last executing test programs: 3m17.805830288s ago: executing program 32 (id=1112): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) mount$9p_fd(0x0, &(0x7f0000000980)='.\x00', 0x0, 0x104000, 0x0) syz_clone(0x498144ee5f62e149, 0x0, 0x17, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x2) 2m34.764131926s ago: executing program 33 (id=1671): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r2) socket$tipc(0x1e, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) acct(&(0x7f0000001040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x14, r1, 0x31d}, 0x14}}, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x8001) 2m12.979755815s ago: executing program 34 (id=1936): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) io_setup(0x8, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004110000efffffff", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000714010000000000000000000900020073797a2f000000000800410072786500140033"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_PLIMIT={0x8, 0x8}]}}]}, 0x38}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000fa"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb85000000430000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='wbt_step\x00', r11}, 0x18) sync_file_range(0xffffffffffffffff, 0x8, 0x8004, 0x1) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r12}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) r13 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r13, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) socket$tipc(0x1e, 0x5, 0x0) 2m4.106229881s ago: executing program 35 (id=2038): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000200)=0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r0, 0x0, 0x0, 0x73a, 0x21) 2m3.63387605s ago: executing program 1 (id=2046): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x6}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x40}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x404c005}, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="418a1b7824cefc7472de0b0dc8"], 0xff57) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x597, &(0x7f0000000b80)="$eJzs3U1sG2UaAOB3xvH2L9t0pV1pd9VDtYtUpKpO0h8onNorolKlHpC4lMhxoyhOHMUONFEO6b1C9IAA9VJucOAI4sABcUHiwpULiDNSRSOQmh7AyH9pm9jBKXWdxs8jjT3ffON5v2/G73hmNCMHMLCO1V7SiP9ExKUkYuShuqFoVh5rzLe+tpK/v7aST6JavfxzEklE3FtbybfmT5rvhyJiNSL+HRFfZSNOpFvjlpeWZyaKxcJCszxamZ0fLS8tn5yenZgqTBXmTr/40tlzZ86Onxrv3Pjszvp644ebb9/49pXbNz/+5Ohq/t2JJM7HcLPu4X48SY11ko3zm6af6UWwPkr63QAeS6aZ57VU+leMRKaZ9e1UR55q04Aeq+6LqO5Esrqj2YHdLNlZ/gN7Rus4oHb+2xoeOUDI9Pb4486FxglILe56c2jUDDWuTcT++rnJwV+SR85MauebR3rbNAbA6vWIGBsa2vr9T5rfv8c39iQaSE99eaGxobZu/3Rj/xNt9j/DrWunf1Fr/7e+Zf/3IH6mw/7vUpcxfnv9xw86xr8e8d+28ZON+Emb+GlEvNFl/FuvfX6uU131w4jj0T5+S7L99eHRq9PFwljjtW2ML44ffXm7/h/sEL9xzXZ//Wem3fqf77L/n3396f9Wt4n//P+33/7t1v+BiHiny/j/uPfRq53q7lxP7taOAna6/WvTbncZ/4Xzx77vUHWgy0UAAAAAAAAAAABtpPV72ZI0tzGeprlc4xnef8bBtFgqV05cLS3OTTbueTsS2bR1p9VIo5zUyuPN+3Fb5VObyqdb9xFnDtTLuXypONnnvgMAAAAAAAAAAAAAAAAAAMBucWjT8/+/ZurP/2/+u2pgr+r8l9/AXif/YXA9mv9JxL6+NQV4yvz+w8Cqyn8YXPIfBpf8h8El/2FwyX8YXPIfBpf8BwAAAAAAAAAAAAAAAAAAAAAAAACAnrh08WJtqN5fW8nXypNDS4szpTdPThbKM7nZxXwuX1qYz02VSlPFQi5fmv2z5RVLpfmxmFu8NloplCuj5aXlK7OlxbnKlenZianClUL2qfQKAAAAAAAAAAAAAAAAAAAAni3D9SFJcxGR1sfTNJeL+HtEHIlscnW6WBiLiMMR8V0mu69WHu93owEAAAAAAAAAAAAAAAAAAGCPKS8tz0wUi4WFARkZ2jLlm84zR8Tqk21GbYk7/lS2ua12yzp81kYObz9PJvrewt040ucdEwAAAAAAAAAAAAAAAAAADKAHD/12+4nfe9sgAAAAAAAAAAAAAAAAAAAAGEjpT0lE1IbjI88Nb679W7Keqb9HxFu3Lr93baJSWRivTb+7Mb3yfnP6qX60H+hWK09beQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8UF5anpkoFgsLPRzpdx8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHscfAQAA//+aXtbd") r2 = open(0x0, 0x1c5142, 0x0) sendfile(r2, r2, 0x0, 0x800000009) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r4, 0xfffffffc) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01000b00000000000000070000000c0001800500020001"], 0x20}}, 0x0) 2m2.800504897s ago: executing program 1 (id=2053): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) modify_ldt$read(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x10}}], 0x10}, 0xc0011122) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x808003, &(0x7f0000000000), 0x3, 0x4fc, &(0x7f0000001500)="$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") r3 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000400)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@cswp={0x58, 0x114, 0x7, {{0x6, 0xff}, &(0x7f0000000000)=0x400, 0x0, 0xe, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xca2a}}], 0x58, 0x40014}, 0x0) write$binfmt_register(r3, &(0x7f0000000000)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x7, 0x3a, 'M', 0x3a, 'M', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1a4a438, &(0x7f0000000f80)=ANY=[], 0xb, 0x0, &(0x7f0000000000)) 2m2.366883482s ago: executing program 1 (id=2055): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 2m2.225302673s ago: executing program 1 (id=2057): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f0000000300)={[{@test_dummy_encryption_v1}, {@resgid}, {@usrquota}, {@dioread_nolock}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@commit={'commit', 0x3d, 0xc}}]}, 0x3, 0x44b, &(0x7f0000002040)="$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") ioprio_set$uid(0x3, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x300000c, &(0x7f0000000000), 0x1, 0x533, &(0x7f0000000e40)="$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") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x48020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0x401}, 0x18) io_uring_setup(0x4f04, &(0x7f00000002c0)={0x0, 0x48c7, 0x400, 0x0, 0xf}) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) 2m1.15163874s ago: executing program 1 (id=2060): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a3100000000090003007379"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000180)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x0, 0x0, 0x300, 0x0, 0x54}, 0x9c) 2m0.321824767s ago: executing program 1 (id=2065): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c04, &(0x7f0000000340), 0x1, 0x779, &(0x7f0000001900)="$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") r1 = open(&(0x7f00000005c0)='./bus\x00', 0x167842, 0x19) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) 2m0.321579347s ago: executing program 36 (id=2065): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c04, &(0x7f0000000340), 0x1, 0x779, &(0x7f0000001900)="$eJzs3c9rXNUeAPDvnSRNm/a95MGD9+oqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007U/6s6tP7b6X7gQS9W0WHEhkTuZ206bmWmSJjPV+XzgZs65907O+c79cc7MPdwbQN8aT//kIg5HxLtJxGhjfhIRQ/XUYMTJjfVura0W0ymJ9fWXf0nq69xcWy1G03tSBxuZ/0fEN29FHMltLre6vDJXKJdLi438ZG3+wmR1eeXo+fnCbGm2tHB8anr62ImnThzfvVh/+37l0LX3Xnj885N/vPm/q+98m8TJONRY1hzHbhmP8cZnMpR+hHd5frcL67Gk1xVgR9JDc2DjKI/DMRoD9RQA8E/2ekSsAwB9JtH+A0CfyX4HuLm2Wsym3v4i0V3Xn4uI/RvxZ9c3N5YMNq7Z7a9fBx25mdx1ZSSJiLFdKH88Ij7+8tVP0yn26DokQCtvXI6Is2Pjm8//yaYxC9v1RIdl+xqv4/fMd/6D7vkq7f883ar/l7vd/4kW/Z/hFsfuTtz3+D+wC4V0kPb/nm0a23arKf6GsYFG7l/1Pt9Qcu58uZSe2/4dERMxNJzmpzqUMXHjzxvtljX3/359/7VP0vLT1ztr5H4aHL77PTOFWuFBYm52/XLEI4Ot4k9ub/+kTf/39BbLePGZtz9qtyyNP403mzbHH43RSXtj/UrEYy23/50RbUnH8YmT9d1hMtspWvjihw9H2pXfvP3TKS0/+y7QDen2H+kc/1jSPF6zuv0yvrsy+nW7ZfePv/X+vy95pZ7O+hGXCrXa4lTEvuSlzfOP3Xlvls/WT+OfeLT18d9p/0+/E57dYvyD137+bOfx7600/pltbf/tJ67emhtoV/7Wtv90PTXRmLOV899WK/ggnx0AAAAAAAAAAAAAAAAAAAAAAAAAbFUuIg5FksvfTudy+fzGM7z/GyO5cqVaO3KusrQwE/VnZY/FUC671eVo0/1Qpxr3w8/yx+7JPxkR/4mID4YPJNl9FGd6HDsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAZA62ef5/6sfhXtcOANgz+3tdAQCg67T/ANB/tP8A0H+0/wDQf7T/ANB/tP8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADssdOnTqXT+u9rq8U0P3NxeWmucvHoTKk6l59fKuaLlcUL+dlKZbZcyhcr8/f7f+VK5cJ0LCxdmqyVqrXJ6vLKmfnK0kLtzPn5wmzpTGmoK1EBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwPZUl1fmCuVyaVFiB4n1h6MavU8MNHanh6U+XU0kD0c1djnR6ayR687JCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBv4K8AAAD//8yLIwE=") r1 = open(&(0x7f00000005c0)='./bus\x00', 0x167842, 0x19) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) 1m46.78451001s ago: executing program 2 (id=2177): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x0, 0x0, 0x300, 0x0, 0x54}, 0x9c) 1m46.704989006s ago: executing program 2 (id=2179): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x4, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x24000000000000, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1m46.109716034s ago: executing program 2 (id=2184): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f0000000300)={[{@test_dummy_encryption_v1}, {@resgid}, {@usrquota}, {@dioread_nolock}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@commit={'commit', 0x3d, 0xc}}]}, 0x3, 0x44b, &(0x7f0000002040)="$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") ioprio_set$uid(0x3, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x300000c, &(0x7f0000000000), 0x1, 0x533, &(0x7f0000000e40)="$eJzs3W1rZFcdAPD/vclss7upmarIWrAttrJbdGc2G9tGkbaC6KuCur5f02Q2hJ1klsxk3YRiU/wAgogKfgARBMG3gvQjiFjQ96KiiG71pfbKvXPHzcNMkt1MMuvk94OTOec+nP85l8yd+3C4N4Az67mIeD0iJiLixYiYKaenZYrtbsqXe//+W4t5SiLLbvw9iaSc1qsrL09GxMVytamI+PpXIt5M9sdtb27dXmg2G+tlud5ZvVNvb25dXVldWG4sN9bm5mZfnn9l/qX5a1npWP2sRsSrX/rzD777ky+/+qvPfOsPN/965dt5s77wsW67I2LxWAEG6NZdKbZFT76N1k8i2Ijk/alMPMQK6Qk2BgCAA+WHYh+OiE8Wx/8zMVEczQEAAADjJHttOv6dRGQAAADA2EojYjqStFaOBZiONK3VumN4PxoX0mar3fn0rdbG2lI+L6IalfTWSrNxrRwrXI1KkpdnyzG2vfL1PeW5iHgqIr4/c74o1xZbzaVRX/wAAACAM+Lis7vP//81kxb5B347srYBAAAAQ1QdWCjc/cVP3zzN5gAAAAAnYP8pPwAAADBunP8DAADAWPvqG2/kKeu9x3vp7ubG7dbdq0uN9u3a6sZibbG1fqe23GotF8/sWz2svmardeezsbZxr95ptDv19ubWzdXWxlrn5squV2ADAAAAp+ipZ9/9fRIR258/X6QonwMIsMufRt0AYJgmehlX5+HMmRx1A4CRqRy6hD0EjLvkkPm7Tg+yLHu7l//1iTUJAAAYsssf33///1w57/BrA8D/M2N9AODscXcPzq7KgxGAD+fSsFsCjMqHuh9PDJo/cHjwEe7/d68xZNkjNQwAABia6SIlaa08Tp+ONK3VIp4sXgtQSW6tNBvXyvOD381UnsjLs8WayaFjhgEAAAAAAAAAAAAAAAAAAAAAAACArixLIgMAAADGWkT6l6R4mn/E5ZkXpndfHdjz1q8f3/jhvYVOZ3024lzyj5l80rmI6PzoRhL59OuZVwIAAADAY6A4f79efs6OujUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAjJv377+12EunGfdvX4yIar/4kzFVfE5FJSIu/DOJyR3rJRExMYT42+9ExKV+8ZP4IMuyatmKfvHPn3D8arFp+sdPI+LiEOLDWfZuvv95vd/3L43nis/+37/JMh3X4P1f+r/938SA/c+Te8qDPP3ez+sD478T8fRk//1PL37Sjb8rRF54/oh9/OY3trb6zthRZb/4O2PVO6t36u3NrasrqwvLjeXG2tzc7Mvzr8y/NH+tfmul2Sj/9g3zvU/88oOD+n9hQPzq7v7v2/4vHKn3WfznvXv3P9ItVPrFv/J8/9/fSwPip+Vv36fKfD7/ci+/3c3v9MzPfvPMQf1fGtD/qUP6f+VI/Y/Pvfi17/yx75x9WwMAOA3tza3bC81mY/2AzNQRljnlzGuPRzOGmInHoxkPm6kMqZ7s7e7/4/HqOebq+zLZcVafjCE049y+7+lEPGqFScR2XtcR/yEBAIAx8+Cg/6A7SAAAAAAAAAAAAAAAAAAAAMBJesTHkk1FxJEX3htzezRdBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA40H8DAAD//5Ri1oI=") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 1m45.163148821s ago: executing program 2 (id=2186): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f0000000300)={[{@test_dummy_encryption_v1}, {@resgid}, {@usrquota}, {@dioread_nolock}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@commit={'commit', 0x3d, 0xc}}]}, 0x3, 0x44b, &(0x7f0000002040)="$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") ioprio_set$uid(0x3, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x300000c, &(0x7f0000000000), 0x1, 0x533, &(0x7f0000000e40)="$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") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x48020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0x401}, 0x18) io_uring_setup(0x4f04, &(0x7f00000002c0)={0x0, 0x48c7, 0x400, 0x0, 0xf}) 1m44.163741402s ago: executing program 2 (id=2195): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x6}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x40}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x404c005}, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="418a1b7824cefc7472de0b0dc8"], 0xff57) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x597, &(0x7f0000000b80)="$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") r2 = open(0x0, 0x1c5142, 0x0) sendfile(r2, r2, 0x0, 0x800000009) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0xfffffffc) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01000b00000000000000070000000c0001800500020001"], 0x20}}, 0x0) 1m42.949105049s ago: executing program 2 (id=2204): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0xfffe, 0x0, 0x8, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00dfffffffffffffff000000806071f7b719e8f66e03c24934015c7b43f798c8f16ff2e06551f00788ec25a29aec1204b16ed3637cd4ff4a212d361b158b50a3780ef1620094e6b4d656267091fc70b780d375e7cf23de253ebb3dd5520fffdaa19e158e9f9152f10771b3a1387fce44f97271af7523f9175f52f30599fdef5ba649a3cbbef15db7fd01e2c7dd4660c3143a088900cb85497d02c5595e5f65c9fc77da8f68ec75a1e8c47566ae5b9c52913cbbfe000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r1}, 0x18) mq_unlink(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) writev(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="680000000206050000000000000000000a000000120003006269746d61703a69702c6d616300000005000401000000000900020073797a30000000001c0007800c00028008000100640101020c000180080001400000000005000500020000000500010006000000"], 0x68}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[], 0x10}}, 0x0) sendmmsg(r8, &(0x7f0000000180), 0x3ef, 0x0) writev(r5, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r9, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa8"], 0x57) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 1m42.933852551s ago: executing program 37 (id=2204): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0xfffe, 0x0, 0x8, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00dfffffffffffffff000000806071f7b719e8f66e03c24934015c7b43f798c8f16ff2e06551f00788ec25a29aec1204b16ed3637cd4ff4a212d361b158b50a3780ef1620094e6b4d656267091fc70b780d375e7cf23de253ebb3dd5520fffdaa19e158e9f9152f10771b3a1387fce44f97271af7523f9175f52f30599fdef5ba649a3cbbef15db7fd01e2c7dd4660c3143a088900cb85497d02c5595e5f65c9fc77da8f68ec75a1e8c47566ae5b9c52913cbbfe000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r1}, 0x18) mq_unlink(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) writev(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="680000000206050000000000000000000a000000120003006269746d61703a69702c6d616300000005000401000000000900020073797a30000000001c0007800c00028008000100640101020c000180080001400000000005000500020000000500010006000000"], 0x68}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[], 0x10}}, 0x0) sendmmsg(r8, &(0x7f0000000180), 0x3ef, 0x0) writev(r5, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r9, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa8"], 0x57) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 23.217636745s ago: executing program 6 (id=3283): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee8000004000000", @ANYRES32=r3], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0xff, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) r5 = socket(0x10, 0x803, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x13, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}}}, 0x24}}, 0x0) 23.1597157s ago: executing program 6 (id=3284): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x24) recvfrom$llc(r2, &(0x7f0000000780)=""/242, 0xf2, 0x10000, &(0x7f0000000180)={0x1a, 0xffff, 0x8, 0x6, 0x0, 0xe, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYRES32=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) getpid() creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000280)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@loopback, 0x0, 0x0, 0x4e23, 0x0, 0xa, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}, 0x10000000, 0x0, 0x0, 0x1, 0x1}}, 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002300)=ANY=[@ANYBLOB="b8000000150001ee"], 0xb8}}, 0x0) 23.130095953s ago: executing program 6 (id=3285): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x4, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000640)='stack\x00') preadv(r1, 0x0, 0x0, 0x4309, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x5, 0x2}) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 23.065786588s ago: executing program 6 (id=3286): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)='./file0/../file0\x00', 0x0, 0x1800, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) umount2(&(0x7f0000000280)='./file0/file0/file0\x00', 0xa) (fail_nth: 5) 23.065353258s ago: executing program 6 (id=3287): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xe4, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x93, 0xfc}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0xfffffffc}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000}, {0x0, 0xffffffff, 0x0, 0x0, 0xfffffffd}, {0x2, 0x0, 0x400000, 0x0, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x2000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffd}, {0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff}, {}, {}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x1, 0x3}, {0x80}, {0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x15, 0x0, 0x48510}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff}, {}, {}, {0x0, 0xfffefffd}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x3ff, 0x40000000}, {}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x400000}, {0x4, 0x0, 0x200}, {}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfb4}, {}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x4, 0x9}, {0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x2}, {}, {}, {}, {0x800000, 0x0, 0x0, 0x0, 0x0, 0x56}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffff}, {}, {0x0, 0x0, 0x6, 0x0, 0x4}, {}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {}, {0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x2, 0x0, 0x20000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x0, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x2e9c, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffe, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, {0x0, 0x8000}, {0x0, 0x0, 0x10000, 0x0, 0xfffffffc}, {0x0, 0x80000000, 0x0, 0x7dff800}], [{}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {0x3}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {0x3}, {0x0, 0x1}, {}, {}, {}, {0x2}, {}, {0x0, 0x1}, {0x4}, {0x3}, {}, {}, {0x0, 0x1}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) (fail_nth: 3) 23.034322641s ago: executing program 6 (id=3288): socket$key(0xf, 0x3, 0x2) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) (async) r2 = gettid() (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3) (async) fcntl$setsig(r3, 0xa, 0x12) (async) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) (async) dup2(r3, r4) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) (async) fcntl$setown(r3, 0x8, r2) (async) tkill(r2, 0x13) pipe(0x0) (async) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) (async) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) (async) write(0xffffffffffffffff, 0x0, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000c00000018000180c77483433e41180000000000000000007468305f0d8206d7bced3bf7dd05a934fafd229a47841ddd3f7741f680d554c3ce337033fbfd61f8c90aa12fccd3357bb87b6214e64f0c1d52ddad1659c6bcb8003fa9e14efe53c3037f521ae98e129c44c9cb47d7a4732eb25a448fa5e51be955bd14a94c821e764c21edd67ef0813679e6c1"], 0x2c}}, 0x0) (async) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000001000000000300000018000180100001006574683a73797a5f74756e"], 0x2c}}, 0x0) (async) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b000000", 0x18}, {&(0x7f00000000c0)="bc588bb49cff7d081d465efc09c57bbfb7b83fa6366c", 0x16}], 0x2}, 0x0) 22.983919785s ago: executing program 38 (id=3288): socket$key(0xf, 0x3, 0x2) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) (async) r2 = gettid() (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3) (async) fcntl$setsig(r3, 0xa, 0x12) (async) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) (async) dup2(r3, r4) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) (async) fcntl$setown(r3, 0x8, r2) (async) tkill(r2, 0x13) pipe(0x0) (async) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) (async) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) (async) write(0xffffffffffffffff, 0x0, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000c00000018000180c77483433e41180000000000000000007468305f0d8206d7bced3bf7dd05a934fafd229a47841ddd3f7741f680d554c3ce337033fbfd61f8c90aa12fccd3357bb87b6214e64f0c1d52ddad1659c6bcb8003fa9e14efe53c3037f521ae98e129c44c9cb47d7a4732eb25a448fa5e51be955bd14a94c821e764c21edd67ef0813679e6c1"], 0x2c}}, 0x0) (async) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000001000000000300000018000180100001006574683a73797a5f74756e"], 0x2c}}, 0x0) (async) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b000000", 0x18}, {&(0x7f00000000c0)="bc588bb49cff7d081d465efc09c57bbfb7b83fa6366c", 0x16}], 0x2}, 0x0) 16.389094137s ago: executing program 0 (id=3374): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7}, 0x10, 0xffffffffffffffff}, 0x94) r1 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\x01\x04\x00\x00\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0, @broadcast, @loopback}, &(0x7f0000000e40)=0xc) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f80)={&(0x7f0000000e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@float={0xb, 0x0, 0x0, 0x10, 0x8}, @struct={0xff40, 