][T19245] __shmem_file_setup+0x1bb/0x1f0 [ 328.773500][T19245] shmem_file_setup+0x3b/0x50 [ 328.773525][T19245] __se_sys_memfd_create+0x31d/0x5c0 [ 328.773551][T19245] __x64_sys_memfd_create+0x31/0x40 [ 328.773584][T19245] x64_sys_call+0x2d4c/0x2dc0 [ 328.773612][T19245] do_syscall_64+0xc9/0x1c0 [ 328.773707][T19245] ? clear_bhb_loop+0x55/0xb0 [ 328.773722][T19245] ? clear_bhb_loop+0x55/0xb0 [ 328.773738][T19245] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.773764][T19245] RIP: 0033:0x7f24919c0809 [ 328.773778][T19245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.773863][T19245] RSP: 002b:00007f2490036d88 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 328.773881][T19245] RAX: ffffffffffffffda RBX: 000000000000061b RCX: 00007f24919c0809 [ 328.773892][T19245] RDX: 00007f2490036e0c RSI: 0000000000000000 RDI: 00007f2491a341c1 [ 328.773903][T19245] RBP: 0000000020001a40 R08: 00007f2490036b27 R09: 0000000000000000 [ 328.773914][T19245] R10: 000000000000000a R11: 0000000000000206 R12: 0000000000000001 [ 328.773925][T19245] R13: 00007f2490036e0c R14: 00007f2490036e10 R15: 00007fff4e4b4328 [ 328.852757][T19257] FAULT_INJECTION: forcing a failure. [ 328.852757][T19257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 328.854072][T19245] [ 328.902843][T19257] CPU: 1 UID: 0 PID: 19257 Comm: syz.0.3340 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 328.902916][T19257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 328.902928][T19257] Call Trace: [ 328.902947][T19257] [ 328.902954][T19257] dump_stack_lvl+0xf2/0x150 [ 328.902974][T19257] dump_stack+0x15/0x20 [ 328.902992][T19257] should_fail_ex+0x223/0x230 [ 328.903018][T19257] should_fail+0xb/0x10 [ 328.903054][T19257] should_fail_usercopy+0x1a/0x20 [ 328.903083][T19257] _copy_to_user+0x20/0xa0 [ 328.903098][T19257] simple_read_from_buffer+0xa0/0x110 [ 328.903126][T19257] proc_fail_nth_read+0xf9/0x140 [ 328.903182][T19257] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 328.903219][T19257] vfs_read+0x1a2/0x700 [ 328.903314][T19257] ? __rcu_read_unlock+0x4e/0x70 [ 328.903331][T19257] ? __fget_files+0x17c/0x1c0 [ 328.903357][T19257] ksys_read+0xe8/0x1b0 [ 328.903382][T19257] __x64_sys_read+0x42/0x50 [ 328.903444][T19257] x64_sys_call+0x2874/0x2dc0 [ 328.903467][T19257] do_syscall_64+0xc9/0x1c0 [ 328.903482][T19257] ? clear_bhb_loop+0x55/0xb0 [ 328.903551][T19257] ? clear_bhb_loop+0x55/0xb0 [ 328.903600][T19257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.903629][T19257] RIP: 0033:0x7f82ea09f21c [ 328.903674][T19257] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 328.903693][T19257] RSP: 002b:00007f82e8717050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 328.903713][T19257] RAX: ffffffffffffffda RBX: 00007f82ea265fa0 RCX: 00007f82ea09f21c [ 328.903755][T19257] RDX: 000000000000000f RSI: 00007f82e87170b0 RDI: 0000000000000004 [ 328.903766][T19257] RBP: 00007f82e87170a0 R08: 0000000000000000 R09: 0000000000000000 [ 328.903778][T19257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.903792][T19257] R13: 0000000000000000 R14: 00007f82ea265fa0 R15: 00007fffa66cf908 [ 328.903810][T19257] [ 329.102072][T19285] FAULT_INJECTION: forcing a failure. [ 329.102072][T19285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 329.117153][T19285] CPU: 0 UID: 0 PID: 19285 Comm: +}[@ Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 329.117177][T19285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 329.117190][T19285] Call Trace: [ 329.117195][T19285] [ 329.117202][T19285] dump_stack_lvl+0xf2/0x150 [ 329.117222][T19285] dump_stack+0x15/0x20 [ 329.117237][T19285] should_fail_ex+0x223/0x230 [ 329.117275][T19285] should_fail+0xb/0x10 [ 329.117295][T19285] should_fail_usercopy+0x1a/0x20 [ 329.117319][T19285] _copy_from_user+0x1e/0xb0 [ 329.117335][T19285] memdup_user+0x64/0xc0 [ 329.117363][T19285] strndup_user+0x68/0xa0 [ 329.117402][T19285] __se_sys_request_key+0x117/0x290 [ 329.117420][T19285] ? fput+0x1c4/0x200 [ 329.117446][T19285] __x64_sys_request_key+0x55/0x70 [ 329.117483][T19285] x64_sys_call+0x296e/0x2dc0 [ 329.117510][T19285] do_syscall_64+0xc9/0x1c0 [ 329.117528][T19285] ? clear_bhb_loop+0x55/0xb0 [ 329.117547][T19285] ? clear_bhb_loop+0x55/0xb0 [ 329.117630][T19285] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 329.117661][T19285] RIP: 0033:0x7f82ea0a0809 [ 329.117676][T19285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.117695][T19285] RSP: 002b:00007f82e8717058 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 329.117794][T19285] RAX: ffffffffffffffda RBX: 00007f82ea265fa0 RCX: 00007f82ea0a0809 [ 329.117807][T19285] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 329.117866][T19285] RBP: 00007f82e87170a0 R08: 0000000000000000 R09: 0000000000000000 [ 329.117877][T19285] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 329.117888][T19285] R13: 0000000000000000 R14: 00007f82ea265fa0 R15: 00007fffa66cf908 [ 329.117904][T19285] [ 330.745477][ T29] kauditd_printk_skb: 14520 callbacks suppressed [ 330.745489][ T29] audit: type=1400 audit(1732740755.470:176590): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.773924][ T29] audit: type=1400 audit(1732740755.470:176589): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.797851][ T29] audit: type=1400 audit(1732740755.520:176592): avc: denied { read } for pid=3058 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.819195][ T29] audit: type=1400 audit(1732740755.520:176591): avc: denied { read } for pid=3002 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.828009][ T29] audit: type=1400 audit(1732740755.520:176593): avc: denied { read write } for pid=10598 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.868020][ T29] audit: type=1400 audit(1732740755.560:176594): avc: denied { read write } for pid=6326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.909426][ T29] audit: type=1400 audit(1732740755.590:176595): avc: denied { map_create } for pid=19377 comm="syz.0.3391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.928886][ T29] audit: type=1400 audit(1732740755.590:176596): avc: denied { prog_load } for pid=19377 comm="syz.0.3391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.928906][ T29] audit: type=1400 audit(1732740755.590:176597): avc: denied { prog_load } for pid=19377 comm="syz.0.3391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.967505][ T29] audit: type=1400 audit(1732740755.590:176598): avc: denied { map_create } for pid=19377 comm="syz.0.3391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.310410][T19419] FAULT_INJECTION: forcing a failure. [ 331.310410][T19419] name failslab, interval 1, probability 0, space 0, times 0 [ 331.323109][T19419] CPU: 1 UID: 0 PID: 19419 Comm: syz.6.3409 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 331.323188][T19419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 