0x4, 0x0, 0x4, 0x1, 0x39bb, [{0x4, 0x5, 0x9}, {0x5, 0x0, 0x9}, {0x6, 0x3, 0xffffffff}, {0xc, 0x0, 0x1}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000f00)=""/73, 0x64, 0x49, 0x1, 0x3}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x5, 0xd, &(0x7f0000000d00)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], &(0x7f0000000140)='syzkaller\x00', 0x6, 0x55, &(0x7f0000000d80)=""/85, 0x40f00, 0x8, '\x00', r5, @fallback=0x2f, r6, 0x8, &(0x7f0000000fc0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x1, 0x0, 0x6, 0x624e}, 0x10, 0x0, r0, 0x7, 0x0, &(0x7f0000001040)=[{0x0, 0x1, 0xc, 0x8}, {0x5, 0x4, 0x4, 0x1}, {0x4, 0x3, 0xd, 0xa}, {0x4, 0x1, 0xe, 0x6}, {0x0, 0x3, 0x2, 0x4}, {0x3, 0x4, 0xe, 0x5}, {0x0, 0x4, 0x9, 0x9}], 0x10, 0x2}, 0x94) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00010428bd700000dcdf2507000000", @ANYRES32=r7, @ANYBLOB="3e00e4090a000200bf"], 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x24040040) shutdown(r3, 0x1) close(0xffffffffffffffff) socket$kcm(0x2b, 0x1, 0x0) r8 = socket$inet6(0xa, 0x6, 0x74ac11f2) setsockopt$sock_attach_bpf(r8, 0x11e, 0x12, 0x0, 0x0) 16.320861192s ago: executing program 0 (id=3377): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x4, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x24000000000000, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16.054589514s ago: executing program 0 (id=3383): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 16.034411425s ago: executing program 0 (id=3384): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x4006, &(0x7f0000003f80), 0x1, 0x44f, &(0x7f00000002c0)="$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") open(&(0x7f0000000240)='./file2\x00', 0x165142, 0x148) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x437d}]}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80040, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x8, 'macsec0\x00', {'netpci0\x00'}}) r4 = socket$inet(0x2, 0x3, 0x30) fsmount(0xffffffffffffffff, 0x1, 0x70) getsockopt$inet_mreqsrc(r4, 0x0, 0x53, &(0x7f0000000700)={@dev, @local, @broadcast}, &(0x7f0000000440)=0xc) socket$nl_route(0x10, 0x3, 0x0) symlink(0x0, &(0x7f00000017c0)='./file0\x00') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) sched_setscheduler(0x0, 0x3, &(0x7f0000000500)=0xb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setpriority(0x3, 0x0, 0xfffffffd) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x7f, 0x5, 0x0, 0x0, 0x7, 0x89008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0x7ffffefc, 0x8, 0xfffffffffffffffe, 0x0, 0x4000, 0x0, 0xfc, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(r5, &(0x7f0000002a00)={0x0, {'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/43, 0x2b}}, 0x120) set_mempolicy(0x1, &(0x7f0000000080)=0x81, 0x6) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) write$UHID_DESTROY(r5, &(0x7f0000000080), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f00)='kfree\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) 14.828568093s ago: executing program 0 (id=3392): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002300)=ANY=[@ANYBLOB="b8000000150001ee"], 0xb8}}, 0x0) 13.829471794s ago: executing program 0 (id=3408): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="070000000400000008000000d901000000000000", @ANYRES32, @ANYBLOB="000000000800000000e8cd144327c1cb5f3bf2006d68d20a62e741f18629570d533ca9bc598f2c56e816bca14f203d2a9bce23cc086cfbea2b540e775ece5ac6ee2b77bf63392312c241c5263fb3673b42bec4fcf4dee8cb46c585eaf32958721d0d1411f1fb2cf522c38cb502f11d07ecc8ee3a9f50be35ce71894f2cd11042a2563ba4780fcd5484ba7b1075f615e94aa938ef698000b8dbe5a633f0b3684571eeab646a49ca1299866eeb0ba4bc228167469c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x6c, 0x7f, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="42ae9f6cff6fc351163dc6c43ce13a50649f1a0a6342e2806bf0a92f73207a5e4b8cf2b0483e4bc7c10dc208d4e16d76fcdbee1ac5f9a59b26ff279b9407a86d0cccbaac82001f0bde8af13d2682ee915aac84335d1052f416fbe6bdea0668665525d8b837e21b8c57f66dc2863d3aa9a9d1ddeab57ae2024bad08176ddbd2ee13d7d14341fd2b7581d7f9911b0c2cb17952a5a24646b42177becb60c2f64b6f24e5"], &(0x7f0000000400)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) fsync(0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0xc0000000}, 0x8) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x20}, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="a800000000010904000500000000000002000000240001801400018008000100e000000108000200ac1e01010c00028005000100000009002400028014000180080001000000010908000200ac1e00010c000280050001000000000044000f800800014000000006080003400000002b080003400000000808000240000000400800014000000000fb0001400000000708000140000044f10800034000000003080007"], 0xa8}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002c0012800c0001006d6163766c616e001c000280080001000800000006000200010000001ffe02000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0xc000}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000002e00000095000000000000000000000c00"/32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x5}, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x1000410, &(0x7f0000000100), 0x1, 0x504, &(0x7f0000019940)="$eJzs3c9vG1kdAPDvOHGTZt1NF/YACNiyLBRU6vzobrRaDnQvILRaCbFCQuLQDYk3imLXUZwsTcghPXJHohIn+BO4cUDqiQM3bnDjUg5IBSJQg8Rh0IyniZvEdWiTeGt/PtJ45r1x/H3PznvP8xznBTC0rkTETkRciIgPI2KyyE+KLW62t+x+j3a3F/Z2txeSSNMP/pHk57O86PiZzEvFY45HxPe/E/Hj5Gjc1ubWyny9Xlsr0lPrjdWp1ubW9eVSkTM7NzM3/faNt2ZPra6vNX7z8NvL7/3gd7/9woM/7nz9p1mxKj+7lJ/rrMdpale9HJWOvNGIeO8sgvXJaPH7w4sna22fiojX8/Y/GSP5qwkADLI0nYx0sjMNAAy67Pq/EkmpWswFVKJUqlbbc3ivxkSp3mytX5tsbtxejHwO63KUSx8t12vTxVzh5SgnWXomPz5Izx5K34iIVyLi52MX83R1oVlf7OcbHwAYYi8dGv//PdYe/wGAATfe7wIAAOfO+A8Aw8f4DwDD5/8Y/307EAAGhOt/ABg+xn8AGD49x/+751MOAOBcfO/997Mt3Sv+//Xix5sb36x8fH2x1lqpNjYWqgvNtdXqUrO5VK9VF9K01+PVm83VmTf3k63NrVuN5sbt9VvLjfml2q1a+YzrAwD09spr9/+cRMTOOxfzLTrWcjBWw2ArPZE6ZqEeYGCN9LsAQN/4Pg8MrxNc45sGgAHX68q/658I3bP4K7yorn7W/D8Mq1K/CwD0zbPN/3/r1MsBnD/z/zC80jSx5j8ADBlz/MCzfP7/wyg+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAhVcm3pFTN1wLfyW5L1WrEpYi4HOXko+V6bToiXo6IP42Vx7L0TL8LDQA8p9LfkmL9r6uTb1QOn72Q/Gcs30fET375wS/uzK+vr81k+f/cz1+/V+TPXuhHBQCATjePZrXH6WLfcSH/aHd74fF2nkV8+G57cdEs7l6xtc+Mxmi+H49yREz8KynSbdn7lZFTiL9zNyI+c1D/Ox0RKvkcSHvl08Pxs9iXziD+wfOfRJqm6UH80hPxS3nZsn05fy4+fQplgWFz/912P5m1u4u721kTK9pfKa7k++Pb/3jeQz2/x/3f3pH+r7Tf/40ciZ/kbf7KfvrpJXn45u+/eyQznWyfuxvxudHj4if78ZMu/e8bJ6zjXz7/xde7nUt/FXE1jo/f1si72an1xupUa3Pr+nJjfqm2VLs9Ozs3Mzf99o23ZqfyOer27R+Oi/H3d6693C1+Vv+JLvHHe9T/Kyes/6//++GPvvSU+F/78vGv/6tPiZ+NiV89Yfz5iZvHLd+9H3+xS/17vf7XThj/wV+3Fk94VwDgHLQ2t1bm6/XaWo+D7L1mr/s4eDEPYifinIN+YzziE1F3B90O+t0zAWftoNH3uyQAAAAAAAAAAAAAAEA3rc2tlbE4268T9buOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADK7/BQAA//+TAtDE") pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfecc) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), &(0x7f00000003c0)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r5], 0x841, 0x1) mkdir(&(0x7f0000000040)='./file0/bus\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 13.796625536s ago: executing program 39 (id=3408): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="070000000400000008000000d901000000000000", @ANYRES32, @ANYBLOB="000000000800000000e8cd144327c1cb5f3bf2006d68d20a62e741f18629570d533ca9bc598f2c56e816bca14f203d2a9bce23cc086cfbea2b540e775ece5ac6ee2b77bf63392312c241c5263fb3673b42bec4fcf4dee8cb46c585eaf32958721d0d1411f1fb2cf522c38cb502f11d07ecc8ee3a9f50be35ce71894f2cd11042a2563ba4780fcd5484ba7b1075f615e94aa938ef698000b8dbe5a633f0b3684571eeab646a49ca1299866eeb0ba4bc228167469c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x6c, 0x7f, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="42ae9f6cff6fc351163dc6c43ce13a50649f1a0a6342e2806bf0a92f73207a5e4b8cf2b0483e4bc7c10dc208d4e16d76fcdbee1ac5f9a59b26ff279b9407a86d0cccbaac82001f0bde8af13d2682ee915aac84335d1052f416fbe6bdea0668665525d8b837e21b8c57f66dc2863d3aa9a9d1ddeab57ae2024bad08176ddbd2ee13d7d14341fd2b7581d7f9911b0c2cb17952a5a24646b42177becb60c2f64b6f24e5"], &(0x7f0000000400)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) fsync(0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0xc0000000}, 0x8) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x20}, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="a800000000010904000500000000000002000000240001801400018008000100e000000108000200ac1e01010c00028005000100000009002400028014000180080001000000010908000200ac1e00010c000280050001000000000044000f800800014000000006080003400000002b080003400000000808000240000000400800014000000000fb0001400000000708000140000044f10800034000000003080007"], 0xa8}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002c0012800c0001006d6163766c616e001c000280080001000800000006000200010000001ffe02000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0xc000}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000002e00000095000000000000000000000c00"/32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x5}, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x1000410, &(0x7f0000000100), 0x1, 0x504, &(0x7f0000019940)="$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") pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfecc) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), &(0x7f00000003c0)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r5], 0x841, 0x1) mkdir(&(0x7f0000000040)='./file0/bus\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 8.816652748s ago: executing program 4 (id=3461): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000001c0)={0xfffffffc, 0x5, 0x0, 'queue0\x00', 0x10000}) (fail_nth: 7) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace(0x4211, r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000002480)=@raw={'raw\x00', 0x8, 0x3, 0x4e8, 0x0, 0x11, 0x148, 0x340, 0x0, 0x450, 0x2a8, 0x2a8, 0x450, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x4f, 0x7, "72f6daeff0a9c6294e211d2d88fe6dcff5d0e552201da3b7a1fdb30dcb59"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, 0x0) 8.554417499s ago: executing program 4 (id=3463): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r0}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000700000e0000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000002600000000c0a01080000000000000000010000000900020073797a32000000003400038030000080080003400000000224000b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30"], 0xe4}}, 0x0) 8.537907501s ago: executing program 4 (id=3464): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getpid() openat$vcsa(0xffffffffffffff9c, 0x0, 0x400080, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x4804) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bc00551a000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r6, 0x402, 0x5) r7 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r7, 0x402, 0x8000001f) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=r']) 7.80405894s ago: executing program 4 (id=3469): madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600707, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000000)='binfmt_misc\x00', 0xc00, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2a05004, 0x0) mount$9p_fd(0x0, &(0x7f0000000c40)='./file0/../file0/file0\x00', 0x0, 0x80002, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_trace', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x40, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x93, 0xfc}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0xfffffffc}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000}, {0x0, 0xffffffff, 0x0, 0x0, 0xfffffffd}, {0x2, 0x0, 0x400000, 0x0, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x2000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffd}, {0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff}, {}, {}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x1, 0x3}, {0x80}, {0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x15, 0x0, 0x48510}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff}, {}, {}, {0x0, 0xfffefffd}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x3ff, 0x40000000}, {}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x400000}, {0x4, 0x0, 0x200}, {}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfb4}, {}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x4, 0x9}, {0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x2}, {}, {}, {}, {0x800000, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0x69}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffff}, {}, {0x0, 0x0, 0x6, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {}, {0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x2, 0x0, 0x20000000}, {0x0, 0x0, 0x0, 0x0, 0x101}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x0, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x2e9c, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffe, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, {0x0, 0x8000}, {0x0, 0x0, 0x10000, 0x0, 0xfffffffc}, {0x0, 0x80000000, 0x0, 0x7dff800}], [{}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x4}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {}, {}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {0x3}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {0x3}, {0x0, 0x1}, {}, {}, {}, {0x2}, {}, {0x0, 0x1}, {0x4}, {0x3}, {}, {}, {0x0, 0x1}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) stat(&(0x7f00000004c0)='.\x02\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000300)='.\x02\x00', r4, r8, 0x100) fchownat(r1, &(0x7f0000000080)='./file0\x00', 0xee01, r8, 0x1000) 7.107935986s ago: executing program 4 (id=3478): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semop(0x0, 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x858068, &(0x7f0000000140)={[{@gid}, {}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') pread64(r1, &(0x7f0000002280)=""/4096, 0x1000, 0xd33) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x1002, @loopback, 0xffdfffff}, 0x1c) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000002c0)={0x0, 0x8}, 0x8) 6.737438986s ago: executing program 4 (id=3483): getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000004c0)={[{@acl}, {@barrier}, {@barrier_val}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xf8, 0x587, &(0x7f0000002100)="$eJzs3U1rG9caAOB3ZMn5cO6NAyHcexeXQBZNSSPHdj9SKDRdljY00O5TYSsmWI6CJYfYDTRZNJtuSiiU0kDpD+i+y9A/0F8RaAOhBNMuSkFl5JGt2JIdOzJSoueBSc6ZD595feY9PqORUABD62T6Ty7ivxHxVRJxtG1bPrKNJ9f2W31yayZdkmg0Pv49iSRb19o/yf4fyyr/iYifv4g4k9vabm15Zb5UqZQXs/pEfeH6RG155ezVhdJcea58bWp6+vwb01Nvv/Vmz2J99dKf33704P3zX55a/ebHR8fuJXEhjmTb2uN4DrfbKydLf2elQlzYtONkDxobJEm/T4A9GcnyvBDpGHA0RrKsB15+n0dEY02uAQyZpJn/YxvjADAkWvOA1r19j+6DXxiP31u7AWrGPtoef37ttZE42Lw3OryaPHVnlN7vjveg/bSNn367fy9dYvvXIQ7tUAfYldt3IuJcPr91/E+y8W/vzjVfPN7e5jaG7e8P9NODdP7zWqf5X259/hMd5j9jHXJ3L3bO/9yjHjTTVTr/e6fj/Hd96BofyWr/as75CsmVq5XyuYj4d0ScjsKBtL7d85zzqw8b3ba1z//SJW2/NRfMzuNR/sDTx8yW6qWIGH2euFse34n4X75T/Ml6/ycd+j/9fVzq+BMLW9acKN//f7f2d45/fzV+iHilY/9vPNFKtn8+OdG8HiZaV8VWf9w98Uu39vsdf9r/h7ePfzxpf15b230b3x/8q9xt216v/9Hkk2a5lQQ3S/X64mTEaPJhs36wff3UxrGtemv/NP7Tp7Yf/zpd/+nN16fPGP/d43e77joI/T+7q/7ffeHhB5991639Z+v/15ul09mabPzrLLtWnvUEn/f3BwAAAAAAAIMkFxFHIskV18u5XLG49v6O43E4V6nW6meuVJeuzUbzs7LjUci1nnQfbXs/xGT2fthWfWpTfToijkXE1yOHmvXiTLUy2+/gAQAAAAAAAAAAAAAAAAAAYECMdfn8f+rXkX6fHbDvml9scKDfZwH0w45f+d+Lb3oCBtKO+Q+8tOQ/DC/5D8NL/sPwkv8wvOQ/DC/5D8NL/gMAAAAAAAAAAAAAAAAAAAAAAAAAAEBPXbp4MV0aq09uzaT12RvLS/PVG2dny7X54sLSTHGmuni9OFetzlXKxZnqwk4/r1KtXp+ciqWbE/VyrT5RW165vFBdula/fHWhNFe+XC5s7Jrb38gAAAAAAAAAAAAAAAAAAADgxVFbXpkvVSrlRYWuhXdjIE5jPwNcs6fD84MShUKXwp2se3d3VB8HJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADY5J8AAAD//9ybLZI=") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000a80)='./file1\x00', 0x8, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@sb={'sb', 0x3d, 0x64}}, {@abort}, {@quota}, {@data_err_abort}, {@nomblk_io_submit}]}, 0x66, 0x50a, &(0x7f0000000200)="$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") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1a4a438, &(0x7f00000008c0)=ANY=[], 0xc, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000940)=ANY=[@ANYRES32=r0, @ANYRESHEX=r1, @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) io_submit(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='9p_client_req\x00', r4}, 0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x1, 0x8, 0x7fffffff, 0x6, 0x6, 0xf42, 0x9}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0), 0x0, 0xab, 0x0, 0x0, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0x9d, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r6}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb7e, &(0x7f0000000c40)="$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") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r7, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) 6.735346636s ago: executing program 40 (id=3483): getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000004c0)={[{@acl}, {@barrier}, {@barrier_val}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xf8, 0x587, &(0x7f0000002100)="$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") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000a80)='./file1\x00', 0x8, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@sb={'sb', 0x3d, 0x64}}, {@abort}, {@quota}, {@data_err_abort}, {@nomblk_io_submit}]}, 0x66, 0x50a, &(0x7f0000000200)="$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") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1a4a438, &(0x7f00000008c0)=ANY=[], 0xc, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000940)=ANY=[@ANYRES32=r0, @ANYRESHEX=r1, @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) io_submit(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='9p_client_req\x00', r4}, 0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x1, 0x8, 0x7fffffff, 0x6, 0x6, 0xf42, 0x9}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0), 0x0, 0xab, 0x0, 0x0, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0x9d, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r6}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb7e, &(0x7f0000000c40)="$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") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r7, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) 3.46853393s ago: executing program 7 (id=3523): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000a90800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c3d5bb8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424dbcfd56f1374461ca32089a5cd3e84b58a1feff274ecf8c39000000000000649a3bf7ffffffb307b3472eb9cdb042"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) recvmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}, 0x5}], 0x1, 0x2, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x1}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f00000001c0)=0x7f, 0x4) close(r5) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffddc, &(0x7f0000000380)={&(0x7f0000000c00)=ANY=[@ANYBLOB="640000001000010428bd70000000000000030000", @ANYRES32=r2, @ANYBLOB="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"], 0x64}}, 0x4001) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280)={0x2, 0x2, 0x8, 0x5, 0x3, 0x8, 0x7f, 0x3, 0x4, 0x8, 0x5, 0x1, 0x6, 0x5}, 0xe) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r7, 0x0, 0x4}, 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x54, 0x1, 0x0, 0x0, 0x0, 0x7, 0x20570, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0xd}, 0x10000, 0x10000, 0x0, 0x0, 0x8, 0x20205, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r9 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r9, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x2}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000300)="11cd9b", 0x3}], 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c000400"/44, @ANYRES32=0x0], 0x30}], 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) 3.46197605s ago: executing program 3 (id=3524): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x40840) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x4, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000640)='stack\x00') preadv(r1, 0x0, 0x0, 0x4309, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) socket(0xa, 0x3, 0x3a) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x5, 0x2}) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 3.404690085s ago: executing program 3 (id=3525): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) symlink(&(0x7f0000000dc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000004240)=""/4098, 0x47c) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) unshare(0x6a040000) 3.305683293s ago: executing program 7 (id=3527): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x40840) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x4, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000640)='stack\x00') preadv(r1, 0x0, 0x0, 0x4309, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) socket(0xa, 0x3, 0x3a) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x5, 0x2}) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 2.84961224s ago: executing program 8 (id=3530): iopl(0x3) arch_prctl$ARCH_SHSTK_ENABLE(0x5001, 0x3) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x3, 0x300) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8000) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000440)=0x1, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r5, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x23456}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r5, 0x47f6, 0x0, 0x0, 0x0, 0x0) 2.819100802s ago: executing program 3 (id=3532): iopl(0x3) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x3, 0x300) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa88800000000140012800b0001006d616373656300002a00028008000500", @ANYRES32=r2, @ANYBLOB='\b', @ANYRES32=r2], 0x44}}, 0x8000) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000440)=0x1, 0x4) 2.133028888s ago: executing program 5 (id=3538): r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="280000001800010000000000000000000200000008000000040000000c00088008000c00", @ANYRES32=r1, @ANYBLOB="1ecaa0070962a711ced5cb5c53a830d27256a7"], 0x28}, 0x1, 0x0, 0x0, 0x82355af5d03fec01}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="280100001b000100000000000000000000000000000000000000000000000000ac1e01010000000000000000000000000000000000000000000000002f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000e300000000000000000000000000000000000000000000000000000100000000000000000000000081dd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff07000008000000000000000000000000000000000000000a0010"], 0x128}}, 0x0) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000740)) keyctl$chown(0x4, 0x0, r1, r3) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000280)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='kmem_cache_free\x00', r4}, 0x18) r5 = socket$inet(0x2, 0x2, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) sendmsg$inet(r5, &(0x7f0000000000)={&(0x7f00000007c0)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000ac0)="08002b7320fc612cc0607818c458666d34ece146801d9adebc3102e505ae4b5a6696f34a60ed40ff19442b17663ff04c36cd673e8c149c7c3aa16d12943dd59044a9f862e0fa337daa3cc46e5a5e8626240f0be7248dec60334350a1d41a7dd425fe77e1aedf0c3551f5d3984597c36cb159da1491de22162c68", 0x7a}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @multicast1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x8, &(0x7f0000000980)=ANY=[@ANYBLOB="56f2ab0a727522f3e7d8ac7a46957605e4469414703fc525a39769aaae80adbb42ad988f2358cb4fb7c72a62aa1da5555b4d0855bc257d58df7d85a3996d311155b585fdf1cbcfc47e1f755626e3d3b5cdffb1b6a4b5cbdb6c120a8bff87eaea09102a582ecb857a603f75d06ff6085f8548535f5729a4e9e7b56e94dc547d4501fcf89c2af6b597369e9938dfb3a3e67b10b972595964330a86bc9aba64cec6137ac74c33969e91bda8f1915e1a1abc9b9d5e39eb8833434c327bece97fe15092ee0a64993d2b845ec15a3e778da52c01b2f6a1c17121c0fc35877fb6a1583da941d91aee457f2aaeed82e58a916e", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) 2.082479212s ago: executing program 5 (id=3540): iopl(0x3) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x3, 0x300) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddb357f7adf97affffffff7d1800"}) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x44}}, 0x8000) 1.907978026s ago: executing program 3 (id=3541): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r1, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local, 0x4000000}, 0x1c) 1.817460743s ago: executing program 3 (id=3542): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) getpid() sched_setscheduler(0x0, 0x3, &(0x7f0000000300)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000ff7f000000000000000000000000000000e3ff000000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100fffe08000a40000000000900020073797a32000000000900010073797a3000000000080005400000000f840000000c0a01030000000000000000010000000900020073797a320000"], 0x108}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1b00000004000000ff7cd29d5bc4bc496449fdff0000ff08e32f841100467f6fea00", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400"/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000009c3e850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0xfffffffe, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020600) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fchmod(r7, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x490, &(0x7f0000000580)="$eJzs3UFrXNUeAPD/nSR9aZu+pO+9RV/BWmwlLdqZpLFtcFEriK4Kat3HmExCyCQTMpO2CUVS/ACCiAquXLkR/ACC9COIUNC9iCiirS5cqCMzudPWOJMETHNx5veD03vOPTPzP6eTOXPPPZe5AXSt4xFxKSJ6IuJ0RAym+3NpivWNVH/c3Ts3puopiVrtyg9JJOm+5msl6fZg+rT+iHj5hYjXkr/GrayuzU+WSsXltFyoLiwVKqtrZ+YWJmeLs8XFsbHR8+MXxs+Nj+xaXy8+9807b374/MVPn7z21cR3p16vN2sgrXuwH7tpo+t9jf+Lpt6IWH4YwTLQk/anL+uGAACwI/Vj/P9ExGON4//B6GkczQEAAACdpPbMQPyaRNQAAACAjpVrXAOb5PLptQADkcvl8xvX8P4vDuRK5Ur1iZnyyuL0xrWyQ9GXm5krFUfSa4WHoi+pl0cb+fvls5vKYxFxOCLeHtzfKOenyqXprE9+AAAAQJc4uGn+//PgxvwfAAAA6DBDWTcAAAAAeOjM/wEAAKDzmf8DAABAR3vx8uV6qjXvfz19dXVlvnz1zHSxMp9fWJnKT5WXl/Kz5fJs4zf7FrZ7vVK5vPRULK5cL1SLlWqhsro2sVBeWaxONO7rPVF0n2gAAADYe4cfvfVlEhHrT+9vpLp9aZ25OnS2XNYNADLTk3UDgMz0Zt0AIDPm+ECyTX1/u4rPdr8tAADAwzH8f+v/0K2s/0P3sv4P3cv6P3Qvc3zA+j8AAHS+gUZKcvl0LXAgcrl8PuJQ47YAfcnMXKk4EhH/jogvBvv+VS+PZt1oAAAAAAAAAAAAAAAAAAAAAAAAAPiHqdWSqAEAAAAdLSL3bZLe/2t48OTA5vMD+5JfBhvbiLj2/pV3r09Wq8uj9f0/3ttffS/dfzaLMxgAAADAZs15enMeDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC76e6dG1PNtJdxv382IoZaxe+N/sa2P/oi4sBPSfQ+8LwkInp2If76zYg40ip+Um9WDKWt2Bw/FxH7M45/cBfiQze7VR9/LrX6/OXieGPb+vPXm6a/q/34l7s3/vW0Gf8O7TDG0dsfF9rGvxlxtLf1+NOMn7SJf2KH8V99ZW2tXV3tg4jhlt8/yZ9iFaoLS4XK6tqZuYXJ2eJscXFsbPT8+IXxc+MjhZm5UjH9t2WMtx755Pet+n+gTfyhbfp/cof9/+329Tv/3SL+qROt3/8jW8Sv/008nn4P1OuHm/n1jfyDjn30+bGt+j/dpv/bvf+ndtj/0y+98fUOHwoA7IHK6tr8ZKlUXJaRkZG5l8l6ZAIAAHbb/YP+rFsCAAAAAAAAAAAAAAAAAAAA3Wsvfk4s6z4CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOzEHwEAAP//0wfUAw==") 1.248295079s ago: executing program 9 (id=3543): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f0000000300)={[{@test_dummy_encryption_v1}, {@resgid}, {@usrquota}, {@dioread_nolock}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@commit={'commit', 0x3d, 0xc}}]}, 0x3, 0x44b, &(0x7f0000002040)="$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") sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x300000c, &(0x7f0000000000), 0x1, 0x533, &(0x7f0000000e40)="$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") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 1.141969698s ago: executing program 8 (id=3544): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x6}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x40}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x404c005}, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x597, &(0x7f0000000b80)="$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") r2 = open(0x0, 0x1c5142, 0x0) sendfile(r2, r2, 0x0, 0x800000009) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r4, 0xfffffffc) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000140)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00', 0x1, 0x3, 0x8000, 0x2, 0xb, 0xc, "af"}}, 0x119) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20080, 0x80e1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01000000000000000000010000001c000180060001000200000008000300ac1414aa0800060006"], 0x30}, 0x1, 0x0, 0x0, 0xaa34a4cfdf933201}, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r9, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r10, @ANYBLOB="01000b00000000000000070000000c0001800500020001"], 0x20}}, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 1.129691589s ago: executing program 5 (id=3545): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c060000) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4d", 0x14, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000240)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000300)=0x2c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=@deltaction={0x78, 0x31, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xde}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x400002}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xca7f78fdeec59738}, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x400040, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000001480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000380)='kfree\x00', r5, 0x0, 0x8}, 0x18) r6 = syz_io_uring_setup(0x1104, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xfffffffe, 0x21e}, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1fc, 0x0, 0x1}) io_uring_enter(r6, 0x47fa, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f0000000240)=0x1, 0x4) 1.029038757s ago: executing program 7 (id=3546): bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) syz_io_uring_setup(0x3c0c, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000040)='./bus\x00', 0x8, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRESHEX=0x0, @ANYBLOB="42fd1d034a9bc30a238a7994f2b542ae02bccd9060ae483d8861731c4888a95f8088f34a15f6ab611662d44dd25103f3a42e2b39fa6236d1b8ed4242733f51c7a92ea0c2e994a4cc1c2f146bf1ec2e93ed846112c329d0eab3851716e14a5c4c30595de92bd7fd13bafe9795639c9ba0a9247a2b4d7bfdc86218cc405938fb685327", @ANYRESDEC=0x0, @ANYRES16=0x0, @ANYRES16=0x0, @ANYRES64, @ANYRESDEC], 0xfd, 0x1bf, &(0x7f0000000480)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) mq_open(&(0x7f0000000080)='eth0\x00#~\x02\x00\x00\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfd\x05\x00\x00\x00\x00\x00\x80\x00\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94uu_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18A\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x05\x00\x00\x000\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xce\x00\x00\x00\xe8\vq+\xbb\xc7\xaf\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) 870.909499ms ago: executing program 5 (id=3547): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680), 0x80c02, 0x0) write$cgroup_int(r2, 0x0, 0x2) syz_read_part_table(0x1060, &(0x7f0000000000)="$eJzsz81NwzAABeDnBIeECyOwBhsgBmACJAZgAX6WQeLS5Xqs5KpOpG7Q9vB9Bz/L9rPlcFXzaRjvnkum9pW8Pm7r+48eY4ae9ScZynfyNCVp9736V9ezdU4rW+9l+V36fLfedGjv68ZnSqaknF+tD3n7v9hHAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCGHQMAAP//BZgNAQ==") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00'}, 0x10) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syz_tun\x00', @random='\x00\x00\b\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001400b59500000000000000000a000000", @ANYRES32, @ANYRESOCT], 0x48}}, 0x0) 758.339278ms ago: executing program 8 (id=3548): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002300)=ANY=[@ANYBLOB="b8000000150001ee"], 0xb8}}, 0x0) 757.332599ms ago: executing program 7 (id=3549): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x7fffffffffe, &(0x7f0000006680)) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0xa4b3, &(0x7f00000000c0)) syz_emit_ethernet(0x2a, &(0x7f0000003e00)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @broadcast, @val={@void, {0x8100, 0x7}}, {@generic={0x4305, "64c81e68ecb3ef37039277b48f162693520e18d1ddce608b"}}}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x39, 0xa, 0x9, "e0cf94203bc5ff8207416a164b4194ba", "de451d8d134a11889dbc8cf461ee8a7b59c671f5c60f13cb98ecdef59e6e39e0d9f87672"}, 0x39, 0x3) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x4) 711.010813ms ago: executing program 9 (id=3550): r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="280000001800010000000000000000000200000008000000040000000c00088008000c00", @ANYRES32=r1, @ANYBLOB="1ecaa0070962a711ced5cb5c53a830d27256a7"], 0x28}, 0x1, 0x0, 0x0, 0x82355af5d03fec01}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="280100001b000100000000000000000000000000000000000000000000000000ac1e01010000000000000000000000000000000000000000000000002f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000e300000000000000000000000000000000000000000000000000000100000000000000000000000081dd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff07000008000000000000000000000000000000000000000a0010"], 0x128}}, 0x0) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000740)) keyctl$chown(0x4, 0x0, r1, r3) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000280)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='kmem_cache_free\x00', r4}, 0x18) r5 = socket$inet(0x2, 0x2, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) sendmsg$inet(r5, &(0x7f0000000000)={&(0x7f00000007c0)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000ac0)="08002b7320fc612cc0607818c458666d34ece146801d9adebc3102e505ae4b5a6696f34a60ed40ff19442b17663ff04c36cd673e8c149c7c3aa16d12943dd59044a9f862e0fa337daa3cc46e5a5e8626240f0be7248dec60334350a1d41a7dd425fe77e1aedf0c3551f5d3984597c36cb159da1491de22162c68", 0x7a}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @multicast1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x8, &(0x7f0000000980)=ANY=[@ANYBLOB="56f2ab0a727522f3e7d8ac7a46957605e4469414703fc525a39769aaae80adbb42ad988f2358cb4fb7c72a62aa1da5555b4d0855bc257d58df7d85a3996d311155b585fdf1cbcfc47e1f755626e3d3b5cdffb1b6a4b5cbdb6c120a8bff87eaea09102a582ecb857a603f75d06ff6085f8548535f5729a4e9e7b56e94dc547d4501fcf89c2af6b597369e9938dfb3a3e67b10b972595964330a86bc9aba64cec6137ac74c33969e91bda8f1915e1a1abc9b9d5e39eb8833434c327bece97fe15092ee0a64993d2b845ec15a3e778da52c01b2f6a1c17121c0fc35877fb6a1583da941d91aee457f2aaeed82e58a916e", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) 658.518437ms ago: executing program 7 (id=3551): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x40840) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x4, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs(0x0, &(0x7f0000000640)='stack\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) socket(0xa, 0x3, 0x3a) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x5, 0x2}) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 658.010577ms ago: executing program 8 (id=3552): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r1, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local, 0x4000000}, 0x1c) 638.066898ms ago: executing program 5 (id=3553): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'erspan0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x17, 0x1, 0x2, 0x3, {{0x1a, 0x4, 0x1, 0x4, 0x68, 0x64, 0x0, 0x6, 0x4, 0x0, @broadcast, @remote, {[@generic={0x94, 0xe, "d99f6a292fd4361614efada5"}, @cipso={0x86, 0x11, 0x3, [{0x1, 0xb, "54009846aa31526ff6"}]}, @ra={0x94, 0x4}, @cipso={0x86, 0xa, 0x2, [{0x6, 0x4, "1314"}]}, @noop, @timestamp_addr={0x44, 0x24, 0xfe, 0x1, 0x0, [{@remote, 0xffff}, {@broadcast, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0xfffffffc}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x5}]}]}}}}}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0xa, [@func={0x8, 0x0, 0x0, 0xc, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x5}, @union={0x8, 0x3, 0x0, 0x5, 0x1, 0x9, [{0x0, 0x5, 0xffffffff}, {0xc, 0x1}, {0x8, 0x5, 0x4}]}, @typedef={0x7, 0x0, 0x0, 0x8, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x4}}, @struct={0x2, 0x6, 0x0, 0x4, 0x0, 0x5, [{0xf, 0x3, 0x380}, {0xe, 0x2, 0x5}, {0xf, 0x0, 0x2}, {0x7, 0x3, 0x57}, {0x6, 0x1, 0xfffffffb}, {0x7, 0x5, 0x40}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xd, 0x1}, {0x4, 0x3}, {0x2, 0x3}, {0x3, 0x4}]}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x48, 0x0, 0x31, 0x2}]}, {0x0, [0x5f, 0x61, 0x30, 0x2e, 0x30, 0x5f, 0x5f, 0x0]}}, &(0x7f00000005c0)=""/222, 0x11e, 0xde, 0x0, 0x5}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x16, &(0x7f0000000580), 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x50) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0x8000, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x3, 0x6, &(0x7f0000000240)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000280)='GPL\x00', 0xbc9b, 0x1000, &(0x7f0000000a80)=""/4096, 0x41100, 0x94, '\x00', r2, @fallback=0xb, r3, 0x8, &(0x7f0000000700)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x0, &(0x7f0000000800)=[r0, r0, r5, r6, r0], 0x0, 0x10, 0xffffffa9}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000efffffff850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) utimes(0x0, 0x0) r8 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) r9 = fsmount(r8, 0x0, 0x0) fchdir(r9) connect$rxrpc(r9, &(0x7f0000000200)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @private=0xa010100}}, 0x24) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000280), 0xfd, r0}, 0x38) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r12, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r13, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r11], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) 629.783709ms ago: executing program 9 (id=3554): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee8000004000000", @ANYRES32=r3], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0xff, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) r5 = socket(0x10, 0x803, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x13, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}}}, 0x24}}, 0x0) 573.706904ms ago: executing program 7 (id=3555): iopl(0x3) arch_prctl$ARCH_SHSTK_ENABLE(0x5001, 0x3) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x3, 0x300) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8000) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000440)=0x1, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r5, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x23456}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r5, 0x47f6, 0x0, 0x0, 0x0, 0x0) 494.69614ms ago: executing program 5 (id=3556): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(0x0, 0x1c5142, 0x0) sendfile(r0, r0, 0x0, 0x800000009) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0xfffffffc) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000b00000000000000070000000c000180050002"], 0x20}}, 0x0) 493.73825ms ago: executing program 8 (id=3557): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c060000) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4d", 0x14, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000240)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000300)=0x2c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=@deltaction={0x78, 0x31, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xde}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x400002}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xca7f78fdeec59738}, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x400040, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000001480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000380)='kfree\x00', r5, 0x0, 0x8}, 0x18) r6 = syz_io_uring_setup(0x1104, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xfffffffe, 0x21e}, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1fc, 0x0, 0x1}) io_uring_enter(r6, 0x47fa, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f0000000240)=0x1, 0x4) 455.160353ms ago: executing program 9 (id=3558): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x40840) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000640)='stack\x00') preadv(r2, 0x0, 0x0, 0x4309, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) socket(0xa, 0x3, 0x3a) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x5, 0x2}) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 355.223021ms ago: executing program 8 (id=3559): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x2, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r2}, 0x10) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r3) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000019180)={[&(0x7f0000000200)=' ', &(0x7f0000019080)=' T\xfc\x81\x8e\x9f5\x0e \x043[B\xad\x13\x9f\xae\x8f\xbb\x9a\x0f\x9f\x03\xa5\xfc9\xbb\xa4.