331.323201][T19419] Call Trace: [ 331.323208][T19419] [ 331.323214][T19419] dump_stack_lvl+0xf2/0x150 [ 331.323238][T19419] dump_stack+0x15/0x20 [ 331.323253][T19419] should_fail_ex+0x223/0x230 [ 331.363398][T19419] should_failslab+0x8f/0xb0 [ 331.363424][T19419] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 331.373754][T19419] ? __d_alloc+0x3d/0x340 [ 331.378096][T19419] __d_alloc+0x3d/0x340 [ 331.378152][T19419] d_alloc_pseudo+0x1e/0x80 [ 331.378239][T19419] alloc_file_pseudo+0x70/0x140 [ 331.378266][T19419] hugetlb_file_setup+0x290/0x3c0 [ 331.396716][T19419] ksys_mmap_pgoff+0x172/0x330 [ 331.396741][T19419] x64_sys_call+0x1940/0x2dc0 [ 331.396785][T19419] do_syscall_64+0xc9/0x1c0 [ 331.396805][T19419] ? clear_bhb_loop+0x55/0xb0 [ 331.396825][T19419] ? clear_bhb_loop+0x55/0xb0 [ 331.396844][T19419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.426039][T19419] RIP: 0033:0x7fbac1780809 [ 331.426059][T19419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 331.426076][T19419] RSP: 002b:00007fbabfdf7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 331.426097][T19419] RAX: ffffffffffffffda RBX: 00007fbac1945fa0 RCX: 00007fbac1780809 [ 331.426111][T19419] RDX: 0000000003000002 RSI: 0000000000c00000 RDI: 0000000020400000 [ 331.426125][T19419] RBP: 00007fbabfdf70a0 R08: ffffffffffffffff R09: 0000000000000000 [ 331.426139][T19419] R10: 000000000005d031 R11: 0000000000000246 R12: 0000000000000001 [ 331.426231][T19419] R13: 0000000000000000 R14: 00007fbac1945fa0 R15: 00007ffdaac2db08 [ 331.426248][T19419] [ 332.001029][T19484] loop0: detected capacity change from 0 to 164 [ 332.027846][T19484] Unable to read rock-ridge attributes [ 332.046407][T19484] Unable to read rock-ridge attributes [ 332.187595][T19499] x_tables: arp_tables: .0 target: invalid size 8 (kernel) != (user) 0 [ 332.231935][T19503] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 332.248268][T19505] ip6tnl0: entered promiscuous mode [ 332.253572][T19505] vlan0: entered promiscuous mode [ 332.260238][T19505] ip6tnl0: left promiscuous mode [ 332.297621][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 332.330151][T19515] netlink: 24 bytes leftover after parsing attributes in process `syz.9.3449'. [ 332.373165][ T7568] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 332.382328][ T7568] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 333.267392][T19548] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 333.334369][T19551] Invalid option length (1048127) for dns_resolver key [ 333.345861][T19552] loop6: detected capacity change from 0 to 128 [ 333.364962][T19552] EXT4-fs: Ignoring removed nobh option [ 333.378307][T19561] netlink: 3 bytes leftover after parsing attributes in process `+}[@'. [ 333.387721][T19552] EXT4-fs (loop6): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 333.391693][T19561] 0ªX¹¦À: renamed from caif0 [ 333.407591][T19561] 0ªX¹¦À: entered allmulticast mode [ 333.412806][T19561] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 333.415792][T19552] ext4 filesystem being mounted at /494/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 333.441018][T19564] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3465'. [ 333.456798][T19564] loop2: detected capacity change from 0 to 256 [ 333.478523][T19564] FAT-fs (loop2): Directory bread(block 64) failed [ 333.485202][T19564] FAT-fs (loop2): Directory bread(block 65) failed [ 333.492534][T19564] FAT-fs (loop2): Directory bread(block 66) failed [ 333.500548][T19564] FAT-fs (loop2): Directory bread(block 67) failed [ 333.507983][T19564] FAT-fs (loop2): Directory bread(block 68) failed [ 333.514766][T19564] FAT-fs (loop2): Directory bread(block 69) failed [ 333.522515][T19564] FAT-fs (loop2): Directory bread(block 70) failed [ 333.529181][T19564] FAT-fs (loop2): Directory bread(block 71) failed [ 333.546787][T19564] FAT-fs (loop2): Directory bread(block 72) failed [ 333.553470][T19564] FAT-fs (loop2): Directory bread(block 73) failed [ 333.642106][T19573] x_tables: arp_tables: .0 target: invalid size 8 (kernel) != (user) 0 [ 333.673543][T19575] x_tables: arp_tables: .0 target: invalid size 8 (kernel) != (user) 0 [ 334.147926][T11428] EXT4-fs (loop6): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 334.267583][T19588] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 334.302825][T19587] Invalid option length (1048127) for dns_resolver key [ 334.385563][T19596] syzkaller0: entered promiscuous mode [ 334.391147][T19596] syzkaller0: entered allmulticast mode [ 334.533024][T19602] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3481'. [ 334.584918][T19606] loop1: detected capacity change from 0 to 132 [ 334.680671][T19614] loop6: detected capacity change from 0 to 128 [ 334.688021][T19614] FAT-fs (loop6): invalid media value (0x00) [ 334.694072][T19614] FAT-fs (loop6): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 334.703439][T19614] FAT-fs (loop6): Can't find a valid FAT filesystem [ 334.738028][T19617] loop6: detected capacity change from 0 to 512 [ 334.771521][T19617] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 334.784534][T19617] ext4 filesystem being mounted at /503/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 334.813727][T19617] Invalid option length (339) for dns_resolver key [ 334.857831][T11428] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 334.937532][T19629] bridge_slave_0: default FDB implementation only supports local addresses [ 335.202374][T19501] 9pnet_fd: p9_fd_create_tcp (19501): problem connecting socket to 127.0.0.1 [ 335.228247][T19638] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3496'. [ 335.266228][T19644] loop6: detected capacity change from 0 to 512 [ 335.268540][T19645] loop2: detected capacity change from 0 to 128 [ 335.279521][T19645] FAT-fs (loop2): invalid media value (0x00) [ 335.285590][T19645] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 335.294882][T19645] FAT-fs (loop2): Can't find a valid FAT filesystem [ 335.297055][T19644] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 335.314268][T19644] ext4 filesystem being mounted at /511/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 335.333389][T19644] Invalid option length (339) for dns_resolver key [ 335.363381][T11428] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 335.592341][T19671] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3508'. [ 335.655830][T19676] loop6: detected capacity change from 0 to 128 [ 335.663632][T19676] FAT-fs (loop6): invalid media value (0x00) [ 335.670060][T19676] FAT-fs (loop6): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 335.679509][T19676] FAT-fs (loop6): Can't find a valid FAT filesystem [ 335.708041][T19675] x_tables: arp_tables: .0 target: invalid size 8 (kernel) != (user) 0 [ 335.752324][T19678] loop6: detected capacity change from 0 to 8192 [ 335.835935][ T29] kauditd_printk_skb: 3484 callbacks suppressed [ 335.835948][ T29] audit: type=1326 audit(1732740760.560:180081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 335.898863][ T29] audit: type=1326 audit(1732740760.590:180082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 335.922681][ T29] audit: type=1326 audit(1732740760.590:180083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 335.946461][ T29] audit: type=1326 audit(1732740760.590:180084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 335.970110][ T29] audit: type=1326 audit(1732740760.590:180085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 335.993821][ T29] audit: type=1326 audit(1732740760.590:180086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=36 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 336.017478][ T29] audit: type=1326 audit(1732740760.590:180087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 336.041247][ T29] audit: type=1326 audit(1732740760.590:180088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 336.064993][ T29] audit: type=1326 audit(1732740760.590:180089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 336.088701][ T29] audit: type=1326 audit(1732740760.590:180090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19692 comm="syz.0.3518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 336.179847][T19698] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 336.222822][T19703] loop9: detected capacity change from 0 to 128 [ 336.229885][T19703] FAT-fs (loop9): invalid media value (0x00) [ 336.235987][T19703] FAT-fs (loop9): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 336.245327][T19703] FAT-fs (loop9): Can't find a valid FAT filesystem [ 336.312726][T19711] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 336.394062][T19718] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3526'. [ 336.411163][T19718] loop6: detected capacity change from 0 to 256 [ 336.426199][T19718] FAT-fs (loop6): Directory bread(block 64) failed [ 336.432914][T19718] FAT-fs (loop6): Directory bread(block 65) failed [ 336.439582][T19718] FAT-fs (loop6): Directory bread(block 66) failed [ 336.446273][T19718] FAT-fs (loop6): Directory bread(block 67) failed [ 336.452985][T19718] FAT-fs (loop6): Directory bread(block 68) failed [ 336.459717][T19718] FAT-fs (loop6): Directory bread(block 69) failed [ 336.466832][T19718] FAT-fs (loop6): Directory bread(block 70) failed [ 336.473611][T19718] FAT-fs (loop6): Directory bread(block 71) failed [ 336.480472][T19718] FAT-fs (loop6): Directory bread(block 72) failed [ 336.488672][T19718] FAT-fs (loop6): Directory bread(block 73) failed [ 336.737364][T19723] loop0: detected capacity change from 0 to 8192 [ 336.823055][T19729] syzkaller0: entered promiscuous mode [ 336.828671][T19729] syzkaller0: entered allmulticast mode [ 336.966918][T19732] loop1: detected capacity change from 0 to 8192 [ 337.064073][T19735] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3534'. [ 337.090524][T19737] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 337.265871][T19745] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3538'. [ 337.285219][T19744] loop0: detected capacity change from 0 to 256 [ 337.300459][T19744] FAT-fs (loop0): Directory bread(block 64) failed [ 337.321091][T19749] ip6tnl0: entered promiscuous mode [ 337.327759][T19744] FAT-fs (loop0): Directory bread(block 65) failed [ 337.334367][T19744] FAT-fs (loop0): Directory bread(block 66) failed [ 337.342450][T19749] vlan0: entered promiscuous mode [ 337.351346][T19749] ip6tnl0: left promiscuous mode [ 337.356451][T19744] FAT-fs (loop0): Directory bread(block 67) failed [ 337.363957][T19744] FAT-fs (loop0): Directory bread(block 68) failed [ 337.372850][T19744] FAT-fs (loop0): Directory bread(block 69) failed [ 337.389043][T19744] FAT-fs (loop0): Directory bread(block 70) failed [ 337.395936][T19744] FAT-fs (loop0): Directory bread(block 71) failed [ 337.402523][T19744] FAT-fs (loop0): Directory bread(block 72) failed [ 337.409226][T19744] FAT-fs (loop0): Directory bread(block 73) failed [ 337.609864][T19767] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3546'. [ 337.815183][T19779] netlink: 28 bytes leftover after parsing attributes in process `syz.9.3551'. [ 337.828004][T19779] loop9: detected capacity change from 0 to 256 [ 337.841365][T19779] FAT-fs (loop9): Directory bread(block 64) failed [ 337.848117][T19779] FAT-fs (loop9): Directory bread(block 65) failed [ 337.854672][T19779] FAT-fs (loop9): Directory bread(block 66) failed [ 337.861319][T19779] FAT-fs (loop9): Directory bread(block 67) failed [ 337.867877][T19779] FAT-fs (loop9): Directory bread(block 68) failed [ 337.874443][T19779] FAT-fs (loop9): Directory bread(block 69) failed [ 337.881030][T19779] FAT-fs (loop9): Directory bread(block 70) failed [ 337.888117][T19779] FAT-fs (loop9): Directory bread(block 71) failed [ 337.894650][T19779] FAT-fs (loop9): Directory bread(block 72) failed [ 337.901281][T19779] FAT-fs (loop9): Directory bread(block 73) failed [ 338.046483][T19792] syzkaller0: entered promiscuous mode [ 338.052024][T19792] syzkaller0: entered allmulticast mode [ 338.093464][T19794] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3558'. [ 338.213405][T19802] x_tables: arp_tables: .0 target: invalid size 8 (kernel) != (user) 0 [ 338.630081][ T3398] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 338.638119][ T3398] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 339.112201][T19830] ip6tnl0: entered promiscuous mode [ 339.117565][T19830] vlan0: entered promiscuous mode [ 339.124074][T19830] ip6tnl0: left promiscuous mode [ 339.182591][T19834] syzkaller0: entered promiscuous mode [ 339.188228][T19834] syzkaller0: entered allmulticast mode [ 339.231139][T19840] loop1: detected capacity change from 0 to 164 [ 339.238439][T19840] Unable to read rock-ridge attributes [ 339.245134][T19840] Unable to read rock-ridge attributes [ 339.325423][T19847] syzkaller0: entered promiscuous mode [ 339.331024][T19847] syzkaller0: entered allmulticast mode [ 339.359108][T19849] loop1: detected capacity change from 0 to 164 [ 339.366560][T19849] Unable to read rock-ridge attributes [ 339.374061][T19849] Unable to read rock-ridge attributes [ 339.426580][T19853] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3580'. [ 339.597723][T19868] syzkaller0: entered promiscuous mode [ 339.603342][T19868] syzkaller0: entered allmulticast mode [ 339.723425][T19881] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3594'. [ 339.730233][T19879] syzkaller0: entered promiscuous mode [ 339.737950][T19879] syzkaller0: entered allmulticast mode [ 339.998376][T19911] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3605'. [ 340.042468][T19914] loop9: detected capacity change from 0 to 164 [ 340.050214][T19914] Unable to read rock-ridge attributes [ 340.065859][T19914] Unable to read rock-ridge attributes [ 340.091302][T19918] loop6: detected capacity change from 0 to 256 [ 340.110441][T19918] FAT-fs (loop6): Directory bread(block 64) failed [ 340.121186][T19918] FAT-fs (loop6): Directory bread(block 65) failed [ 340.132029][T19918] FAT-fs (loop6): Directory bread(block 66) failed [ 340.151963][T19918] FAT-fs (loop6): Directory bread(block 67) failed [ 340.159210][T19918] FAT-fs (loop6): Directory bread(block 68) failed [ 340.168025][T19918] FAT-fs (loop6): Directory bread(block 69) failed [ 340.176481][T19918] FAT-fs (loop6): Directory bread(block 70) failed [ 340.183361][T19918] FAT-fs (loop6): Directory bread(block 71) failed [ 340.202843][T19918] FAT-fs (loop6): Directory bread(block 72) failed [ 340.215314][T19918] FAT-fs (loop6): Directory bread(block 73) failed [ 340.329128][T19939] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3617'. [ 340.522336][T19959] loop9: detected capacity change from 0 to 2048 [ 340.585927][T19959] loop9: p1 < > p2 p3 < p5 > p4 [ 340.591004][T19959] loop9: partition table partially beyond EOD, truncated [ 340.600869][T19959] loop9: p1 start 4278190080 is beyond EOD, truncated [ 340.607689][T19959] loop9: p2 start 16908800 is beyond EOD, truncated [ 340.616773][T19959] loop9: p4 start 11326 is beyond EOD, truncated [ 340.623167][T19959] loop9: p5 start 16908800 is beyond EOD, truncated [ 340.710122][T19974] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3631'. [ 340.728052][T19979] loop9: detected capacity change from 0 to 512 [ 340.739068][T19981] ip6tnl0: entered promiscuous mode [ 340.744424][T19981] vlan0: entered promiscuous mode [ 340.750959][T19981] ip6tnl0: left promiscuous mode [ 340.752161][T19979] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 340.768574][T19979] ext4 filesystem being mounted at /471/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 340.800220][T19979] Invalid option length (339) for dns_resolver key [ 340.831042][T12726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 340.868758][T19990] loop2: detected capacity change from 0 to 8192 [ 340.948825][T19996] loop9: detected capacity change from 0 to 8192 [ 341.233099][ T29] kauditd_printk_skb: 404 callbacks suppressed [ 341.233114][ T29] audit: type=1326 audit(1732740765.950:180495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.277107][T20007] loop1: detected capacity change from 0 to 164 [ 341.282813][ T29] audit: type=1326 audit(1732740765.950:180496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.307385][ T29] audit: type=1326 audit(1732740765.980:180497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.331269][ T29] audit: type=1326 audit(1732740765.980:180498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.355059][ T29] audit: type=1326 audit(1732740765.980:180499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.355234][T20007] Unable to read rock-ridge attributes [ 341.378828][ T29] audit: type=1326 audit(1732740765.990:180500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.378854][ T29] audit: type=1326 audit(1732740765.990:180501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.378878][ T29] audit: type=1326 audit(1732740765.990:180502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.439538][T20007] Unable to read rock-ridge attributes [ 341.455934][ T29] audit: type=1326 audit(1732740765.990:180503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.484896][ T29] audit: type=1326 audit(1732740765.990:180504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20006 comm="syz.1.3643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1f21f0809 code=0x7ffc0000 [ 341.581549][T20019] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3644'. [ 341.587413][T20016] loop0: detected capacity change from 0 to 164 [ 341.603561][T20016] Unable to read rock-ridge attributes [ 341.615439][T20016] Unable to read rock-ridge attributes [ 341.663877][T20027] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3651'. [ 341.713616][T20035] syzkaller0: entered promiscuous mode [ 341.719239][T20035] syzkaller0: entered allmulticast mode [ 341.851197][T20042] loop9: detected capacity change from 0 to 128 [ 341.858494][T20042] FAT-fs (loop9): invalid media value (0x00) [ 341.864493][T20042] FAT-fs (loop9): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 341.873853][T20042] FAT-fs (loop9): Can't find a valid FAT filesystem [ 342.128195][T20078] loop1: detected capacity change from 0 to 128 [ 342.134893][T20078] FAT-fs (loop1): invalid media value (0x00) [ 342.140970][T20078] FAT-fs (loop1): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 342.150277][T20078] FAT-fs (loop1): Can't find a valid FAT filesystem [ 342.175230][ T6212] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.184058][ T6212] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 342.208314][T20085] syzkaller0: entered promiscuous mode [ 342.213796][T20085] syzkaller0: entered allmulticast mode [ 342.439332][T20100] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 342.448784][T20100] loop1: detected capacity change from 0 to 512 [ 342.455564][T20100] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 342.476748][T20100] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.3679: corrupted in-inode xattr: e_name out of bounds [ 342.491148][T20100] EXT4-fs (loop1): Remounting filesystem read-only [ 342.497683][T20100] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2863: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 342.510767][T20100] EXT4-fs (loop1): 1 truncate cleaned up [ 342.516773][T20100] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 342.529375][T20100] SELinux: (dev loop1, type ext4) getxattr errno 5 [ 342.537532][T20100] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 342.589653][T20107] loop1: detected capacity change from 0 to 128 [ 342.591289][T20103] loop2: detected capacity change from 0 to 8192 [ 342.596566][T20107] FAT-fs (loop1): invalid media value (0x00) [ 342.608365][T20107] FAT-fs (loop1): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 342.617693][T20107] FAT-fs (loop1): Can't find a valid FAT filesystem [ 342.844685][ T7568] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 342.852723][ T7568] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 342.855570][T20115] __nla_validate_parse: 2 callbacks suppressed [ 342.855583][T20115] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3685'. [ 342.893457][T20117] loop0: detected capacity change from 0 to 512 [ 342.917006][T20117] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 342.929570][T20117] ext4 filesystem being mounted at /513/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 342.950159][T20117] Invalid option length (339) for dns_resolver