\xf4\xeb\x03\xf1\xb6\x8c\xc4E\x93\n&k\xec\xc8\xdch\xd6\x1e\xcb\fA\\da/O\xdcn7\x1b@\xbf\xfb\x17J\xaaD\xe4\x01\xbc']}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f00000005c0), 0x10) recvmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/97, 0x38}, {0x0}], 0x2}, 0x32}], 0x4000000000000be, 0x122, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="050000007f0000000000010000000000", @ANYRES64=0x0, @ANYRES64=0x2710], 0x48}}, 0x0) ioctl$SIOCGSTAMPNS(r4, 0x8907, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r6 = socket$unix(0x1, 0x5, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x84, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x8000000, {0x0, 0x0, 0x0, r8, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x54, 0x2, {{0x100, 0x6, 0x6361, 0x5, 0xfffffffd, 0x6}, [@TCA_NETEM_LATENCY64={0xc, 0xa, 0x7}, @TCA_NETEM_SLOT={0x2c, 0xc, {0x1, 0x0, 0xb2, 0x9, 0x8, 0x7c}}]}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x80000, {0x0, 0x0, 0x0, r8, {}, {0xffe6, 0xb}, {0xffe0, 0xc}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) sendmsg$nl_route(r3, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=@bridge_setlink={0x2c4, 0x13, 0x8, 0x70bd28, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x7fb868ee325933dd, 0x1}, [@IFLA_VFINFO_LIST={0x1a4, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7, @multicast}}]}, {0x68, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x2, 0x4}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x9f6d, 0x10001}}, @IFLA_VF_VLAN={0x10, 0x2, {0x40, 0xaba, 0xd0}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0xffff, 0x4193}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7, 0x710}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x91a, 0x8001}}]}, {0x10c, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x9, 0x2c}}, @IFLA_VF_TRUST={0xc, 0x9, {0x5, 0x4}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x3ff, 0x762}}, @IFLA_VF_VLAN_LIST={0x68, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x2, 0xb23, 0x9}}, {0x14, 0x1, {0x8, 0x39c, 0x400, 0x88a8}}, {0x14, 0x1, {0x4, 0xcd7, 0xffffffff, 0x88a8}}, {0x14, 0x1, {0xfffff801, 0x1c3, 0xfffffffa, 0x88a8}}, {0x14, 0x1, {0x7, 0xdc1, 0x80, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x82c, 0xd51}}, @IFLA_VF_MAC={0x28, 0x1, {0x8, @multicast}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9, 0x6}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x2, 0x8bc}}, @IFLA_VF_TRUST={0xc, 0x9, {0x1, 0x1}}, @IFLA_VF_TRUST={0xc, 0x9, {0xd9, 0x1}}]}]}, @IFLA_PORT_SELF={0x18, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "52a3f017c99368bc08ceea170ea67619"}]}, @IFLA_PROP_LIST={0xa4, 0x34, 0x0, 0x1, [{0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'nicvf0\x00'}, {0x14, 0x35, 'wg2\x00'}, {0x14, 0x35, 'vlan1\x00'}, {0x14, 0x35, 'wlan0\x00'}, {0x14, 0x35, 'veth1_to_bridge\x00'}, {0x14, 0x35, 'bridge_slave_1\x00'}, {0x14, 0x35, 'dvmrp1\x00'}]}, @IFLA_WEIGHT={0x8, 0xf, 0x401}, @IFLA_IFALIAS={0x14, 0x14, 'wg2\x00'}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x2458}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'geneve0\x00'}]}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4044815}, 0x8815) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) fspick(0xffffffffffffffff, 0x0, 0x0) r10 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r10, 0x29, 0x22, &(0x7f0000000000)={{0xa, 0x0, 0x101, @loopback, 0xa3c}, {0xa, 0xfffe, 0xfffffffd, @dev, 0x4}, 0x1000, {[0x9, 0x1, 0xfffffffe, 0xfffffef9, 0x0, 0x1, 0x2]}}, 0x5c) 335.098713ms ago: executing program 9 (id=3560): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semop(0x0, 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x858068, &(0x7f0000000140)={[{@gid}, {}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') pread64(r1, &(0x7f0000002280)=""/4096, 0x1000, 0xd33) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x1002, @loopback, 0xffdfffff}, 0x1c) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000002c0)={0x0, 0x8}, 0x8) 121.35549ms ago: executing program 9 (id=3561): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f0000000300)={[{@test_dummy_encryption_v1}, {@resgid}, {@usrquota}, {@dioread_nolock}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@commit={'commit', 0x3d, 0xc}}]}, 0x3, 0x44b, &(0x7f0000002040)="$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") sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x300000c, &(0x7f0000000000), 0x1, 0x533, &(0x7f0000000e40)="$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") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 0s ago: executing program 3 (id=3562): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'erspan0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x17, 0x1, 0x2, 0x3, {{0x1a, 0x4, 0x1, 0x4, 0x68, 0x64, 0x0, 0x6, 0x4, 0x0, @broadcast, @remote, {[@generic={0x94, 0xe, "d99f6a292fd4361614efada5"}, @cipso={0x86, 0x11, 0x3, [{0x1, 0xb, "54009846aa31526ff6"}]}, @ra={0x94, 0x4}, @cipso={0x86, 0xa, 0x2, [{0x6, 0x4, "1314"}]}, @noop, @timestamp_addr={0x44, 0x24, 0xfe, 0x1, 0x0, [{@remote, 0xffff}, {@broadcast, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0xfffffffc}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x5}]}]}}}}}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0xa, [@func={0x8, 0x0, 0x0, 0xc, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x5}, @union={0x8, 0x3, 0x0, 0x5, 0x1, 0x9, [{0x0, 0x5, 0xffffffff}, {0xc, 0x1}, {0x8, 0x5, 0x4}]}, @typedef={0x7, 0x0, 0x0, 0x8, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x4}}, @struct={0x2, 0x6, 0x0, 0x4, 0x0, 0x5, [{0xf, 0x3, 0x380}, {0xe, 0x2, 0x5}, {0xf, 0x0, 0x2}, {0x7, 0x3, 0x57}, {0x6, 0x1, 0xfffffffb}, {0x7, 0x5, 0x40}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xd, 0x1}, {0x4, 0x3}, {0x2, 0x3}, {0x3, 0x4}]}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x48, 0x0, 0x31, 0x2}]}, {0x0, [0x5f, 0x61, 0x30, 0x2e, 0x30, 0x5f, 0x5f, 0x0]}}, &(0x7f00000005c0)=""/222, 0x11e, 0xde, 0x0, 0x5}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x16, &(0x7f0000000580), 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x50) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0x8000, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x3, 0x6, &(0x7f0000000240)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000280)='GPL\x00', 0xbc9b, 0x1000, &(0x7f0000000a80)=""/4096, 0x41100, 0x94, '\x00', r2, @fallback=0xb, r3, 0x8, &(0x7f0000000700)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x0, &(0x7f0000000800)=[r0, r0, r5, r6, r0], 0x0, 0x10, 0xffffffa9}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000efffffff850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) utimes(0x0, 0x0) r8 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000280), 0xfd, r0}, 0x38) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r11, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r12, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r10], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) kernel console output (not intermixed with test programs): -fs: test_dummy_encryption option not supported [ 277.496986][T12460] loop9: detected capacity change from 0 to 512 [ 277.567135][T12460] EXT4-fs (loop9): 1 orphan inode deleted [ 277.597399][T12465] netlink: 92 bytes leftover after parsing attributes in process `syz.3.2992'. [ 277.626070][T12460] ext4 filesystem being mounted at /169/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 277.795969][ T37] EXT4-fs error (device loop9): ext4_release_dquot:6969: comm kworker/u8:2: Failed to release dquot type 1 [ 278.271873][T12494] loop9: detected capacity change from 0 to 8192 [ 278.364785][T12494] loop9: p2 p3 p4 [ 278.368752][T12494] loop9: p2 start 2936012800 is beyond EOD, truncated [ 278.375641][T12494] loop9: p3 start 1912602624 is beyond EOD, truncated [ 278.382510][T12494] loop9: p4 size 656640 extends beyond EOD, truncated [ 278.454357][T12513] FAULT_INJECTION: forcing a failure. [ 278.454357][T12513] name failslab, interval 1, probability 0, space 0, times 0 [ 278.467051][T12513] CPU: 1 UID: 0 PID: 12513 Comm: syz.9.3013 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 278.467086][T12513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 278.467180][T12513] Call Trace: [ 278.467188][T12513] [ 278.467197][T12513] __dump_stack+0x1d/0x30 [ 278.467221][T12513] dump_stack_lvl+0xe8/0x140 [ 278.467243][T12513] dump_stack+0x15/0x1b [ 278.467330][T12513] should_fail_ex+0x265/0x280 [ 278.467442][T12513] should_failslab+0x8c/0xb0 [ 278.467470][T12513] kmem_cache_alloc_node_noprof+0x57/0x320 [ 278.467623][T12513] ? __alloc_skb+0x101/0x320 [ 278.467717][T12513] __alloc_skb+0x101/0x320 [ 278.467815][T12513] netlink_alloc_large_skb+0xba/0xf0 [ 278.467850][T12513] netlink_sendmsg+0x3cf/0x6b0 [ 278.467914][T12513] ? __pfx_netlink_sendmsg+0x10/0x10 [ 278.467952][T12513] __sock_sendmsg+0x145/0x180 [ 278.467980][T12513] ____sys_sendmsg+0x31e/0x4e0 [ 278.468082][T12513] ___sys_sendmsg+0x17b/0x1d0 [ 278.468139][T12513] __x64_sys_sendmsg+0xd4/0x160 [ 278.468235][T12513] x64_sys_call+0x191e/0x2ff0 [ 278.468261][T12513] do_syscall_64+0xd2/0x200 [ 278.468289][T12513] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 278.468315][T12513] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 278.468335][T12513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.468381][T12513] RIP: 0033:0x7efeb5ceebe9 [ 278.468399][T12513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.468421][T12513] RSP: 002b:00007efeb4357038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.468458][T12513] RAX: ffffffffffffffda RBX: 00007efeb5f15fa0 RCX: 00007efeb5ceebe9 [ 278.468473][T12513] RDX: 0000000020008000 RSI: 0000200000000500 RDI: 0000000000000005 [ 278.468488][T12513] RBP: 00007efeb4357090 R08: 0000000000000000 R09: 0000000000000000 [ 278.468578][T12513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.468595][T12513] R13: 00007efeb5f16038 R14: 00007efeb5f15fa0 R15: 00007ffc658f5708 [ 278.468620][T12513] [ 278.704459][T12518] FAULT_INJECTION: forcing a failure. [ 278.704459][T12518] name failslab, interval 1, probability 0, space 0, times 0 [ 278.717339][T12518] CPU: 1 UID: 0 PID: 12518 Comm: syz.9.3015 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 278.717452][T12518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 278.717469][T12518] Call Trace: [ 278.717542][T12518] [ 278.717551][T12518] __dump_stack+0x1d/0x30 [ 278.717575][T12518] dump_stack_lvl+0xe8/0x140 [ 278.717594][T12518] dump_stack+0x15/0x1b [ 278.717610][T12518] should_fail_ex+0x265/0x280 [ 278.717709][T12518] should_failslab+0x8c/0xb0 [ 278.717734][T12518] kmem_cache_alloc_node_noprof+0x57/0x320 [ 278.717831][T12518] ? __alloc_skb+0x101/0x320 [ 278.717947][T12518] __alloc_skb+0x101/0x320 [ 278.717982][T12518] ? audit_log_start+0x365/0x6c0 [ 278.718018][T12518] audit_log_start+0x380/0x6c0 [ 278.718053][T12518] audit_seccomp+0x48/0x100 [ 278.718101][T12518] ? __seccomp_filter+0x68c/0x10d0 [ 278.718129][T12518] __seccomp_filter+0x69d/0x10d0 [ 278.718212][T12518] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 278.718276][T12518] ? vfs_write+0x75e/0x8e0 [ 278.718305][T12518] ? __rcu_read_unlock+0x4f/0x70 [ 278.718481][T12518] ? __fget_files+0x184/0x1c0 [ 278.718524][T12518] __secure_computing+0x82/0x150 [ 278.718553][T12518] syscall_trace_enter+0xcf/0x1e0 [ 278.718585][T12518] do_syscall_64+0xac/0x200 [ 278.718614][T12518] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 278.718692][T12518] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 278.718719][T12518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.718756][T12518] RIP: 0033:0x7efeb5ceebe9 [ 278.718805][T12518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.718827][T12518] RSP: 002b:00007efeb4357038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f2 [ 278.718851][T12518] RAX: ffffffffffffffda RBX: 00007efeb5f15fa0 RCX: 00007efeb5ceebe9 [ 278.718905][T12518] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 278.718920][T12518] RBP: 00007efeb4357090 R08: 0000000000000000 R09: 0000000000000000 [ 278.718936][T12518] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 [ 278.718978][T12518] R13: 00007efeb5f16038 R14: 00007efeb5f15fa0 R15: 00007ffc658f5708 [ 278.718996][T12518] [ 278.941134][T12520] loop8: detected capacity change from 0 to 512 [ 279.189661][T12536] loop4: detected capacity change from 0 to 8192 [ 279.225232][T12536] loop4: p2 p3 p4 [ 279.229085][T12536] loop4: p2 start 2936012800 is beyond EOD, truncated [ 279.235930][T12536] loop4: p3 start 1912602624 is beyond EOD, truncated [ 279.242718][T12536] loop4: p4 size 656640 extends beyond EOD, truncated [ 279.392018][T12546] loop4: detected capacity change from 0 to 512 [ 279.419834][T12546] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.3026: Failed to acquire dquot type 0 [ 279.431569][T12546] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 279.522570][T12554] loop8: detected capacity change from 0 to 512 [ 279.538792][T12554] ext4 filesystem being mounted at /213/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 279.572773][T12562] FAULT_INJECTION: forcing a failure. [ 279.572773][T12562] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.586014][T12562] CPU: 0 UID: 0 PID: 12562 Comm: syz.6.3031 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 279.586052][T12562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 279.586068][T12562] Call Trace: [ 279.586076][T12562] [ 279.586085][T12562] __dump_stack+0x1d/0x30 [ 279.586137][T12562] dump_stack_lvl+0xe8/0x140 [ 279.586162][T12562] dump_stack+0x15/0x1b [ 279.586183][T12562] should_fail_ex+0x265/0x280 [ 279.586296][T12562] should_fail+0xb/0x20 [ 279.586339][T12562] should_fail_usercopy+0x1a/0x20 [ 279.586363][T12562] _copy_from_user+0x1c/0xb0 [ 279.586417][T12562] __sys_sendto+0x19e/0x330 [ 279.586472][T12562] __x64_sys_sendto+0x76/0x90 [ 279.586503][T12562] x64_sys_call+0x2d05/0x2ff0 [ 279.586581][T12562] do_syscall_64+0xd2/0x200 [ 279.586610][T12562] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 279.586637][T12562] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 279.586655][T12562] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.586706][T12562] RIP: 0033:0x7f5ed0e5ebe9 [ 279.586719][T12562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.586824][T12562] RSP: 002b:00007f5ecf4bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 279.586841][T12562] RAX: ffffffffffffffda RBX: 00007f5ed1085fa0 RCX: 00007f5ed0e5ebe9 [ 279.586851][T12562] RDX: 00000000000005c4 RSI: 0000000000000000 RDI: 0000000000000006 [ 279.586862][T12562] RBP: 00007f5ecf4bf090 R08: 0000200000000540 R09: 000000000000001c [ 279.586872][T12562] R10: 000000000404c844 R11: 0000000000000246 R12: 0000000000000001 [ 279.586883][T12562] R13: 00007f5ed1086038 R14: 00007f5ed1085fa0 R15: 00007ffc3d6bd198 [ 279.586958][T12562] [ 279.782349][T12549] loop8: detected capacity change from 0 to 1024 [ 279.787840][T12566] tmpfs: Bad value for 'mpol' [ 279.811443][T12549] ext4 filesystem being mounted at /213/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 279.844619][T12549] usb usb1: check_ctrlrecip: process 12549 (+}[@) requesting ep 01 but needs 81 [ 279.860488][T12577] loop4: detected capacity change from 0 to 8192 [ 279.864090][T12549] vhci_hcd: default hub control req: 020f v0004 i0001 l0 [ 279.885314][T12577] loop4: p2 p3 p4 [ 279.891125][T12577] loop4: p2 start 2936012800 is beyond EOD, truncated [ 279.898008][T12577] loop4: p3 start 1912602624 is beyond EOD, truncated [ 279.904830][T12577] loop4: p4 size 656640 extends beyond EOD, truncated [ 279.951397][T12581] loop8: detected capacity change from 0 to 512 [ 279.958537][T12581] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 279.997385][T12583] loop6: detected capacity change from 0 to 512 [ 280.007637][T12581] EXT4-fs error (device loop8): ext4_get_branch:178: inode #11: block 4294967295: comm syz.8.3038: invalid block [ 280.023503][T12581] EXT4-fs error (device loop8): ext4_free_branches:1023: inode #11: comm syz.8.3038: invalid indirect mapped block 4294967295 (level 1) [ 280.027476][T12583] EXT4-fs error (device loop6): ext4_acquire_dquot:6933: comm syz.6.3039: Failed to acquire dquot type 0 [ 280.070832][T12583] EXT4-fs warning (device loop6): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 280.087567][T12581] EXT4-fs error (device loop8): ext4_free_branches:1023: inode #11: comm syz.8.3038: invalid indirect mapped block 4294967295 (level 1) [ 280.117172][T12581] EXT4-fs (loop8): 2 truncates cleaned up [ 280.179579][T12599] validate_nla: 5 callbacks suppressed [ 280.179592][T12599] netlink: 'syz.3.3044': attribute type 10 has an invalid length. [ 280.244655][T12605] FAULT_INJECTION: forcing a failure. [ 280.244655][T12605] name failslab, interval 1, probability 0, space 0, times 0 [ 280.257400][T12605] CPU: 0 UID: 0 PID: 12605 Comm: syz.6.3045 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 280.257470][T12605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 280.257481][T12605] Call Trace: [ 280.257487][T12605] [ 280.257493][T12605] __dump_stack+0x1d/0x30 [ 280.257558][T12605] dump_stack_lvl+0xe8/0x140 [ 280.257642][T12605] dump_stack+0x15/0x1b [ 280.257662][T12605] should_fail_ex+0x265/0x280 [ 280.257695][T12605] should_failslab+0x8c/0xb0 [ 280.257722][T12605] kmem_cache_alloc_node_noprof+0x57/0x320 [ 280.257793][T12605] ? __alloc_skb+0x101/0x320 [ 280.257822][T12605] __alloc_skb+0x101/0x320 [ 280.257932][T12605] ? audit_log_start+0x365/0x6c0 [ 280.257967][T12605] audit_log_start+0x380/0x6c0 [ 280.258084][T12605] audit_seccomp+0x48/0x100 [ 280.258132][T12605] ? __seccomp_filter+0x68c/0x10d0 [ 280.258158][T12605] __seccomp_filter+0x69d/0x10d0 [ 280.258181][T12605] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 280.258231][T12605] ? vfs_write+0x75e/0x8e0 [ 280.258263][T12605] __secure_computing+0x82/0x150 [ 280.258284][T12605] syscall_trace_enter+0xcf/0x1e0 [ 280.258309][T12605] do_syscall_64+0xac/0x200 [ 280.258331][T12605] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 280.258418][T12605] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 280.258441][T12605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.258464][T12605] RIP: 0033:0x7f5ed0e5ebe9 [ 280.258477][T12605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.258494][T12605] RSP: 002b:00007f5ecf4bf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f2 [ 280.258548][T12605] RAX: ffffffffffffffda RBX: 00007f5ed1085fa0 RCX: 00007f5ed0e5ebe9 [ 280.258563][T12605] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 280.258578][T12605] RBP: 00007f5ecf4bf090 R08: 0000000000000000 R09: 0000000000000000 [ 280.258593][T12605] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 [ 280.258685][T12605] R13: 00007f5ed1086038 R14: 00007f5ed1085fa0 R15: 00007ffc3d6bd198 [ 280.258704][T12605] [ 280.484297][ T29] kauditd_printk_skb: 165 callbacks suppressed [ 280.484315][ T29] audit: type=1400 audit(1754457275.619:13023): avc: denied { read } for pid=12589 comm="syz.4.3040" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 280.515006][ T29] audit: type=1400 audit(1754457275.619:13024): avc: denied { open } for pid=12589 comm="syz.4.3040" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 280.559211][ T29] audit: type=1326 audit(1754457275.909:13025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12604 comm="syz.6.3045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5ed0e5d5fc code=0x7ffc0000 [ 280.582782][ T29] audit: type=1326 audit(1754457275.909:13026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12604 comm="syz.6.3045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5ed0e5d69f code=0x7ffc0000 [ 280.606225][ T29] audit: type=1326 audit(1754457275.909:13027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12604 comm="syz.6.3045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5ed0e5d84a code=0x7ffc0000 [ 280.629678][ T29] audit: type=1326 audit(1754457275.909:13028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12604 comm="syz.6.3045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5ed0e5ebe9 code=0x7ffc0000 [ 280.653311][ T29] audit: type=1326 audit(1754457275.909:13029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12604 comm="syz.6.3045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5ed0e5ebe9 code=0x7ffc0000 [ 280.697360][ T29] audit: type=1326 audit(1754457276.059:13030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12613 comm="syz.6.3049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5ed0e5ebe9 code=0x7ffc0000 [ 280.721036][ T29] audit: type=1326 audit(1754457276.059:13031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12613 comm="syz.6.3049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5ed0e5ebe9 code=0x7ffc0000 [ 280.746197][ T29] audit: type=1326 audit(1754457276.089:13032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12613 comm="syz.6.3049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5ed0e5ebe9 code=0x7ffc0000 [ 280.873904][T12617] loop6: detected capacity change from 0 to 8192 [ 280.922903][T12625] netlink: 'syz.4.3053': attribute type 4 has an invalid length. [ 280.935360][T12617] loop6: p2 p3 p4 [ 280.939172][T12617] loop6: p2 start 2936012800 is beyond EOD, truncated [ 280.946031][T12617] loop6: p3 start 1912602624 is beyond EOD, truncated [ 280.952823][T12617] loop6: p4 size 656640 extends beyond EOD, truncated [ 281.236181][T12635] loop6: detected capacity change from 0 to 1024 [ 281.277514][T12635] ext4 filesystem being mounted at /278/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 282.043853][T12653] netlink: 'syz.3.3061': attribute type 10 has an invalid length. [ 282.092486][T12659] FAULT_INJECTION: forcing a failure. [ 282.092486][T12659] name failslab, interval 1, probability 0, space 0, times 0 [ 282.105229][T12659] CPU: 0 UID: 0 PID: 12659 Comm: syz.3.3066 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 282.105265][T12659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 282.105343][T12659] Call Trace: [ 282.105350][T12659] [ 282.105359][T12659] __dump_stack+0x1d/0x30 [ 282.105447][T12659] dump_stack_lvl+0xe8/0x140 [ 282.105471][T12659] dump_stack+0x15/0x1b [ 282.105490][T12659] should_fail_ex+0x265/0x280 [ 282.105606][T12659] should_failslab+0x8c/0xb0 [ 282.105705][T12659] __kmalloc_noprof+0xa5/0x3e0 [ 282.105761][T12659] ? kobject_get_path+0x92/0x1c0 [ 282.105803][T12659] kobject_get_path+0x92/0x1c0 [ 282.105837][T12659] input_devices_seq_show+0x36/0x470 [ 282.105943][T12659] traverse+0x141/0x3a0 [ 282.105981][T12659] seq_read_iter+0x853/0x940 [ 282.106015][T12659] ? _parse_integer_limit+0x170/0x190 [ 282.106073][T12659] seq_read+0x1f7/0x240 [ 282.106107][T12659] ? __pfx_seq_read+0x10/0x10 [ 282.106138][T12659] proc_reg_read+0x128/0x1c0 [ 282.106220][T12659] ? __pfx_proc_reg_read+0x10/0x10 [ 