key [ 342.973156][T10598] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 342.989477][T20123] loop6: detected capacity change from 0 to 164 [ 342.996835][T20123] Unable to read rock-ridge attributes [ 343.004044][T20123] Unable to read rock-ridge attributes [ 343.071351][ T7568] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 343.079563][ T7568] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 343.371310][ T6251] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 343.379279][ T6251] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 343.612429][T20150] loop1: detected capacity change from 0 to 256 [ 343.624535][T20150] FAT-fs (loop1): Directory bread(block 64) failed [ 343.631160][T20150] FAT-fs (loop1): Directory bread(block 65) failed [ 343.637695][T20150] FAT-fs (loop1): Directory bread(block 66) failed [ 343.644228][T20150] FAT-fs (loop1): Directory bread(block 67) failed [ 343.650821][T20150] FAT-fs (loop1): Directory bread(block 68) failed [ 343.657439][T20150] FAT-fs (loop1): Directory bread(block 69) failed [ 343.663963][T20150] FAT-fs (loop1): Directory bread(block 70) failed [ 343.670497][T20150] FAT-fs (loop1): Directory bread(block 71) failed [ 343.677048][T20150] FAT-fs (loop1): Directory bread(block 72) failed [ 343.683606][T20150] FAT-fs (loop1): Directory bread(block 73) failed [ 343.746759][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 343.938381][T20158] loop9: detected capacity change from 0 to 128 [ 343.945174][T20158] FAT-fs (loop9): invalid media value (0x00) [ 343.951347][T20158] FAT-fs (loop9): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 343.960760][T20158] FAT-fs (loop9): Can't find a valid FAT filesystem [ 344.338846][ T6212] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 344.346630][ T6212] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 344.539537][T20189] loop2: detected capacity change from 0 to 128 [ 344.546330][T20189] FAT-fs (loop2): invalid media value (0x00) [ 344.552418][T20189] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 344.561815][T20189] FAT-fs (loop2): Can't find a valid FAT filesystem [ 344.582769][T20192] loop2: detected capacity change from 0 to 512 [ 344.596794][T20192] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 344.609467][T20192] ext4 filesystem being mounted at /601/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 344.630250][T20192] Invalid option length (339) for dns_resolver key [ 344.653018][ T7385] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 344.694165][T20198] loop2: detected capacity change from 0 to 8192 [ 344.947736][T20203] loop9: detected capacity change from 0 to 2048 [ 344.961202][T20205] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3718'. [ 344.980927][T20207] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3716'. [ 344.995760][T20203] loop9: p1 < > p2 p3 < p5 > p4 [ 345.000734][T20203] loop9: partition table partially beyond EOD, truncated [ 345.015006][T20203] loop9: p1 start 4278190080 is beyond EOD, truncated [ 345.021927][T20203] loop9: p2 start 16908800 is beyond EOD, truncated [ 345.031006][T20203] loop9: p4 start 11326 is beyond EOD, truncated [ 345.033382][T20209] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3719'. [ 345.037488][T20203] loop9: p5 start 16908800 is beyond EOD, truncated [ 345.080295][T20214] loop2: detected capacity change from 0 to 256 [ 345.097590][T20214] FAT-fs (loop2): Directory bread(block 64) failed [ 345.104205][T20214] FAT-fs (loop2): Directory bread(block 65) failed [ 345.110932][T20214] FAT-fs (loop2): Directory bread(block 66) failed [ 345.119257][T20214] FAT-fs (loop2): Directory bread(block 67) failed [ 345.125968][T20214] FAT-fs (loop2): Directory bread(block 68) failed [ 345.147821][T20214] FAT-fs (loop2): Directory bread(block 69) failed [ 345.154579][T20214] FAT-fs (loop2): Directory bread(block 70) failed [ 345.161188][T20214] FAT-fs (loop2): Directory bread(block 71) failed [ 345.167821][T20214] FAT-fs (loop2): Directory bread(block 72) failed [ 345.184882][T20214] FAT-fs (loop2): Directory bread(block 73) failed [ 345.228949][T20225] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3725'. [ 345.288383][T20227] loop6: detected capacity change from 0 to 8192 [ 345.513386][ T3397] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 345.524101][ T3397] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz0 [ 345.591105][ T6212] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 345.599035][ T6212] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 [ 345.634465][T20257] loop6: detected capacity change from 0 to 2048 [ 345.675638][T20257] loop6: p1 < > p2 p3 < p5 > p4 [ 345.680637][T20257] loop6: partition table partially beyond EOD, truncated [ 345.687824][T20257] loop6: p1 start 4278190080 is beyond EOD, truncated [ 345.694584][T20257] loop6: p2 start 16908800 is beyond EOD, truncated [ 345.701676][T20257] loop6: p4 start 11326 is beyond EOD, truncated [ 345.708116][T20257] loop6: p5 start 16908800 is beyond EOD, truncated [ 345.873118][ T6212] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 345.881008][ T6212] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz0 [ 345.997567][ T6212] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 346.006438][ T6212] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz0 [ 346.365417][ T29] kauditd_printk_skb: 1742 callbacks suppressed [ 346.365430][ T29] audit: type=1326 audit(1732740771.090:182247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.396549][ T29] audit: type=1326 audit(1732740771.090:182248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.423787][ T29] audit: type=1326 audit(1732740771.140:182249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.431665][T20288] FAULT_INJECTION: forcing a failure. [ 346.431665][T20288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.447465][ T29] audit: type=1326 audit(1732740771.140:182250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.460474][T20288] CPU: 1 UID: 0 PID: 20288 Comm: syz.1.3746 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 346.494477][T20288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 346.504533][T20288] Call Trace: [ 346.507801][T20288] [ 346.510758][T20288] dump_stack_lvl+0xf2/0x150 [ 346.515344][T20288] dump_stack+0x15/0x20 [ 346.519486][T20288] should_fail_ex+0x223/0x230 [ 346.524209][T20288] should_fail+0xb/0x10 [ 346.528386][T20288] should_fail_usercopy+0x1a/0x20 [ 346.533434][T20288] _copy_from_user+0x1e/0xb0 [ 346.538112][T20288] copy_msghdr_from_user+0x54/0x2a0 [ 346.543336][T20288] __sys_sendmmsg+0x1e8/0x4b0 [ 346.548103][T20288] __x64_sys_sendmmsg+0x57/0x70 [ 346.552947][T20288] x64_sys_call+0x29aa/0x2dc0 [ 346.557701][T20288] do_syscall_64+0xc9/0x1c0 [ 346.562265][T20288] ? clear_bhb_loop+0x55/0xb0 [ 346.566929][T20288] ? clear_bhb_loop+0x55/0xb0 [ 346.571643][T20288] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.577537][T20288] RIP: 0033:0x7fd1f21f0809 [ 346.581942][T20288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.601548][T20288] RSP: 002b:00007fd1f0867058 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 346.609965][T20288] RAX: ffffffffffffffda RBX: 00007fd1f23b5fa0 RCX: 00007fd1f21f0809 [ 346.617932][T20288] RDX: 0000000000000002 RSI: 0000000020000e00 RDI: 0000000000000003 [ 346.625897][T20288] RBP: 00007fd1f08670a0 R08: 0000000000000000 R09: 0000000000000000 [ 346.633874][T20288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.641909][T20288] R13: 0000000000000000 R14: 00007fd1f23b5fa0 R15: 00007ffe152a3988 [ 346.649916][T20288] [ 346.654563][ T29] audit: type=1326 audit(1732740771.180:182251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.678362][ T29] audit: type=1326 audit(1732740771.180:182252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.702320][ T29] audit: type=1326 audit(1732740771.180:182253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.726010][ T29] audit: type=1326 audit(1732740771.180:182254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.749769][ T29] audit: type=1326 audit(1732740771.180:182255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.773629][ T29] audit: type=1326 audit(1732740771.180:182256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.0.3745" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f82ea0a0809 code=0x7ffc0000 [ 346.835080][T20293] loop6: detected capacity change from 0 to 8192 [ 346.896095][T20301] loop0: detected capacity change from 0 to 256 [ 346.909138][T20301] FAT-fs (loop0): Directory bread(block 64) failed [ 346.916050][T20301] FAT-fs (loop0): Directory bread(block 65) failed [ 346.924044][T20301] FAT-fs (loop0): Directory bread(block 66) failed [ 346.930877][T20301] FAT-fs (loop0): Directory bread(block 67) failed [ 346.944900][T20301] FAT-fs (loop0): Directory bread(block 68) failed [ 346.973411][T20301] FAT-fs (loop0): Directory bread(block 69) failed [ 347.006895][T20301] FAT-fs (loop0): Directory bread(block 70) failed [ 347.023233][T20301] FAT-fs (loop0): Directory bread(block 71) failed [ 347.034298][T20301] FAT-fs (loop0): Directory bread(block 72) failed [ 347.042574][T20301] FAT-fs (loop0): Directory bread(block 73) failed [ 347.097229][ T6251] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 347.105164][ T6251] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz0 [ 347.208833][ T3394] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 347.224838][ T3394] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz0 [ 347.528177][T20348] loop9: detected capacity change from 0 to 8192 [ 347.547573][ T6212] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 347.555467][ T6212] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz0 [ 348.496319][ T3394] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 348.504758][ T3394] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz0 [ 348.560873][T20398] loop0: detected capacity change from 0 to 8192 [ 348.569658][ T3397] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 348.577184][T20402] loop1: detected capacity change from 0 to 256 [ 348.585526][ T3397] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz0 [ 348.642645][T20405] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3788'. [ 348.652438][T20402] FAT-fs (loop1): Directory bread(block 64) failed [ 348.661626][T20402] FAT-fs (loop1): Directory bread(block 65) failed [ 348.671435][T20402] FAT-fs (loop1): Directory bread(block 66) failed [ 348.678240][T20402] FAT-fs (loop1): Directory bread(block 67) failed [ 348.693373][T20402] FAT-fs (loop1): Directory bread(block 68) failed [ 348.700495][T20402] FAT-fs (loop1): Directory bread(block 69) failed [ 348.707383][T20402] FAT-fs (loop1): Directory bread(block 70) failed [ 348.717127][T20402] FAT-fs (loop1): Directory bread(block 71) failed [ 348.731349][T20402] FAT-fs (loop1): Directory bread(block 72) failed [ 348.738227][T20402] FAT-fs (loop1): Directory bread(block 73) failed [ 349.050253][T20433] FAULT_INJECTION: forcing a failure. [ 349.050253][T20433] name failslab, interval 1, probability 0, space 0, times 0 [ 349.062972][T20433] CPU: 1 UID: 0 PID: 20433 Comm: syz.6.3800 Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 349.073395][T20433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 349.083940][T20433] Call Trace: [ 349.087241][T20433] [ 349.090178][T20433] dump_stack_lvl+0xf2/0x150 [ 349.094774][T20433] dump_stack+0x15/0x20 [ 349.098943][T20433] should_fail_ex+0x223/0x230 [ 349.103635][T20433] should_failslab+0x8f/0xb0 [ 349.108226][T20433] kmem_cache_alloc_noprof+0x52/0x320 [ 349.113601][T20433] ? skb_clone+0x154/0x1f0 [ 349.118090][T20433] skb_clone+0x154/0x1f0 [ 349.122417][T20433] __netlink_deliver_tap+0x2bd/0x4f0 [ 349.127778][T20433] netlink_unicast+0x64a/0x670 [ 349.132658][T20433] netlink_sendmsg+0x5cc/0x6e0 [ 349.137419][T20433] ? __pfx_netlink_sendmsg+0x10/0x10 [ 349.142759][T20433] __sock_sendmsg+0x140/0x180 [ 349.147609][T20433] ____sys_sendmsg+0x312/0x410 [ 349.152406][T20433] __sys_sendmsg+0x19d/0x230 [ 349.156998][T20433] __x64_sys_sendmsg+0x46/0x50 [ 349.161753][T20433] x64_sys_call+0x2734/0x2dc0 [ 349.166427][T20433] do_syscall_64+0xc9/0x1c0 [ 349.170954][T20433] ? clear_bhb_loop+0x55/0xb0 [ 349.175619][T20433] ? clear_bhb_loop+0x55/0xb0 [ 349.180323][T20433] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.186217][T20433] RIP: 0033:0x7fbac1780809 [ 349.190635][T20433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.210427][T20433] RSP: 002b:00007fbabfdf7058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 349.218843][T20433] RAX: ffffffffffffffda RBX: 00007fbac1945fa0 RCX: 00007fbac1780809 [ 349.226812][T20433] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000007 [ 349.234825][T20433] RBP: 00007fbabfdf70a0 R08: 0000000000000000 R09: 0000000000000000 [ 349.242787][T20433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.250811][T20433] R13: 0000000000000000 R14: 00007fbac1945fa0 R15: 00007ffdaac2db08 [ 349.258792][T20433] [ 349.568862][T20459] loop1: detected capacity change from 0 to 1024 [ 349.651294][T20460] loop6: detected capacity change from 0 to 8192 [ 349.727879][T20469] loop1: detected capacity change from 0 to 512 [ 350.085878][ T6212] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 350.089177][T20469] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 350.103622][ T6212] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz0 [ 350.168645][T20469] ext4 filesystem being mounted at /657/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 350.452839][T20464] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 350.862245][T20518] loop0: detected capacity change from 0 to 512 [ 350.907798][T20518] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 350.937182][T20518] ext4 filesystem being mounted at /542/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 350.985967][T20523] loop2: detected capacity change from 0 to 8192 [ 351.135147][T10598] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 351.417408][T20527] chnl_net:caif_netlink_parms(): no params data found [ 351.433252][ T24] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 351.450961][ T24] hid-generic 0000:0000:0000.0012: hidraw0: HID v0.00 Device [syz1] on syz0 [ 351.489140][ T24] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 351.499321][T20527] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.506562][T20527] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.514197][T20527] bridge_slave_0: entered allmulticast mode [ 351.520658][T20527] bridge_slave_0: entered promiscuous mode [ 351.527301][ T24] hid-generic 0000:0000:0000.0013: hidraw0: HID v0.00 Device [syz1] on syz0 [ 351.536303][T20527] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.544115][T20527] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.553926][T20527] bridge_slave_1: entered allmulticast mode [ 351.561187][T20527] bridge_slave_1: entered promiscuous mode [ 351.600589][T20527] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 351.613343][T20527] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.618670][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 351.618788][ T29] audit: type=1400 audit(1732740776.340:182469): avc: denied { shutdown } for pid=20563 comm="syz.9.3843" lport=34462 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 351.651953][T20564] netlink: 256 bytes leftover after parsing attributes in process `syz.9.3843'. [ 351.663449][T20527] team0: Port device team_slave_0 added [ 351.671324][T20564] workqueue: Failed to create a rescuer kthread for wq "phy2": -EINTR [ 351.681766][T20527] team0: Port device team_slave_1 added [ 351.697385][T20573] loop9: detected capacity change from 0 to 512 [ 351.708907][T20573] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 351.721665][T20573] ext4 filesystem being mounted at /523/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 351.733167][T20527] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 351.740320][T20527] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 351.766251][T20527] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 351.777606][T20527] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 351.781610][T12726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 351.784548][T20527] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 351.819467][T20527] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 351.844189][ T29] audit: type=1326 audit(1732740776.560:182470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20577 comm="syz.9.3845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 351.868115][ T29] audit: type=1326 audit(1732740776.560:182471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20577 comm="syz.9.3845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 351.892017][ T29] audit: type=1326 audit(1732740776.560:182472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20577 comm="syz.9.3845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 351.917625][ T29] audit: type=1326 audit(1732740776.590:182473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20579 comm="syz.9.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 351.941397][ T29] audit: type=1326 audit(1732740776.590:182474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20579 comm="syz.9.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 351.965228][ T29] audit: type=1326 audit(1732740776.590:182475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20579 comm="syz.9.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 351.967764][T20527] hsr_slave_0: entered promiscuous mode [ 351.988888][ T29] audit: type=1326 audit(1732740776.610:182476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20579 comm="syz.9.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 352.018517][ T29] audit: type=1326 audit(1732740776.610:182477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20579 comm="syz.9.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 352.042220][ T29] audit: type=1326 audit(1732740776.610:182478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20579 comm="syz.9.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24919c0809 code=0x7ffc0000 [ 352.066367][T20527] hsr_slave_1: entered promiscuous mode [ 352.072201][T20527] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 352.080100][T20527] Cannot create hsr debugfs directory [ 352.296968][T20591] loop9: detected capacity change from 0 to 8192 [ 352.383014][T20527] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 352.393138][T20527] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 352.401666][T20527] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 352.410849][T20527] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 352.455807][T20527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 352.476607][T20527] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.494361][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.501474][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.526643][T20618] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3854'. [ 352.536334][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.543437][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.603431][T20629] loop6: detected capacity change from 0 to 512 [ 352.619135][T20629] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 352.638796][T20629] ext4 filesystem being mounted at /574/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 352.687332][T20527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 352.702551][T11428] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 352.863689][ T7568] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 352.871482][ T7568] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz1] on syz0 [ 352.875137][T20527] veth0_vlan: entered promiscuous mode [ 352.888993][T20527] veth1_vlan: entered promiscuous mode [ 352.901728][T20527] veth0_macvtap: entered promiscuous mode [ 352.908953][T20527] veth1_macvtap: entered promiscuous mode [ 352.918093][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 352.921016][ T3394] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 352.928584][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.939249][ T3394] hid-generic 0000:0000:0000.0015: hidraw1: HID v0.00 Device [syz1] on syz0 [ 352.945792][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 352.965888][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.975745][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 