282.106261][T12659] vfs_readv+0x3fb/0x690 [ 282.106356][T12659] __x64_sys_preadv+0xfd/0x1c0 [ 282.106383][T12659] x64_sys_call+0x282a/0x2ff0 [ 282.106408][T12659] do_syscall_64+0xd2/0x200 [ 282.106435][T12659] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 282.106488][T12659] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 282.106568][T12659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.106594][T12659] RIP: 0033:0x7fba1a26ebe9 [ 282.106609][T12659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.106625][T12659] RSP: 002b:00007fba188d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 282.106664][T12659] RAX: ffffffffffffffda RBX: 00007fba1a495fa0 RCX: 00007fba1a26ebe9 [ 282.106675][T12659] RDX: 0000000000000001 RSI: 00002000000015c0 RDI: 0000000000000006 [ 282.106688][T12659] RBP: 00007fba188d7090 R08: 000000000000d215 R09: 0000000000000000 [ 282.106703][T12659] R10: 00000000000000f0 R11: 0000000000000246 R12: 0000000000000001 [ 282.106716][T12659] R13: 00007fba1a496038 R14: 00007fba1a495fa0 R15: 00007ffcf479f7f8 [ 282.106738][T12659] [ 282.354623][T12664] loop8: detected capacity change from 0 to 512 [ 282.393393][T12664] EXT4-fs (loop8): mounting ext2 file system using the ext4 subsystem [ 282.407634][T12664] EXT4-fs error (device loop8): ext4_orphan_get:1418: comm syz.8.3067: bad orphan inode 15 [ 282.425004][T12664] ext4_test_bit(bit=14, block=18) = 1 [ 282.430436][T12664] is_bad_inode(inode)=0 [ 282.434617][T12664] NEXT_ORPHAN(inode)=1023 [ 282.439036][T12664] max_ino=32 [ 282.442286][T12664] i_nlink=0 [ 282.451628][T12664] EXT4-fs error (device loop8): ext4_xattr_delete_inode:2962: inode #15: comm syz.8.3067: corrupted xattr block 19: invalid header [ 282.498698][T12664] EXT4-fs warning (device loop8): ext4_evict_inode:274: xattr delete (err -117) [ 282.515123][T12664] ext2 filesystem being mounted at /218/qY3aK supports timestamps until 2038-01-19 (0x7fffffff) [ 282.617141][T12688] netlink: 'syz.8.3075': attribute type 4 has an invalid length. [ 282.630127][T12692] netlink: 'syz.9.3077': attribute type 10 has an invalid length. [ 282.630156][T12691] __nla_validate_parse: 10 callbacks suppressed [ 282.630170][T12691] netlink: 92 bytes leftover after parsing attributes in process `syz.3.3076'. [ 282.743755][T12703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=12703 comm=syz.8.3082 [ 283.012007][T12715] loop8: detected capacity change from 0 to 512 [ 283.018589][T12715] EXT4-fs: test_dummy_encryption option not supported [ 283.031380][T12715] loop8: detected capacity change from 0 to 512 [ 283.049601][T12715] EXT4-fs (loop8): 1 orphan inode deleted [ 283.056063][T12715] ext4 filesystem being mounted at /223/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 283.068056][ T3427] EXT4-fs error (device loop8): ext4_release_dquot:6969: comm kworker/u8:6: Failed to release dquot type 1 [ 283.101889][T12724] netlink: 'syz.3.3088': attribute type 10 has an invalid length. [ 283.149326][T12727] netlink: 'syz.3.3090': attribute type 4 has an invalid length. [ 283.389360][T12740] netlink: 'syz.6.3094': attribute type 10 has an invalid length. [ 283.402101][T12736] loop4: detected capacity change from 0 to 512 [ 283.408735][T12736] EXT4-fs: test_dummy_encryption option not supported [ 283.438464][T12736] loop4: detected capacity change from 0 to 512 [ 283.464590][T12736] EXT4-fs (loop4): 1 orphan inode deleted [ 283.471312][T12736] EXT4-fs mount: 25 callbacks suppressed [ 283.471343][T12736] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 283.489792][ T31] EXT4-fs error (device loop4): ext4_release_dquot:6969: comm kworker/u8:1: Failed to release dquot type 1 [ 283.541713][T12736] ext4 filesystem being mounted at /33/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 283.794267][ T9535] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 283.832245][T14369] netlink: 'syz.6.3100': attribute type 10 has an invalid length. [ 283.883938][T14370] loop8: detected capacity change from 0 to 8192 [ 283.929184][T14370] loop8: p2 p3 p4 [ 283.929740][T14380] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3105'. [ 283.932977][T14370] loop8: p2 start 2936012800 is beyond EOD, truncated [ 283.944650][T14380] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3105'. [ 283.948872][T14370] loop8: p3 start 1912602624 is beyond EOD, truncated [ 283.964528][T14370] loop8: p4 size 656640 extends beyond EOD, truncated [ 284.008661][T14383] netlink: 'syz.6.3106': attribute type 10 has an invalid length. [ 284.108631][T14391] loop8: detected capacity change from 0 to 1024 [ 284.141281][T14391] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 284.156787][T14391] ext4 filesystem being mounted at /225/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 284.167863][T12116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 284.366831][ T9535] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 285.239498][T14402] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3114'. [ 285.248435][T14402] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3114'. [ 285.494072][T14416] netlink: 'syz.8.3119': attribute type 10 has an invalid length. [ 285.580461][T14429] netlink: 92 bytes leftover after parsing attributes in process `syz.9.3125'. [ 285.628834][ T29] kauditd_printk_skb: 214 callbacks suppressed [ 285.628855][ T29] audit: type=1326 audit(1754457280.989:13245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.667908][T14437] loop4: detected capacity change from 0 to 1024 [ 285.676865][T14437] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 285.679801][ T29] audit: type=1326 audit(1754457280.989:13246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.711125][ T29] audit: type=1326 audit(1754457280.989:13247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.734826][ T29] audit: type=1326 audit(1754457280.989:13248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.754701][T14447] loop9: detected capacity change from 0 to 512 [ 285.758503][ T29] audit: type=1326 audit(1754457280.989:13249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.788361][ T29] audit: type=1326 audit(1754457280.989:13250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.812078][ T29] audit: type=1326 audit(1754457280.989:13251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.835760][ T29] audit: type=1326 audit(1754457280.989:13252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.859522][ T29] audit: type=1326 audit(1754457280.989:13253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.883193][ T29] audit: type=1326 audit(1754457280.989:13254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.8.3130" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 285.885278][T14447] EXT4-fs (loop9): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 285.958525][T14437] EXT4-fs error (device loop4): ext4_read_block_bitmap_nowait:483: comm syz.4.3129: Invalid block bitmap block 0 in block_group 0 [ 285.981899][T14445] EXT4-fs error (device loop9): ext4_acquire_dquot:6933: comm syz.9.3132: Failed to acquire dquot type 0 [ 286.003082][T14437] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.3129: Failed to acquire dquot type 0 [ 286.014796][T14445] EXT4-fs warning (device loop9): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 286.014903][T14437] EXT4-fs error (device loop4): ext4_free_blocks:6696: comm syz.4.3129: Freeing blocks not in datazone - block = 0, count = 4096 [ 286.045315][T14437] EXT4-fs error (device loop4): ext4_read_inode_bitmap:139: comm syz.4.3129: Invalid inode bitmap blk 0 in block_group 0 [ 286.059522][T14437] EXT4-fs error (device loop4) in ext4_free_inode:361: Corrupt filesystem [ 286.068624][T14437] EXT4-fs (loop4): 1 orphan inode deleted [ 286.071162][ T37] EXT4-fs error (device loop4): ext4_release_dquot:6969: comm kworker/u8:2: Failed to release dquot type 0 [ 286.075191][T14437] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 286.099042][ T9640] EXT4-fs (loop9): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 286.139656][T12116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 286.141828][T14461] netlink: 'syz.3.3136': attribute type 10 has an invalid length. [ 286.183143][T14467] FAULT_INJECTION: forcing a failure. [ 286.183143][T14467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.196416][T14467] CPU: 0 UID: 0 PID: 14467 Comm: syz.3.3139 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 286.196443][T14467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 286.196454][T14467] Call Trace: [ 286.196461][T14467] [ 286.196469][T14467] __dump_stack+0x1d/0x30 [ 286.196494][T14467] dump_stack_lvl+0xe8/0x140 [ 286.196523][T14467] dump_stack+0x15/0x1b [ 286.196542][T14467] should_fail_ex+0x265/0x280 [ 286.196651][T14467] should_fail+0xb/0x20 [ 286.196750][T14467] should_fail_usercopy+0x1a/0x20 [ 286.196780][T14467] _copy_from_user+0x1c/0xb0 [ 286.196805][T14467] ___sys_sendmsg+0xc1/0x1d0 [ 286.196864][T14467] __x64_sys_sendmsg+0xd4/0x160 [ 286.196899][T14467] x64_sys_call+0x191e/0x2ff0 [ 286.196923][T14467] do_syscall_64+0xd2/0x200 [ 286.196950][T14467] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 286.197003][T14467] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 286.197027][T14467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.197046][T14467] RIP: 0033:0x7fba1a26ebe9 [ 286.197059][T14467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.197076][T14467] RSP: 002b:00007fba188d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 286.197110][T14467] RAX: ffffffffffffffda RBX: 00007fba1a495fa0 RCX: 00007fba1a26ebe9 [ 286.197125][T14467] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 286.197138][T14467] RBP: 00007fba188d7090 R08: 0000000000000000 R09: 0000000000000000 [ 286.197149][T14467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.197163][T14467] R13: 00007fba1a496038 R14: 00007fba1a495fa0 R15: 00007ffcf479f7f8 [ 286.197186][T14467] [ 286.412749][T14474] netlink: 'syz.9.3142': attribute type 10 has an invalid length. [ 286.517075][T14467] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3139'. [ 286.707568][T14476] loop6: detected capacity change from 0 to 8192 [ 286.775878][T14476] loop6: p2 p3 p4 [ 286.781064][T14476] loop6: p2 start 2936012800 is beyond EOD, truncated [ 286.787869][T14476] loop6: p3 start 1912602624 is beyond EOD, truncated [ 286.794727][T14476] loop6: p4 size 656640 extends beyond EOD, truncated [ 287.061855][T14487] loop8: detected capacity change from 0 to 512 [ 287.089236][T14487] EXT4-fs: Ignoring removed mblk_io_submit option [ 287.107754][T14487] EXT4-fs (loop8): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 287.139416][T14487] EXT4-fs (loop8): revision level too high, forcing read-only mode [ 287.154708][T14487] EXT4-fs (loop8): orphan cleanup on readonly fs [ 287.172008][T14487] EXT4-fs error (device loop8): ext4_read_block_bitmap_nowait:483: comm syz.8.3148: Invalid block bitmap block 0 in block_group 0 [ 287.200124][T14487] EXT4-fs (loop8): Remounting filesystem read-only [ 287.216329][T14487] EXT4-fs (loop8): 1 orphan inode deleted [ 287.229298][T14487] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 287.294007][T14503] netlink: 92 bytes leftover after parsing attributes in process `syz.6.3154'. [ 287.459952][ T9535] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 287.532059][T14509] loop4: detected capacity change from 0 to 8192 [ 287.595212][T14509] loop4: p2 p3 p4 [ 287.599300][T14509] loop4: p2 start 2936012800 is beyond EOD, truncated [ 287.606183][T14509] loop4: p3 start 1912602624 is beyond EOD, truncated [ 287.612989][T14509] loop4: p4 size 656640 extends beyond EOD, truncated [ 287.625345][T14511] netlink: 'syz.8.3156': attribute type 7 has an invalid length. [ 287.633168][T14511] netlink: 8 bytes leftover after parsing attributes in process `syz.8.3156'. [ 287.797713][T14515] FAULT_INJECTION: forcing a failure. [ 287.797713][T14515] name failslab, interval 1, probability 0, space 0, times 0 [ 287.810529][T14515] CPU: 0 UID: 0 PID: 14515 Comm: syz.4.3159 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 287.810565][T14515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 287.810578][T14515] Call Trace: [ 287.810584][T14515] [ 287.810592][T14515] __dump_stack+0x1d/0x30 [ 287.810613][T14515] dump_stack_lvl+0xe8/0x140 [ 287.810705][T14515] dump_stack+0x15/0x1b [ 287.810724][T14515] should_fail_ex+0x265/0x280 [ 287.810767][T14515] should_failslab+0x8c/0xb0 [ 287.810796][T14515] kmem_cache_alloc_node_noprof+0x57/0x320 [ 287.810915][T14515] ? __alloc_skb+0x101/0x320 [ 287.811074][T14515] __alloc_skb+0x101/0x320 [ 287.811113][T14515] netlink_alloc_large_skb+0xba/0xf0 [ 287.811154][T14515] netlink_sendmsg+0x3cf/0x6b0 [ 287.811192][T14515] ? __pfx_netlink_sendmsg+0x10/0x10 [ 287.811244][T14515] __sock_sendmsg+0x145/0x180 [ 287.811276][T14515] ____sys_sendmsg+0x31e/0x4e0 [ 287.811423][T14515] ___sys_sendmsg+0x17b/0x1d0 [ 287.811476][T14515] __x64_sys_sendmsg+0xd4/0x160 [ 287.811574][T14515] x64_sys_call+0x191e/0x2ff0 [ 287.811595][T14515] do_syscall_64+0xd2/0x200 [ 287.811674][T14515] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 287.811717][T14515] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 287.811756][T14515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.811777][T14515] RIP: 0033:0x7f9c4878ebe9 [ 287.811791][T14515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.811809][T14515] RSP: 002b:00007f9c46def038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.811873][T14515] RAX: ffffffffffffffda RBX: 00007f9c489b5fa0 RCX: 00007f9c4878ebe9 [ 287.811889][T14515] RDX: 0000000000040812 RSI: 0000200000000a40 RDI: 0000000000000006 [ 287.811948][T14515] RBP: 00007f9c46def090 R08: 0000000000000000 R09: 0000000000000000 [ 287.811963][T14515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.811984][T14515] R13: 00007f9c489b6038 R14: 00007f9c489b5fa0 R15: 00007ffc38d362d8 [ 287.812010][T14515] [ 288.222608][T14528] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.229983][T14528] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.245338][T14532] netlink: 'syz.6.3166': attribute type 10 has an invalid length. [ 288.288836][T14528] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 288.301739][T14528] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 288.361482][ T37] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.396495][ T37] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.439734][ T37] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.488528][ T37] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.697913][T14557] netlink: 'syz.6.3175': attribute type 10 has an invalid length. [ 288.856432][T14562] netlink: 44 bytes leftover after parsing attributes in process `syz.3.3177'. [ 288.858722][T14564] netlink: 'syz.6.3178': attribute type 10 has an invalid length. [ 288.866636][T14562] netlink: 84 bytes leftover after parsing attributes in process `syz.3.3177'. [ 288.988941][T14572] serio: Serial port ttyS3 [ 289.002234][T14578] FAULT_INJECTION: forcing a failure. [ 289.002234][T14578] name failslab, interval 1, probability 0, space 0, times 0 [ 289.015077][T14578] CPU: 0 UID: 0 PID: 14578 Comm: syz.3.3184 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 289.015143][T14578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.015206][T14578] Call Trace: [ 289.015213][T14578] [ 289.015222][T14578] __dump_stack+0x1d/0x30 [ 289.015246][T14578] dump_stack_lvl+0xe8/0x140 [ 289.015269][T14578] dump_stack+0x15/0x1b [ 289.015344][T14578] should_fail_ex+0x265/0x280 [ 289.015381][T14578] should_failslab+0x8c/0xb0 [ 289.015406][T14578] kmem_cache_alloc_node_noprof+0x57/0x320 [ 289.015516][T14578] ? __alloc_skb+0x101/0x320 [ 289.015550][T14578] __alloc_skb+0x101/0x320 [ 289.015582][T14578] netlink_alloc_large_skb+0xba/0xf0 [ 289.015667][T14578] netlink_sendmsg+0x3cf/0x6b0 [ 289.015705][T14578] ? __pfx_netlink_sendmsg+0x10/0x10 [ 289.015734][T14578] __sock_sendmsg+0x145/0x180 [ 289.015815][T14578] ____sys_sendmsg+0x31e/0x4e0 [ 289.015854][T14578] ___sys_sendmsg+0x17b/0x1d0 [ 289.015906][T14578] __x64_sys_sendmsg+0xd4/0x160 [ 289.015965][T14578] x64_sys_call+0x191e/0x2ff0 [ 289.015990][T14578] do_syscall_64+0xd2/0x200 [ 289.016017][T14578] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 289.016044][T14578] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 289.016144][T14578] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.016168][T14578] RIP: 0033:0x7fba1a26ebe9 [ 289.016186][T14578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.016274][T14578] RSP: 002b:00007fba188d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 289.016293][T14578] RAX: ffffffffffffffda RBX: 00007fba1a495fa0 RCX: 00007fba1a26ebe9 [ 289.016304][T14578] RDX: 0000000000040812 RSI: 0000200000000a40 RDI: 0000000000000003 [ 289.016317][T14578] RBP: 00007fba188d7090 R08: 0000000000000000 R09: 0000000000000000 [ 289.016331][T14578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.016345][T14578] R13: 00007fba1a496038 R14: 00007fba1a495fa0 R15: 00007ffcf479f7f8 [ 289.016369][T14578] [ 289.016766][T14566] loop4: detected capacity change from 0 to 8192 [ 289.079440][T14581] 9pnet_fd: Insufficient options for proto=fd [ 289.208652][T14590] netlink: 92 bytes leftover after parsing attributes in process `syz.9.3188'. [ 289.242771][T14566] loop4: p2 p3 p4 [ 289.247026][T14589] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3189'. [ 289.265137][T14566] loop4: p2 start 2936012800 is beyond EOD, truncated [ 289.272010][T14566] loop4: p3 start 1912602624 is beyond EOD, truncated [ 289.278812][T14566] loop4: p4 size 656640 extends beyond EOD, truncated [ 289.315046][T14595] netlink: 'syz.6.3191': attribute type 10 has an invalid length. [ 289.397859][T14602] loop9: detected capacity change from 0 to 512 [ 289.408338][T14602] EXT4-fs (loop9): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 289.436907][T14608] loop8: detected capacity change from 0 to 1024 [ 289.444690][T14602] EXT4-fs error (device loop9): ext4_acquire_dquot:6933: comm syz.9.3195: Failed to acquire dquot type 0 [ 289.469812][T14602] EXT4-fs warning (device loop9): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 289.487723][T14608] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 289.494000][T14619] loop4: detected capacity change from 0 to 512 [ 289.504130][T14608] ext4 filesystem being mounted at /236/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 289.529758][ T9640] EXT4-fs (loop9): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 289.546811][T14621] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3200'. [ 289.560825][T14623] netlink: 20 bytes leftover after parsing attributes in process `syz.9.3201'. [ 289.574067][T14619] EXT4-fs (loop4): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 289.584211][T14623] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3201'. [ 289.590203][T14621] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3200'. [ 289.608038][ T9535] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 289.629766][T14619] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.3199: Failed to acquire dquot type 0 [ 289.646630][T14619] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 289.668577][T14632] netlink: 92 bytes leftover after parsing attributes in process `syz.3.3204'. [ 289.681096][T14626] loop9: detected capacity change from 0 to 8192 [ 289.692551][T12116] EXT4-fs (loop4): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 289.715593][T14626] loop9: p2 p3 p4 [ 289.719520][T14626] loop9: p2 start 2936012800 is beyond EOD, truncated [ 289.726415][T14626] loop9: p3 start 1912602624 is beyond EOD, truncated [ 289.733213][T14626] loop9: p4 size 656640 extends beyond EOD, truncated [ 289.810043][T14644] netlink: 'syz.3.3207': attribute type 4 has an invalid length. [ 289.879124][T14650] loop9: detected capacity change from 0 to 512 [ 289.911341][T14650] EXT4-fs warning (device loop9): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 289.933341][T14650] EXT4-fs (loop9): mount failed [ 289.945440][T14657] binfmt_misc: register: failed to install interpreter file ./file2 [ 289.974299][T14661] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3214'. [ 290.069138][T14665] FAULT_INJECTION: forcing a failure. [ 290.069138][T14665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.082470][T14665] CPU: 0 UID: 0 PID: 14665 Comm: syz.3.3216 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 290.082506][T14665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 290.082522][T14665] Call Trace: [ 290.082529][T14665] [ 290.082538][T14665] __dump_stack+0x1d/0x30 [ 290.082561][T14665] dump_stack_lvl+0xe8/0x140 [ 290.082640][T14665] dump_stack+0x15/0x1b [ 290.082671][T14665] should_fail_ex+0x265/0x280 [ 290.082782][T14665] should_fail+0xb/0x20 [ 290.082818][T14665] should_fail_usercopy+0x1a/0x20 [ 290.082843][T14665] _copy_from_user+0x1c/0xb0 [ 290.082929][T14665] __copy_msghdr+0x244/0x300 [ 290.082966][T14665] ___sys_sendmsg+0x109/0x1d0 [ 290.083057][T14665] __sys_sendmmsg+0x178/0x300 [ 290.083113][T14665] __x64_sys_sendmmsg+0x57/0x70 [ 290.083170][T14665] x64_sys_call+0x1c4a/0x2ff0 [ 290.083316][T14665] do_syscall_64+0xd2/0x200 [ 290.083352][T14665] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 290.083382][T14665] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 290.083410][T14665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.083493][T14665] RIP: 0033:0x7fba1a26ebe9 [ 290.083509][T14665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.083529][T14665] RSP: 002b:00007fba188d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 290.083605][T14665] RAX: ffffffffffffffda RBX: 00007fba1a495fa0 RCX: 00007fba1a26ebe9 [ 290.083622][T14665] RDX: 0000000000000001 RSI: 0000200000003500 RDI: 0000000000000003 [ 290.083638][T14665] RBP: 00007fba188d7090 R08: 0000000000000000 R09: 0000000000000000 [ 290.083720][T14665] R10: 0000000000044004 R11: 0000000000000246 R12: 0000000000000001 [ 290.083732][T14665] R13: 00007fba1a496038 R14: 00007fba1a495fa0 R15: 00007ffcf479f7f8 [ 290.083753][T14665] [ 290.328373][T14670] loop6: detected capacity change from 0 to 8192 [ 290.395092][T14673] netlink: 'syz.3.3220': attribute type 4 has an invalid length. [ 290.403342][T14670] loop6: p2 p3 p4 [ 290.410131][T14670] loop6: p2 start 2936012800 is beyond EOD, truncated [ 290.417026][T14670] loop6: p3 start 1912602624 is beyond EOD, truncated [ 290.423834][T14670] loop6: p4 size 656640 extends beyond EOD, truncated [ 290.990308][T14701] loop6: detected capacity change from 0 to 128 [ 291.014000][T14701] FAT-fs (loop6): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 291.026624][T14701] FAT-fs (loop6): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 291.039935][ T29] kauditd_printk_skb: 485 callbacks suppressed [ 291.039950][ T29] audit: type=1326 audit(1754457286.399:13727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.070020][ T29] audit: type=1326 audit(1754457286.409:13728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.093644][ T29] audit: type=1326 audit(1754457286.409:13729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.117313][ T29] audit: type=1326 audit(1754457286.409:13730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.141047][ T29] audit: type=1326 audit(1754457286.409:13731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.164658][ T29] audit: type=1326 audit(1754457286.409:13732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.171139][T14705] loop4: detected capacity change from 0 to 8192 [ 291.188327][ T29] audit: type=1326 audit(1754457286.409:13733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.218262][ T29] audit: type=1326 audit(1754457286.409:13734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.241874][ T29] audit: type=1326 audit(1754457286.409:13735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.265514][ T29] audit: type=1326 audit(1754457286.409:13736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14702 comm="syz.4.3232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9c4878ebe9 code=0x7ffc0000 [ 291.325205][T14705] loop4: p2 p3 p4 [ 291.329285][T14705] loop4: p2 start 2936012800 is beyond EOD, truncated [ 291.336205][T14705] loop4: p3 start 1912602624 is beyond EOD, truncated [ 291.343073][T14705] loop4: p4 size 656640 extends beyond EOD, truncated [ 291.432558][T14715] loop4: detected capacity change from 0 to 256 [ 291.442339][T14715] msdos: Unknown parameter '0x0000000000000000BJ [ 291.442339][T14715] #yB͐`H' [ 291.463863][T14719] loop6: detected capacity change from 0 to 512 [ 291.473559][T14719] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 291.483243][T14719] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e01c, mo2=0006] [ 291.492616][T14719] System zones: 0-2, 18-18, 34-35 [ 291.499478][T14719] EXT4-fs (loop6): mounted filesystem 00000000-0700-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 291.707860][T14724] lo speed is unknown, defaulting to 1000 [ 291.714059][T14724] lo speed is unknown, defaulting to 1000 [ 291.720399][T14724] lo speed is unknown, defaulting to 1000 [ 291.746226][T14739] loop8: detected capacity change from 0 to 164 [ 291.808256][T14747] FAULT_INJECTION: forcing a failure. [ 291.808256][T14747] name failslab, interval 1, probability 0, space 0, times 0 [ 291.818986][T14724] infiniband sz1: set down [ 291.821034][T14747] CPU: 1 UID: 0 PID: 14747 Comm: syz.3.3246 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 291.821075][T14747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 291.821154][T14747] Call Trace: [ 291.821196][T14747] [ 291.821206][T14747] __dump_stack+0x1d/0x30 [ 291.821237][T14747] dump_stack_lvl+0xe8/0x140 [ 291.821322][T14747] dump_stack+0x15/0x1b [ 291.821344][T14747] should_fail_ex+0x265/0x280 [ 291.821399][T14747] should_failslab+0x8c/0xb0 [ 291.821434][T14747] kmem_cache_alloc_node_noprof+0x57/0x320 [ 291.821520][T14747] ? __alloc_skb+0x101/0x320 [ 291.821560][T14747] __alloc_skb+0x101/0x320 [ 291.821646][T14747] netlink_alloc_large_skb+0xba/0xf0 [ 291.821687][T14747] netlink_sendmsg+0x3cf/0x6b0 [ 291.821792][T14747] ? __pfx_netlink_sendmsg+0x10/0x10 [ 291.821925][T14747] __sock_sendmsg+0x145/0x180 [ 291.821957][T14747] ____sys_sendmsg+0x31e/0x4e0 [ 291.822003][T14747] ___sys_sendmsg+0x17b/0x1d0 [ 291.822177][T14747] __x64_sys_sendmsg+0xd4/0x160 [ 291.822228][T14747] x64_sys_call+0x191e/0x2ff0 [ 291.822258][T14747] do_syscall_64+0xd2/0x200 [ 291.822330][T14747] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 291.822371][T14747] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 291.822401][T14747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.822432][T14747] RIP: 0033:0x7fba1a26ebe9 [ 291.822452][T14747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.822544][T14747] RSP: 002b:00007fba188d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 291.822571][T14747] RAX: ffffffffffffffda RBX: 00007fba1a495fa0 RCX: 00007fba1a26ebe9 [ 291.822589][T14747] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005 [ 291.822606][T14747] RBP: 00007fba188d7090 R08: 0000000000000000 R09: 0000000000000000 [ 291.822622][T14747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.822640][T14747] R13: 00007fba1a496038 R14: 00007fba1a495fa0 R15: 00007ffcf479f7f8 [ 291.822666][T14747] [ 291.825769][T14744] loop4: detected capacity change from 0 to 512 [ 291.837837][T14724] infiniband sz1: added lo [ 291.837898][ T4226] lo speed is unknown, defaulting to 1000 [ 291.864497][T14724] RDS/IB: sz1: added [ 291.968528][T14744] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 291.977232][T14724] smc: adding ib device sz1 with port count 1 [ 292.002447][T14744] ext4 filesystem being mounted at /60/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 292.009769][T14724] smc: ib device sz1 port 1 has pnetid [ 292.084399][ T4226] lo speed is unknown, defaulting to 1000 [ 292.090509][T14724] lo speed is unknown, defaulting to 1000 [ 292.091174][T12116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.142195][T14724] lo speed is unknown, defaulting to 1000 [ 292.143780][T14762] netlink: 'syz.3.3252': attribute type 9 has an invalid length. [ 292.155852][T14762] netlink: 'syz.3.3252': attribute type 7 has an invalid length. [ 292.163584][T14762] netlink: 'syz.3.3252': attribute type 8 has an invalid length. [ 292.184271][T14724] lo speed is unknown, defaulting to 1000 [ 292.222059][T14724] lo speed is unknown, defaulting to 1000 [ 292.254912][T14724] lo speed is unknown, defaulting to 1000 [ 292.293316][T14724] lo speed is unknown, defaulting to 1000 [ 292.435787][ T8394] EXT4-fs (loop6): unmounting filesystem 00000000-0700-0000-0000-000000000000. [ 292.465297][T14784] netlink: 'syz.6.3261': attribute type 1 has an invalid length. [ 292.497915][T14789] loop8: detected capacity change from 0 to 512 [ 292.618827][T14789] EXT4-fs (loop8): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 292.757159][T14789] EXT4-fs error (device loop8): ext4_acquire_dquot:6933: comm syz.8.3263: Failed to acquire dquot type 0 [ 292.799524][T14798] loop6: detected capacity change from 0 to 512 [ 292.820679][T14798] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 292.836199][T14798] ext4 filesystem being mounted at /330/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 292.921731][T14789] EXT4-fs warning (device loop8): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 292.931648][ T8394] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.957669][ T9535] EXT4-fs (loop8): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 293.075371][T14812] netlink: 'syz.8.3267': attribute type 4 has an invalid length. [ 293.120408][T14815] loop6: detected capacity change from 0 to 512 [ 293.148615][T14815] EXT4-fs warning (device loop6): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 293.199913][T14815] EXT4-fs (loop6): mount failed [ 293.254685][T14823] loop8: detected capacity change from 0 to 2048 [ 293.298179][T14814] netlink: 'syz.3.3270': attribute type 4 has an invalid length. [ 293.340439][T14823] EXT4-fs (loop8): failed to initialize system zone (-117) [ 293.365597][T14823] EXT4-fs (loop8): mount failed [ 293.422475][T14834] futex_wake_op: syz.9.3276 tries to shift op by 144; fix this program [ 293.432471][T14836] SELinux: Context is not valid (left unmapped). [ 293.432851][T14834] netlink: 'syz.9.3276': attribute type 1 has an invalid length. [ 293.450424][T14823] loop8: detected capacity change from 0 to 512 [ 293.458158][T14836] FAULT_INJECTION: forcing a failure. [ 293.458158][T14836] name failslab, interval 1, probability 0, space 0, times 0 [ 293.470976][T14836] CPU: 1 UID: 0 PID: 14836 Comm: syz.3.3277 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 293.471020][T14836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 293.471038][T14836] Call Trace: [ 293.471045][T14836] [ 293.471104][T14836] __dump_stack+0x1d/0x30 [ 293.471131][T14836] dump_stack_lvl+0xe8/0x140 [ 293.471153][T14836] dump_stack+0x15/0x1b [ 293.471174][T14836] should_fail_ex+0x265/0x280 [ 293.471334][T14836] ? do_mq_timedreceive+0x23c/0x6d0 [ 293.471366][T14836] should_failslab+0x8c/0xb0 [ 293.471398][T14836] __kmalloc_cache_noprof+0x4c/0x320 [ 293.471439][T14836] do_mq_timedreceive+0x23c/0x6d0 [ 293.471544][T14836] __x64_sys_mq_timedreceive+0xc6/0x160 [ 293.471574][T14836] x64_sys_call+0x2906/0x2ff0 [ 293.471603][T14836] do_syscall_64+0xd2/0x200 [ 293.471722][T14836] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 293.471804][T14836] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 293.471834][T14836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.471862][T14836] RIP: 0033:0x7fba1a26ebe9 [ 293.471881][T14836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.471904][T14836] RSP: 002b:00007fba188d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f3 [ 293.471922][T14836] RAX: ffffffffffffffda RBX: 00007fba1a495fa0 RCX: 00007fba1a26ebe9 [ 293.471998][T14836] RDX: 0000000000018ff5 RSI: 000020000001d600 RDI: 0000000000000007 [ 293.472014][T14836] RBP: 00007fba188d7090 R08: 0000000000000000 R09: 0000000000000000 [ 293.472031][T14836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.472046][T14836] R13: 00007fba1a496038 R14: 00007fba1a495fa0 R15: 00007ffcf479f7f8 [ 293.472095][T14836] [ 293.672098][T14823] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 293.684722][T14823] ext4 filesystem being mounted at /249/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 293.697366][T14823] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 293.769094][T14850] netlink: 'syz.6.3281': attribute type 4 has an invalid length. [ 293.888017][T14852] __nla_validate_parse: 14 callbacks suppressed [ 293.888038][T14852] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3283'. [ 293.908030][T14852] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3283'. [ 293.928240][T14817] lo speed is unknown, defaulting to 1000 [ 294.112098][T14849] lo speed is unknown, defaulting to 1000 [ 294.203146][T14863] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3291'. [ 294.237227][T14863] hsr_slave_0 (unregistering): left promiscuous mode [ 294.314536][T14874] netlink: 'syz.4.3293': attribute type 4 has an invalid length. [ 294.406122][T14882] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3295'. [ 294.434543][T14882] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3295'. [ 294.477418][T14866] lo speed is unknown, defaulting to 1000 [ 294.599617][T14866] chnl_net:caif_netlink_parms(): no params data found [ 294.608577][T14890] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3299'. [ 294.644568][T14897] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3300'. [ 294.653562][T14897] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3300'. [ 294.664407][T14905] FAULT_INJECTION: forcing a failure. [ 294.664407][T14905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 294.677549][T14905] CPU: 0 UID: 0 PID: 14905 Comm: syz.8.3302 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 294.677632][T14905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 294.677648][T14905] Call Trace: [ 294.677655][T14905] [ 294.677664][T14905] __dump_stack+0x1d/0x30 [ 294.677691][T14905] dump_stack_lvl+0xe8/0x140 [ 294.677716][T14905] dump_stack+0x15/0x1b [ 294.677731][T14905] should_fail_ex+0x265/0x280 [ 294.677821][T14905] should_fail+0xb/0x20 [ 294.677953][T14905] should_fail_usercopy+0x1a/0x20 [ 294.677977][T14905] _copy_from_user+0x1c/0xb0 [ 294.678010][T14905] ___sys_sendmsg+0xc1/0x1d0 [ 294.678098][T14905] __x64_sys_sendmsg+0xd4/0x160 [ 294.678145][T14905] x64_sys_call+0x191e/0x2ff0 [ 294.678173][T14905] do_syscall_64+0xd2/0x200 [ 294.678277][T14905] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 294.678301][T14905] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 294.678322][T14905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.678369][T14905] RIP: 0033:0x7fcc5602ebe9 [ 294.678387][T14905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.678411][T14905] RSP: 002b:00007fcc54697038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 294.678507][T14905] RAX: ffffffffffffffda RBX: 00007fcc56255fa0 RCX: 00007fcc5602ebe9 [ 294.678521][T14905] RDX: 0000000000008000 RSI: 0000200000001ac0 RDI: 0000000000000003 [ 294.678533][T14905] RBP: 00007fcc54697090 R08: 0000000000000000 R09: 0000000000000000 [ 294.678545][T14905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.678556][T14905] R13: 00007fcc56256038 R14: 00007fcc56255fa0 R15: 00007ffe76dba788 [ 294.678575][T14905] [ 294.868894][T14866] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.876097][T14866] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.888275][T14866] bridge_slave_0: entered allmulticast mode [ 294.894879][T14866] bridge_slave_0: entered promiscuous mode [ 294.901853][T14866] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.908966][T14866] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.916576][T14866] bridge_slave_1: entered allmulticast mode [ 294.923011][T14866] bridge_slave_1: entered promiscuous mode [ 294.941295][T14866] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 294.952017][T14866] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 294.973315][T14866] team0: Port device team_slave_0 added [ 294.979934][T14866] team0: Port device team_slave_1 added [ 294.997516][T14866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 295.004487][T14866] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 295.030575][T14866] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 295.041919][T14866] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 295.048975][T14866] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 295.075105][T14866] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 295.109003][T14866] hsr_slave_0: entered promiscuous mode [ 295.115129][T14866] hsr_slave_1: entered promiscuous mode [ 295.121065][T14866] debugfs: 'hsr0' already exists in 'hsr' [ 295.126857][T14866] Cannot create hsr debugfs directory [ 295.179932][T14915] netlink: 36 bytes leftover after parsing attributes in process `syz.8.3305'. [ 295.256999][T14917] netlink: 'syz.8.3306': attribute type 4 has an invalid length. [ 295.540702][T14930] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3310'. [ 296.397046][T14934] loop8: detected capacity change from 0 to 512 [ 296.417049][T14866] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 296.424729][T14934] EXT4-fs (loop8): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 296.441531][T14866] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 296.453842][T14866] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 296.468677][T14934] __quota_error: 483 callbacks suppressed [ 296.468690][T14934] Quota error (device loop8): find_tree_dqentry: Cycle in quota tree detected: block 4 index 0 [ 296.484843][T14934] Quota error (device loop8): qtree_read_dquot: Can't read quota structure for id 0 [ 296.494250][T14934] EXT4-fs error (device loop8): ext4_acquire_dquot:6933: comm syz.8.3313: Failed to acquire dquot type 0 [ 296.577159][T14866] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 296.588916][T14934] EXT4-fs warning (device loop8): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 296.635446][ T9535] EXT4-fs (loop8): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 296.682418][T14866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.698155][T14866] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.709474][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.716566][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.732092][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.739207][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.754745][ T29] audit: type=1326 audit(1754457292.109:14217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 296.778453][ T29] audit: type=1326 audit(1754457292.109:14218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=20 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 296.802037][ T29] audit: type=1326 audit(1754457292.109:14219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 296.825628][ T29] audit: type=1326 audit(1754457292.109:14220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 296.853630][ T29] audit: type=1326 audit(1754457292.109:14221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 296.877420][ T29] audit: type=1326 audit(1754457292.119:14222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fcc56030b07 code=0x7ffc0000 [ 296.900918][ T29] audit: type=1326 audit(1754457292.119:14223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fcc56030a7c code=0x7ffc0000 [ 296.924469][ T29] audit: type=1326 audit(1754457292.119:14224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14954 comm="syz.8.3318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fcc560309b4 code=0x7ffc0000 [ 296.997891][T14866] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 297.080096][T14866] veth0_vlan: entered promiscuous mode [ 297.090924][T14866] veth1_vlan: entered promiscuous mode [ 297.117065][T14866] veth0_macvtap: entered promiscuous mode [ 297.126750][T14866] veth1_macvtap: entered promiscuous mode [ 297.139988][T14866] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.152405][T14866] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.168698][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.177827][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.187511][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.199475][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.241409][T14980] loop4: detected capacity change from 0 to 128 [ 297.316198][T14985] FAULT_INJECTION: forcing a failure. [ 297.316198][T14985] name failslab, interval 1, probability 0, space 0, times 0 [ 297.328932][T14985] CPU: 1 UID: 0 PID: 14985 Comm: syz.0.3290 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 297.329006][T14985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 297.329022][T14985] Call Trace: [ 297.329031][T14985] [ 297.329041][T14985] __dump_stack+0x1d/0x30 [ 297.329069][T14985] dump_stack_lvl+0xe8/0x140 [ 297.329095][T14985] dump_stack+0x15/0x1b [ 297.329112][T14985] should_fail_ex+0x265/0x280 [ 297.329222][T14985] ? alloc_pipe_info+0xae/0x350 [ 297.329270][T14985] should_failslab+0x8c/0xb0 [ 297.329379][T14985] __kmalloc_cache_noprof+0x4c/0x320 [ 297.329412][T14985] alloc_pipe_info+0xae/0x350 [ 297.329444][T14985] splice_direct_to_actor+0x592/0x680 [ 297.329472][T14985] ? __pfx_direct_splice_actor+0x10/0x10 [ 297.329501][T14985] ? selinux_file_permission+0x2f0/0x320 [ 297.329634][T14985] do_splice_direct+0xda/0x150 [ 297.329659][T14985] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 297.329692][T14985] do_sendfile+0x380/0x650 [ 297.329750][T14985] __x64_sys_sendfile64+0x105/0x150 [ 297.329784][T14985] x64_sys_call+0x2bb0/0x2ff0 [ 297.329812][T14985] do_syscall_64+0xd2/0x200 [ 297.329862][T14985] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 297.329894][T14985] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 297.329920][T14985] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.329946][T14985] RIP: 0033:0x7f5c03cfebe9 [ 297.330035][T14985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.330093][T14985] RSP: 002b:00007f5c02346038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 297.330118][T14985] RAX: ffffffffffffffda RBX: 00007f5c03f26090 RCX: 00007f5c03cfebe9 [ 297.330131][T14985] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 