352.986199][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.996025][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 353.006500][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.016333][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 353.026983][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.036802][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 353.047265][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.057368][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 353.067795][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.078572][T20527] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 353.086694][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.097237][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.107194][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.117690][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.127587][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.138017][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.147856][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.158311][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.168140][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.178927][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.188831][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.199648][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.209604][T20527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 353.220160][T20527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.225168][T20678] loop9: detected capacity change from 0 to 512 [ 353.231678][T20527] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 353.251401][T20527] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.260225][T20527] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.264046][T20678] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 353.269090][T20527] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.285222][T20678] ext4 filesystem being mounted at /533/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 353.290145][T20527] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.343944][T20685] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3865'. [ 353.362861][T12726] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 353.369774][T20684] loop2: detected capacity change from 0 to 8192 [ 353.487273][T20527] ================================================================== [ 353.495388][T20527] BUG: KCSAN: data-race in generic_fillattr / inode_add_bytes [ 353.502875][T20527] [ 353.505190][T20527] read-write to 0xffff888122ad5848 of 8 bytes by task 20694 on cpu 0: [ 353.513401][T20527] inode_add_bytes+0x45/0xd0 [ 353.518086][T20527] __dquot_alloc_space+0x181/0x8a0 [ 353.523293][T20527] shmem_inode_acct_blocks+0x124/0x230 [ 353.528756][T20527] shmem_get_folio_gfp+0x5be/0xd90 [ 353.533867][T20527] shmem_write_begin+0xa2/0x180 [ 353.538712][T20527] generic_perform_write+0x1a8/0x4a0 [ 353.543995][T20527] shmem_file_write_iter+0xc2/0xe0 [ 353.549107][T20527] __kernel_write_iter+0x24b/0x4e0 [ 353.554224][T20527] dump_user_range+0x3ac/0x550 [ 353.558983][T20527] elf_core_dump+0x1bdc/0x1ce0 [ 353.563739][T20527] do_coredump+0x1898/0x1f40 [ 353.568356][T20527] get_signal+0xd4f/0x1000 [ 353.572762][T20527] arch_do_signal_or_restart+0x95/0x4b0 [ 353.578321][T20527] irqentry_exit_to_user_mode+0xa7/0x120 [ 353.583953][T20527] irqentry_exit+0x12/0x50 [ 353.588363][T20527] asm_exc_page_fault+0x26/0x30 [ 353.593220][T20527] [ 353.595537][T20527] read to 0xffff888122ad5848 of 8 bytes by task 20527 on cpu 1: [ 353.603155][T20527] generic_fillattr+0x274/0x330 [ 353.607998][T20527] shmem_getattr+0x17b/0x200 [ 353.612591][T20527] vfs_statx_path+0x171/0x2d0 [ 353.617266][T20527] vfs_statx+0xe1/0x170 [ 353.621414][T20527] __se_sys_newfstatat+0xdc/0x300 [ 353.626431][T20527] __x64_sys_newfstatat+0x55/0x70 [ 353.631454][T20527] x64_sys_call+0x236d/0x2dc0 [ 353.636127][T20527] do_syscall_64+0xc9/0x1c0 [ 353.640620][T20527] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.646512][T20527] [ 353.648820][T20527] value changed: 0x0000000000000ac8 -> 0x0000000000000ad0 [ 353.655911][T20527] [ 353.658220][T20527] Reported by Kernel Concurrency Sanitizer on: [ 353.664356][T20527] CPU: 1 UID: 0 PID: 20527 Comm: syz-executor Not tainted 6.12.0-syzkaller-10313-g7d4050728c83 #0 [ 353.674934][T20527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 353.684979][T20527] ================================================================== [ 361.910925][ T40] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 361.956663][ T40] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.006832][ T40] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.056560][ T40] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.161196][ T40] dvmrp0 (unregistering): left allmulticast mode [ 362.169787][ T40] dvmrp0 (unregistering): left allmulticast mode [ 362.183788][ T40] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 362.193501][ T40] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 362.203343][ T40] bond0 (unregistering): Released all slaves [ 362.212245][ T40] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 362.221761][ T40] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 362.231246][ T40] bond0 (unregistering): Released all slaves [ 362.284152][ T40] hsr_slave_0: left promiscuous mode [ 362.289812][ T40] hsr_slave_1: left promiscuous mode [ 362.295591][ T40] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 362.303010][ T40] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 362.312456][ T40] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 362.319952][ T40] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 362.329137][ T40] hsr_slave_0: left promiscuous mode [ 362.334876][ T40] hsr_slave_1: left promiscuous mode [ 362.340565][ T40] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 362.347974][ T40] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 362.355572][ T40] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 362.362953][ T40] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 362.373000][ T40] veth1_macvtap: left promiscuous mode [ 362.378482][ T40] veth0_macvtap: left promiscuous mode [ 362.383984][ T40] veth1_vlan: left promiscuous mode [ 362.389243][ T40] veth0_vlan: left promiscuous mode [ 362.394899][ T40] veth1_macvtap: left promiscuous mode [ 362.400375][ T40] veth0_macvtap: left promiscuous mode [ 362.405952][ T40] veth1_vlan: left promiscuous mode [ 362.411300][ T40] veth0_vlan: left promiscuous mode [ 362.489541][ T40] team0 (unregistering): Port device team_slave_1 removed [ 362.498875][ T40] team0 (unregistering): Port device team_slave_0 removed [ 362.557440][ T40] team0 (unregistering): Port device team_slave_1 removed [ 362.567449][ T40] team0 (unregistering): Port device team_slave_0 removed