297.330143][T14985] RBP: 00007f5c02346090 R08: 0000000000000000 R09: 0000000000000000 [ 297.330159][T14985] R10: 000000008000002b R11: 0000000000000246 R12: 0000000000000001 [ 297.330175][T14985] R13: 00007f5c03f26128 R14: 00007f5c03f26090 R15: 00007ffc00908828 [ 297.330198][T14985] [ 297.867337][T15002] loop0: detected capacity change from 0 to 8192 [ 297.908510][T15002] loop0: p2 p3 p4 [ 297.912301][T15002] loop0: p2 start 2936012800 is beyond EOD, truncated [ 297.919158][T15002] loop0: p3 start 1912602624 is beyond EOD, truncated [ 297.926081][T15002] loop0: p4 size 656640 extends beyond EOD, truncated [ 297.977327][T15014] vlan1: entered allmulticast mode [ 298.003565][T15022] loop8: detected capacity change from 0 to 512 [ 298.030922][T15022] EXT4-fs (loop8): mounting ext2 file system using the ext4 subsystem [ 298.044684][T15024] loop4: detected capacity change from 0 to 1024 [ 298.079578][T15022] EXT4-fs error (device loop8): __ext4_fill_super:5500: inode #2: comm syz.8.3337: casefold flag without casefold feature [ 298.094610][T15022] EXT4-fs (loop8): get root inode failed [ 298.100456][T15022] EXT4-fs (loop8): mount failed [ 298.105851][T15024] EXT4-fs (loop4): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 298.120903][T15024] ext4 filesystem being mounted at /77/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 298.908595][T15049] binfmt_misc: register: failed to install interpreter file ./file2 [ 299.349134][T15056] __nla_validate_parse: 18 callbacks suppressed [ 299.349172][T15056] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3348'. [ 299.364477][T15056] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3348'. [ 299.417632][T15056] team_slave_0: entered promiscuous mode [ 299.419853][ T3427] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1289: group 0, [ 299.423318][T15056] team_slave_1: entered promiscuous mode [ 299.423369][T15056] macsec1: entered promiscuous mode [ 299.423442][T15056] team0: entered promiscuous mode [ 299.423683][T15056] macsec1: entered allmulticast mode [ 299.431823][ T3427] block bitmap and bg descriptor inconsistent: 21 vs 268369941 free clusters [ 299.437461][T15056] team0: entered allmulticast mode [ 299.437479][T15056] team_slave_0: entered allmulticast mode [ 299.437502][T15056] team_slave_1: entered allmulticast mode [ 299.485103][ T3427] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 36 with max blocks 2048 with error 28 [ 299.497872][ T3427] EXT4-fs (loop4): This should not happen!! Data will be lost [ 299.497872][ T3427] [ 299.507574][ T3427] EXT4-fs (loop4): Total free blocks count 0 [ 299.513571][ T3427] EXT4-fs (loop4): Free/Dirty block details [ 299.519526][ T3427] EXT4-fs (loop4): free_blocks=4293918720 [ 299.525298][ T3427] EXT4-fs (loop4): dirty_blocks=5168 [ 299.528070][T15071] ------------[ cut here ]------------ [ 299.530591][ T3427] EXT4-fs (loop4): Block reservation details [ 299.530607][ T3427] EXT4-fs (loop4): i_reserved_data_blocks=323 [ 299.536111][T15071] verifier bug: REG INVARIANTS VIOLATION (alu): range bounds violation u64=[0xfffffffffffffffd, 0xfffffffffffffffc] s64=[0xfffffffffffffffd, 0xfffffffffffffffc] u32=[0xfffffffd, 0xfffffffc] s32=[0xfffffffd, 0xfffffffc] var_off=(0xfffffffffffffffc, 0x0)(1) [ 299.543466][T15064] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_cmd_wq": -EINTR [ 299.548401][T15071] WARNING: CPU: 1 PID: 15071 at kernel/bpf/verifier.c:2728 reg_bounds_sanity_check+0x673/0x680 [ 299.592148][T15071] Modules linked in: [ 299.596127][T15071] CPU: 1 UID: 0 PID: 15071 Comm: syz.3.3352 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 299.608317][T15071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 299.618437][T15071] RIP: 0010:reg_bounds_sanity_check+0x673/0x680 [ 299.624791][T15071] Code: 7c 24 18 41 ff 74 24 20 55 41 56 4d 89 ee 53 48 8b 5c 24 30 ff 74 24 40 ff 74 24 50 ff 74 24 30 e8 a2 80 ba ff 48 83 c4 38 90 <0f> 0b 90 90 e9 02 fb ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 [ 299.644590][T15071] RSP: 0018:ffffc900018eb550 EFLAGS: 00010296 [ 299.650706][T15071] RAX: 7eaea688f9b7bb00 RBX: ffff88812e2a29a8 RCX: 0000000000080000 [ 299.658780][T15071] RDX: ffffc90006499000 RSI: 000000000003c411 RDI: 000000000003c412 [ 299.666873][T15071] RBP: fffffffffffffffc R08: 0001ffff86a1f91f R09: 0000000000000000 [ 299.674886][T15071] R10: ffffffff88e62940 R11: ffffffff821fe360 R12: ffff88812e2a2968 [ 299.682906][T15071] R13: ffff88812e2a8000 R14: ffff88812e2a8000 R15: ffff88812e2a29a0 [ 299.690981][T15071] FS: 00007fba188b66c0(0000) GS:ffff8882aef47000(0000) knlGS:0000000000000000 [ 299.699971][T15071] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 299.706602][T15071] CR2: 000000110c309c3a CR3: 00000001203ea000 CR4: 00000000003506f0 [ 299.714730][T15071] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 299.722743][T15071] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 299.730856][T15071] Call Trace: [ 299.734152][T15071] [ 299.737134][T15071] do_check+0x6ec9/0x7a10 [ 299.741521][T15071] do_check_common+0xc3a/0x1290 [ 299.746452][T15071] bpf_check+0x942b/0xd9e0 [ 299.750893][T15071] ? __rcu_read_unlock+0x4f/0x70 [ 299.756062][T15071] ? __alloc_frozen_pages_noprof+0x188/0x360 [ 299.762192][T15071] ? alloc_pages_bulk_noprof+0x4b8/0x540 [ 299.767922][T15071] ? __vmap_pages_range_noflush+0xbb3/0xbd0 [ 299.773949][T15071] ? css_rstat_updated+0xb7/0x240 [ 299.779044][T15071] ? pcpu_block_refresh_hint+0x10b/0x170 [ 299.784705][T15071] ? pcpu_block_update_hint_alloc+0x63d/0x660 [ 299.790825][T15071] ? pcpu_block_update_hint_alloc+0x63d/0x660 [ 299.794745][ T51] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 2088 with max blocks 2048 with error 28 [ 299.796999][T15071] ? css_rstat_updated+0xb7/0x240 [ 299.814728][T15071] ? __rcu_read_unlock+0x4f/0x70 [ 299.819811][T15071] ? pcpu_memcg_post_alloc_hook+0xf1/0x150 [ 299.825720][T15071] ? should_fail_ex+0x30/0x280 [ 299.830583][T15071] ? selinux_bpf_prog_load+0x36/0xf0 [ 299.835936][T15071] ? should_failslab+0x8c/0xb0 [ 299.840754][T15071] ? __kmalloc_cache_noprof+0x189/0x320 [ 299.846362][T15071] ? selinux_bpf_prog_load+0xbf/0xf0 [ 299.851705][T15071] ? security_bpf_prog_load+0x2c/0xa0 [ 299.857199][T15071] bpf_prog_load+0xedd/0x1070 [ 299.861949][T15071] ? security_bpf+0x2b/0x90 [ 299.866576][T15071] __sys_bpf+0x462/0x7b0 [ 299.870947][T15071] __x64_sys_bpf+0x41/0x50 [ 299.875428][T15071] x64_sys_call+0x2aea/0x2ff0 [ 299.880120][T15071] do_syscall_64+0xd2/0x200 [ 299.884688][T15071] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 299.890817][T15071] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 299.896627][T15071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 299.902619][T15071] RIP: 0033:0x7fba1a26ebe9 [ 299.907151][T15071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.926947][T15071] RSP: 002b:00007fba188b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 299.935446][T15071] RAX: ffffffffffffffda RBX: 00007fba1a496090 RCX: 00007fba1a26ebe9 [ 299.943435][T15071] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 299.951473][T15071] RBP: 00007fba1a2f1e19 R08: 0000000000000000 R09: 0000000000000000 [ 299.959506][T15071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 299.967563][T15071] R13: 00007fba1a496128 R14: 00007fba1a496090 R15: 00007ffcf479f7f8 [ 299.975630][T15071] [ 299.978679][T15071] ---[ end trace 0000000000000000 ]--- [ 300.085240][T15087] validate_nla: 1 callbacks suppressed [ 300.085257][T15087] netlink: 'syz.9.3356': attribute type 4 has an invalid length. [ 300.133172][T15086] lo speed is unknown, defaulting to 1000 [ 300.334166][T15101] loop4: detected capacity change from 0 to 256 [ 300.342958][T15101] msdos: Unknown parameter '0x0000000000000000BJ [ 300.342958][T15101] #yB͐`H' [ 300.541869][T15116] loop8: detected capacity change from 0 to 512 [ 300.557608][T15116] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 300.666952][T15116] EXT4-fs (loop8): 1 truncate cleaned up [ 300.686301][T15116] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 300.784548][ T9535] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 300.827550][T15134] netlink: 168 bytes leftover after parsing attributes in process `syz.9.3379'. [ 300.847249][T15132] loop8: detected capacity change from 0 to 8192 [ 300.925154][T15132] loop8: p2 p3 p4 [ 300.929327][T15132] loop8: p2 start 2936012800 is beyond EOD, truncated [ 300.936217][T15132] loop8: p3 start 1912602624 is beyond EOD, truncated [ 300.943078][T15132] loop8: p4 size 656640 extends beyond EOD, truncated [ 301.061971][ T4229] IPVS: starting estimator thread 0... [ 301.309062][T15148] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3381'. [ 301.317968][T15148] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3381'. [ 301.355269][T15145] IPVS: using max 2496 ests per chain, 124800 per kthread [ 301.410332][T15151] loop0: detected capacity change from 0 to 512 [ 301.549326][T15151] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 301.590890][T15151] EXT4-fs (loop0): 1 truncate cleaned up [ 301.597983][T15151] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 301.619186][ T29] kauditd_printk_skb: 271 callbacks suppressed [ 301.619199][ T29] audit: type=1326 audit(1754457296.979:14496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5c03cfebe9 code=0x0 [ 301.746330][T15156] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3385'. [ 301.755397][T15156] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3385'. [ 301.811777][ T29] audit: type=1400 audit(1754457297.169:14497): avc: denied { getopt } for pid=15150 comm="syz.0.3384" lport=48 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 301.846039][ T4226] hid_parser_main: 17 callbacks suppressed [ 301.846056][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 301.859391][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 301.877433][ T29] audit: type=1326 audit(1754457297.189:14498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c03cfebe9 code=0x7ffc0000 [ 301.901119][ T29] audit: type=1326 audit(1754457297.189:14499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=141 compat=0 ip=0x7f5c03cfebe9 code=0x7ffc0000 [ 301.924729][ T29] audit: type=1326 audit(1754457297.189:14500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c03cfebe9 code=0x7ffc0000 [ 301.933669][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 301.948493][ T29] audit: type=1326 audit(1754457297.189:14501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f5c03cfebe9 code=0x7ffc0000 [ 301.955844][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 301.979408][ T29] audit: type=1326 audit(1754457297.189:14502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c03cfebe9 code=0x7ffc0000 [ 301.979440][ T29] audit: type=1326 audit(1754457297.189:14503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15150 comm="syz.0.3384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5c03cfebe9 code=0x7ffc0000 [ 301.979472][ T29] audit: type=1400 audit(1754457297.189:14504): avc: denied { read write } for pid=15150 comm="syz.0.3384" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 301.986975][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 302.010494][ T29] audit: type=1400 audit(1754457297.189:14505): avc: denied { open } for pid=15150 comm="syz.0.3384" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 302.034112][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 302.063821][T15159] lo speed is unknown, defaulting to 1000 [ 302.065398][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 302.109364][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 302.116781][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 302.124239][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 302.266059][ T4226] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz1 [ 302.295114][T15169] Invalid logical block size (2) [ 302.311155][T14866] EXT4-fs error (device loop0): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /8/bus/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.346613][T14866] EXT4-fs error (device loop0): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 302.392762][T14866] EXT4-fs error (device loop0): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /8/bus/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.485419][T14866] EXT4-fs error (device loop0): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 302.548647][T14866] EXT4-fs error (device loop0): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /8/bus/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.590781][T14866] EXT4-fs error (device loop0): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 302.614365][T14866] EXT4-fs error (device loop0): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /8/bus/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.644676][T14866] EXT4-fs error (device loop0): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 302.690141][T15181] loop4: detected capacity change from 0 to 512 [ 302.709419][T14866] EXT4-fs error (device loop0): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /8/bus/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.733826][T15181] EXT4-fs (loop4): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 302.754088][T15183] lo speed is unknown, defaulting to 1000 [ 302.802514][T14866] EXT4-fs error (device loop0): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 302.851236][T15181] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.3395: Failed to acquire dquot type 0 [ 302.865187][T15181] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 302.952236][T12116] EXT4-fs (loop4): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 303.013142][T15194] binfmt_misc: register: failed to install interpreter file ./file2 [ 303.123100][T15203] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3404'. [ 303.133920][T15203] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3404'. [ 303.220717][T14866] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 303.230341][T15207] loop9: detected capacity change from 0 to 512 [ 303.241762][T15207] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 303.260964][T15212] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3407'. [ 303.276568][T15207] EXT4-fs (loop9): 1 truncate cleaned up [ 303.294898][T15207] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 303.466028][ T3459] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.523034][T15234] netlink: 'syz.3.3413': attribute type 4 has an invalid length. [ 303.539027][ T3459] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.561874][T15230] loop8: detected capacity change from 0 to 8192 [ 303.598840][ T3459] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.625744][T15230] loop8: p2 p3 p4 [ 303.629698][T15230] loop8: p2 start 2936012800 is beyond EOD, truncated [ 303.636574][T15230] loop8: p3 start 1912602624 is beyond EOD, truncated [ 303.643370][T15230] loop8: p4 size 656640 extends beyond EOD, truncated [ 303.671221][ T3459] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.716605][T15224] lo speed is unknown, defaulting to 1000 [ 303.815240][ T3459] bridge_slave_1: left allmulticast mode [ 303.821100][ T3459] bridge_slave_1: left promiscuous mode [ 303.826959][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.851358][ T3459] bridge_slave_0: left allmulticast mode [ 303.857236][ T3459] bridge_slave_0: left promiscuous mode [ 303.862988][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.970673][ T3459] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 303.981222][ T3459] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 303.991337][ T3459] bond0 (unregistering): Released all slaves [ 304.001901][T15249] all: renamed from lo [ 304.202161][T15224] chnl_net:caif_netlink_parms(): no params data found [ 304.237575][ T3459] hsr_slave_0: left promiscuous mode [ 304.255063][ T3459] hsr_slave_1: left promiscuous mode [ 304.260986][ T3459] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 304.268442][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 304.278140][ T3459] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 304.285620][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 304.303115][ T3459] team0: left allmulticast mode [ 304.308084][ T3459] team_slave_0: left allmulticast mode [ 304.309384][T15265] loop4: detected capacity change from 0 to 512 [ 304.313584][ T3459] team_slave_1: left allmulticast mode [ 304.325364][ T3459] team0: left promiscuous mode [ 304.330362][ T3459] team_slave_0: left promiscuous mode [ 304.335782][ T3459] team_slave_1: left promiscuous mode [ 304.352396][ T3459] veth1_macvtap: left promiscuous mode [ 304.353812][T15265] EXT4-fs (loop4): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 304.358272][ T3459] veth0_macvtap: left promiscuous mode [ 304.376196][ T3459] veth1_vlan: left promiscuous mode [ 304.381479][ T3459] veth0_vlan: left promiscuous mode [ 304.389568][ T9640] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 304.417636][T15265] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.3422: Failed to acquire dquot type 0 [ 304.429393][T15265] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=0, err=-5, ino=3). Please run e2fsck to fix. [ 304.466276][T12116] EXT4-fs (loop4): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 304.498782][T15271] loop4: detected capacity change from 0 to 256 [ 304.507531][T15271] msdos: Unknown parameter '0x0000000000000000BJ [ 304.507531][T15271] #yB͐`H' [ 304.523471][ T3459] team0 (unregistering): Port device team_slave_1 removed [ 304.538292][ T3459] team0 (unregistering): Port device team_slave_0 removed [ 304.598202][T15274] netlink: 'syz.9.3425': attribute type 4 has an invalid length. [ 304.670785][T15224] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.678147][T15224] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.716488][T15224] bridge_slave_0: entered allmulticast mode [ 304.723515][T15224] bridge_slave_0: entered promiscuous mode [ 304.730822][T15224] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.737931][T15224] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.745416][T15224] bridge_slave_1: entered allmulticast mode [ 304.752042][T15224] bridge_slave_1: entered promiscuous mode [ 304.792943][T15224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.822900][T15224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.857151][T15224] team0: Port device team_slave_0 added [ 304.863937][T15224] team0: Port device team_slave_1 added [ 304.883925][T15224] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.890979][T15224] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.916999][T15224] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.929098][T15224] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 304.936124][T15224] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.962146][T15224] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 304.994250][T15291] FAULT_INJECTION: forcing a failure. [ 304.994250][T15291] name failslab, interval 1, probability 0, space 0, times 0 [ 305.000339][T15224] hsr_slave_0: entered promiscuous mode [ 305.007026][T15291] CPU: 1 UID: 0 PID: 15291 Comm: syz.9.3431 Tainted: G W 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 305.007076][T15291] Tainted: [W]=WARN [ 305.007085][T15291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 305.007104][T15291] Call Trace: [ 305.007113][T15291] [ 305.007124][T15291] __dump_stack+0x1d/0x30 [ 305.007159][T15291] dump_stack_lvl+0xe8/0x140 [ 305.007187][T15291] dump_stack+0x15/0x1b [ 305.007221][T15291] should_fail_ex+0x265/0x280 [ 305.007269][T15291] should_failslab+0x8c/0xb0 [ 305.007303][T15291] __kmalloc_noprof+0xa5/0x3e0 [ 305.007390][T15291] ? iovec_from_user+0x84/0x210 [ 305.007429][T15291] iovec_from_user+0x84/0x210 [ 305.007545][T15291] __import_iovec+0xf3/0x540 [ 305.007584][T15291] io_recvmsg_prep+0x7a9/0x940 [ 305.007623][T15291] io_submit_sqes+0x5de/0x1050 [ 305.007692][T15291] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 305.007774][T15291] ? 0xffffffff81000000 [ 305.007792][T15291] ? __rcu_read_unlock+0x4f/0x70 [ 305.007823][T15291] ? get_pid_task+0x96/0xd0 [ 305.007851][T15291] ? proc_fail_nth_write+0x13b/0x160 [ 305.007946][T15291] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 305.007983][T15291] ? vfs_write+0x75e/0x8e0 [ 305.008045][T15291] ? __rcu_read_unlock+0x4f/0x70 [ 305.008128][T15291] ? __fget_files+0x184/0x1c0 [ 305.008163][T15291] ? fput+0x8f/0xc0 [ 305.008205][T15291] __x64_sys_io_uring_enter+0x78/0x90 [ 305.008252][T15291] x64_sys_call+0x2de1/0x2ff0 [ 305.008325][T15291] do_syscall_64+0xd2/0x200 [ 305.008356][T15291] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 305.008390][T15291] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 305.008422][T15291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.008476][T15291] RIP: 0033:0x7efeb5ceebe9 [ 305.008499][T15291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.008556][T15291] RSP: 002b:00007efeb4357038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 305.008587][T15291] RAX: ffffffffffffffda RBX: 00007efeb5f15fa0 RCX: 00007efeb5ceebe9 [ 305.008605][T15291] RDX: 0000000000000000 RSI: 00000000000047f8 RDI: 0000000000000004 [ 305.008620][T15291] RBP: 00007efeb4357090 R08: 0000000000000000 R09: 0000000000000000 [ 305.008637][T15291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.008654][T15291] R13: 00007efeb5f16038 R14: 00007efeb5f15fa0 R15: 00007ffc658f5708 [ 305.008680][T15291] [ 305.254186][T15224] hsr_slave_1: entered promiscuous mode [ 305.260387][T15224] debugfs: 'hsr0' already exists in 'hsr' [ 305.266199][T15224] Cannot create hsr debugfs directory [ 305.410556][T15303] lo speed is unknown, defaulting to 1000 [ 305.660106][T15224] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 305.762178][T15224] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 305.852684][T15224] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 305.940110][T15224] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 305.950765][T15309] __nla_validate_parse: 1 callbacks suppressed [ 305.950852][T15309] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3437'. [ 305.966024][T15309] netlink: 52 bytes leftover after parsing attributes in process `syz.4.3437'. [ 306.033805][T15324] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3441'. [ 306.037492][T15224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.054667][T15324] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3441'. [ 306.055626][T15224] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.076574][ T3436] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.078499][T15326] netlink: 'syz.3.3442': attribute type 1 has an invalid length. [ 306.083709][ T3436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.090965][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.105740][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.122248][T15326] 8021q: adding VLAN 0 to HW filter on device bond1 [ 306.152452][T15329] loop4: detected capacity change from 0 to 1024 [ 306.207881][T15329] EXT4-fs (loop4): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 306.229261][T15329] ext4 filesystem being mounted at /99/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 306.251351][T15344] loop9: detected capacity change from 0 to 256 [ 306.258433][T15344] msdos: Unknown parameter '0x0000000000000000BJ [ 306.258433][T15344] #yB͐`H' [ 306.267546][T15224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.409462][T12116] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 306.449071][T15224] veth0_vlan: entered promiscuous mode [ 306.460814][T15224] veth1_vlan: entered promiscuous mode [ 306.488801][T15224] veth0_macvtap: entered promiscuous mode [ 306.499612][T15224] veth1_macvtap: entered promiscuous mode [ 306.513976][T15224] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 306.529175][T15224] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 306.542081][ T3436] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.551501][T15367] netlink: 'syz.4.3447': attribute type 10 has an invalid length. [ 306.561669][ T3436] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.587683][ T3436] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.598095][ T3436] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.676490][T15375] loop9: detected capacity change from 0 to 2048 [ 306.683368][T15376] loop5: detected capacity change from 0 to 512 [ 306.697675][T15376] EXT4-fs error (device loop5): ext4_quota_enable:7120: comm syz.5.3410: Bad quota inum: 1, type: 2 [ 306.698933][T15375] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 306.710750][T15376] EXT4-fs warning (device loop5): ext4_enable_quotas:7168: Failed to enable quota tracking (type=2, err=-117, ino=1). Please run e2fsck to fix. [ 306.736633][T15376] EXT4-fs (loop5): mount failed [ 306.809715][ T29] kauditd_printk_skb: 353 callbacks suppressed [ 306.809734][ T29] audit: type=1400 audit(1754457302.169:14855): avc: denied { cpu } for pid=15371 comm="syz.5.3410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 306.841372][T15372] lo speed is unknown, defaulting to 1000 [ 306.869725][ T29] audit: type=1400 audit(1754457302.209:14856): avc: denied { create } for pid=15374 comm="syz.9.3449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 306.890261][ T29] audit: type=1400 audit(1754457302.209:14857): avc: denied { setopt } for pid=15374 comm="syz.9.3449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 307.048805][ T9640] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 307.156230][T15395] FAULT_INJECTION: forcing a failure. [ 307.156230][T15395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 307.169442][T15395] CPU: 1 UID: 0 PID: 15395 Comm: syz.9.3453 Tainted: G W 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 307.169486][T15395] Tainted: [W]=WARN [ 307.169492][T15395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 307.169503][T15395] Call Trace: [ 307.169509][T15395] [ 307.169516][T15395] __dump_stack+0x1d/0x30 [ 307.169555][T15395] dump_stack_lvl+0xe8/0x140 [ 307.169646][T15395] dump_stack+0x15/0x1b [ 307.169692][T15395] should_fail_ex+0x265/0x280 [ 307.169723][T15395] should_fail+0xb/0x20 [ 307.169802][T15395] should_fail_usercopy+0x1a/0x20 [ 307.169818][T15395] _copy_from_user+0x1c/0xb0 [ 307.169841][T15395] __sys_sendto+0x19e/0x330 [ 307.169953][T15395] __x64_sys_sendto+0x76/0x90 [ 307.169980][T15395] x64_sys_call+0x2d05/0x2ff0 [ 307.170009][T15395] do_syscall_64+0xd2/0x200 [ 307.170086][T15395] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 307.170143][T15395] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 307.170174][T15395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 307.170203][T15395] RIP: 0033:0x7efeb5ceebe9 [ 307.170231][T15395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.170254][T15395] RSP: 002b:00007efeb4357038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 307.170274][T15395] RAX: ffffffffffffffda RBX: 00007efeb5f15fa0 RCX: 00007efeb5ceebe9 [ 307.170314][T15395] RDX: 00000000000005c4 RSI: 0000000000000000 RDI: 0000000000000006 [ 307.170325][T15395] RBP: 00007efeb4357090 R08: 0000200000000540 R09: 000000000000001c [ 307.170336][T15395] R10: 000000000404c844 R11: 0000000000000246 R12: 0000000000000001 [ 307.170347][T15395] R13: 00007efeb5f16038 R14: 00007efeb5f15fa0 R15: 00007ffc658f5708 [ 307.170365][T15395] [ 307.487934][ T29] audit: type=1400 audit(1754457302.849:14858): avc: denied { write } for pid=15404 comm="syz.8.3456" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 307.513043][ T29] audit: type=1400 audit(1754457302.849:14859): avc: denied { ioctl } for pid=15404 comm="syz.8.3456" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 307.686110][ T29] audit: type=1400 audit(1754457303.049:14860): avc: denied { setopt } for pid=15409 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 307.761958][T15410] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15410 comm=+}[@ [ 308.013462][T15416] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3458'. [ 308.087404][T15417] netlink: 44 bytes leftover after parsing attributes in process `syz.3.3458'. [ 308.289344][T15419] nfs4: Unknown parameter '' [ 308.325723][T15423] FAULT_INJECTION: forcing a failure. [ 308.325723][T15423] name failslab, interval 1, probability 0, space 0, times 0 [ 308.338528][T15423] CPU: 0 UID: 0 PID: 15423 Comm: syz.4.3461 Tainted: G W 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 308.338563][T15423] Tainted: [W]=WARN [ 308.338569][T15423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 308.338582][T15423] Call Trace: [ 308.338588][T15423] [ 308.338595][T15423] __dump_stack+0x1d/0x30 [ 308.338701][T15423] dump_stack_lvl+0xe8/0x140 [ 308.338726][T15423] dump_stack+0x15/0x1b [ 308.338766][T15423] should_fail_ex+0x265/0x280 [ 308.338799][T15423] should_failslab+0x8c/0xb0 [ 308.338829][T15423] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 308.338899][T15423] ? snd_timer_instance_new+0x4a/0x160 [ 308.338980][T15423] kstrdup+0x3e/0xd0 [ 308.339005][T15423] snd_timer_instance_new+0x4a/0x160 [ 308.339028][T15423] snd_seq_timer_open+0x12b/0x360 [ 308.339067][T15423] ? _raw_spin_lock_irqsave+0x3a/0x90 [ 308.339102][T15423] ? snd_seq_timer_defaults+0x1f6/0x210 [ 308.339216][T15423] snd_seq_queue_alloc+0x247/0x450 [ 308.339252][T15423] snd_seq_ioctl_create_queue+0x4d/0x1b0 [ 308.339299][T15423] snd_seq_ioctl+0x17d/0x2e0 [ 308.339340][T15423] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 308.339361][T15423] __se_sys_ioctl+0xce/0x140 [ 308.339446][T15423] __x64_sys_ioctl+0x43/0x50 [ 308.339520][T15423] x64_sys_call+0x1816/0x2ff0 [ 308.339548][T15423] do_syscall_64+0xd2/0x200 [ 308.339579][T15423] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 308.339611][T15423] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 308.339645][T15423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 308.339667][T15423] RIP: 0033:0x7f9c4878ebe9 [ 308.339682][T15423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.339700][T15423] RSP: 002b:00007f9c46def038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.339795][T15423] RAX: ffffffffffffffda RBX: 00007f9c489b5fa0 RCX: 00007f9c4878ebe9 [ 308.339813][T15423] RDX: 00002000000001c0 RSI: 00000000c08c5332 RDI: 0000000000000004 [ 308.339830][T15423] RBP: 00007f9c46def090 R08: 0000000000000000 R09: 0000000000000000 [ 308.339847][T15423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.339862][T15423] R13: 00007f9c489b6038 R14: 00007f9c489b5fa0 R15: 00007ffc38d362d8 [ 308.339881][T15423] [ 308.632994][T15434] loop5: detected capacity change from 0 to 512 [ 309.068627][T15431] 9pnet: Could not find request transport: r [ 309.132711][ T29] audit: type=1326 audit(1754457304.489:14861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15445 comm="syz.3.3467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba1a26ebe9 code=0x7ffc0000 [ 309.221136][ T29] audit: type=1326 audit(1754457304.489:14862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15445 comm="syz.3.3467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba1a26ebe9 code=0x7ffc0000 [ 309.244832][ T29] audit: type=1326 audit(1754457304.519:14863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15445 comm="syz.3.3467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7fba1a26ebe9 code=0x7ffc0000 [ 309.268432][ T29] audit: type=1326 audit(1754457304.519:14864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15445 comm="syz.3.3467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fba1a26ebe9 code=0x7ffc0000 [ 309.277257][T15434] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 309.315049][T15434] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 309.362324][T15451] lo speed is unknown, defaulting to 1000 [ 309.724755][T15465] A link change request failed with some changes committed already. Interface team_slave_1 may have been left with an inconsistent configuration, please check. [ 309.951721][T15224] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 310.031879][T15476] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3477'. [ 310.051876][T15476] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3477'. [ 310.113195][T15474] netlink: 'syz.8.3476': attribute type 3 has an invalid length. [ 310.180506][T15469] lo speed is unknown, defaulting to 1000 [ 310.328783][T15483] loop8: detected capacity change from 0 to 256 [ 310.336949][T15483] msdos: Unknown parameter '0x0000000000000000BJ [ 310.336949][T15483] #yB͐`H' [ 310.539060][T15490] loop9: detected capacity change from 0 to 8192 [ 310.595610][T15490] loop9: p2 p3 p4 [ 310.599482][T15490] loop9: p2 start 2936012800 is beyond EOD, truncated [ 310.606377][T15490] loop9: p3 start 1912602624 is beyond EOD, truncated [ 310.613174][T15490] loop9: p4 size 656640 extends beyond EOD, truncated [ 310.747158][ T3459] bridge_slave_1: left allmulticast mode [ 310.752878][ T3459] bridge_slave_1: left promiscuous mode [ 310.758576][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.798147][ T3459] bridge_slave_0: left allmulticast mode [ 310.803847][ T3459] bridge_slave_0: left promiscuous mode [ 310.809581][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.865424][T15509] loop9: detected capacity change from 0 to 8192 [ 310.876639][T15514] netlink: 44 bytes leftover after parsing attributes in process `syz.8.3491'. [ 310.915835][T15509] loop9: p2 p3 p4 [ 310.919622][T15509] loop9: p2 start 2936012800 is beyond EOD, truncated [ 310.926506][T15509] loop9: p3 start 1912602624 is beyond EOD, truncated [ 310.933279][T15509] loop9: p4 size 656640 extends beyond EOD, truncated [ 310.951238][T15517] loop5: detected capacity change from 0 to 1024 [ 310.966544][T15517] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 310.978740][T15517] ext4 filesystem being mounted at /6/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 310.997114][ T3459] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 311.006577][ T3459] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 311.015790][ T3459] bond0 (unregistering): Released all slaves [ 311.094574][T15512] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.101802][T15512] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.162852][T15512] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 311.172873][T15512] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 311.204186][T15514] netlink: 84 bytes leftover after parsing attributes in process `syz.8.3491'. [ 311.214016][T15491] lo speed is unknown, defaulting to 1000 [ 311.226736][ T3436] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.262961][ T3436] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.293328][ T3436] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.310717][ T3436] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.336093][T15532] netlink: 'syz.9.3493': attribute type 10 has an invalid length. [ 311.360466][T15224] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 311.538290][ T3459] hsr_slave_0: left promiscuous mode [ 311.544132][ T3459] hsr_slave_1: left promiscuous mode [ 311.552106][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 311.559768][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 311.639089][T15491] chnl_net:caif_netlink_parms(): no params data found [ 311.653761][T15539] lo speed is unknown, defaulting to 1000 [ 311.714698][T15491] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.721969][T15491] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.729336][T15491] bridge_slave_0: entered allmulticast mode [ 311.738290][T15491] bridge_slave_0: entered promiscuous mode [ 311.745763][T15491] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.752971][T15491] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.760284][T15491] bridge_slave_1: entered allmulticast mode [ 311.767273][T15491] bridge_slave_1: entered promiscuous mode [ 311.791118][T15491] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.806870][T15491] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.822220][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 311.822236][ T29] audit: type=1326 audit(1754457307.179:15000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f519169ebe9 code=0x7ffc0000 [ 311.852288][ T29] audit: type=1326 audit(1754457307.179:15001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f519169ebe9 code=0x7ffc0000 [ 311.876718][ T29] audit: type=1326 audit(1754457307.189:15002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f519169ebe9 code=0x7ffc0000 [ 311.900470][ T29] audit: type=1326 audit(1754457307.189:15003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f519169ec23 code=0x7ffc0000 [ 311.922924][T15555] loop5: detected capacity change from 0 to 256 [ 311.924009][ T29] audit: type=1326 audit(1754457307.189:15004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f519169d69f code=0x7ffc0000 [ 311.953676][ T29] audit: type=1326 audit(1754457307.189:15005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f519169ec77 code=0x7ffc0000 [ 311.960815][T15555] msdos: Unknown parameter '0x0000000000000000BJ [ 311.960815][T15555] #yB͐`H' [ 312.007705][ T29] audit: type=1326 audit(1754457307.279:15006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f519169d550 code=0x7ffc0000 [ 312.031489][ T29] audit: type=1326 audit(1754457307.279:15007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f519169e7eb code=0x7ffc0000 [ 312.055078][ T29] audit: type=1326 audit(1754457307.319:15008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f519169d84a code=0x7ffc0000 [ 312.078599][ T29] audit: type=1326 audit(1754457307.319:15009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15554 comm="syz.5.3502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f519169d84a code=0x7ffc0000 [ 312.126612][T15491] team0: Port device team_slave_0 added [ 312.139421][T15491] team0: Port device team_slave_1 added [ 312.174146][T15557] loop9: detected capacity change from 0 to 8192 [ 312.201283][T15491] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 312.208301][T15491] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.234371][T15491] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 312.269095][T15491] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 312.275283][T15557] loop9: p2 p3 p4 [ 312.276329][T15491] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.279958][T15557] loop9: p2 start 2936012800 is beyond EOD, truncated [ 312.279977][T15557] loop9: p3 start 1912602624 is beyond EOD, truncated [ 312.279992][T15557] loop9: p4 size 656640 extends beyond EOD, truncated [ 312.326322][T15491] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 312.460314][T15562] loop5: detected capacity change from 0 to 512 [ 312.467117][T15562] EXT4-fs: test_dummy_encryption option not supported [ 312.478293][T15562] loop5: detected capacity change from 0 to 512 [ 312.501190][T15491] hsr_slave_0: entered promiscuous mode [ 312.508238][T15491] hsr_slave_1: entered promiscuous mode [ 312.514110][T15491] debugfs: 'hsr0' already exists in 'hsr' [ 312.519902][T15491] Cannot create hsr debugfs directory [ 312.540698][T15568] netlink: 'syz.9.3506': attribute type 10 has an invalid length. [ 312.550796][T15562] EXT4-fs (loop5): 1 orphan inode deleted [ 312.559637][T15562] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 312.572424][ T31] EXT4-fs error (device loop5): ext4_release_dquot:6969: comm kworker/u8:1: Failed to release dquot type 1 [ 312.573350][T15562] ext4 filesystem being mounted at /10/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 312.714834][T15224] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 312.796523][T15583] loop9: detected capacity change from 0 to 1024 [ 312.797841][T15585] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3513'. [ 312.803316][T15583] EXT4-fs: inline encryption not supported [ 312.819927][T15585] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3513'. [ 312.829266][T15583] EXT4-fs: Ignoring removed bh option [ 312.836287][T15585] team0: Port device team_slave_1 removed [ 312.848388][T15583] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 312.889922][ T9640] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 312.909309][T15592] netlink: 'syz.9.3514': attribute type 10 has an invalid length. [ 313.037614][T15491] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 313.049297][T15491] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 313.059004][T15491] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 313.070364][T15491] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 313.115517][T15491] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.126969][T15491] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.143114][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.150251][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.174454][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.181580][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.195938][T15607] loop9: detected capacity change from 0 to 512 [ 313.249041][T15491] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 313.316401][T15626] netlink: 'syz.8.3518': attribute type 4 has an invalid length. [ 313.317807][T15491] veth0_vlan: entered promiscuous mode [ 313.345035][T15491] veth1_vlan: entered promiscuous mode [ 313.373964][T15491] veth0_macvtap: entered promiscuous mode [ 313.388414][T15491] veth1_macvtap: entered promiscuous mode [ 313.407900][T15491] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.419419][T15491] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 313.435689][ T3459] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.447267][ T3459] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.465070][ T3459] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.486505][ T3459] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.600303][T15636] binfmt_misc: register: failed to install interpreter file ./file2 [ 313.683582][T15641] netlink: 'syz.3.3524': attribute type 10 has an invalid length. [ 313.796692][T15648] netlink: 'syz.7.3527': attribute type 10 has an invalid length. [ 313.817757][T15648] team0 (unregistering): Port device team_slave_0 removed [ 313.823201][T15646] loop8: detected capacity change from 0 to 256 [ 313.836215][T15648] team0 (unregistering): Port device team_slave_1 removed [ 313.849015][T15646] msdos: Unknown parameter '0x0000000000000000BJ [ 313.849015][T15646] #yB͐`H' [ 313.869269][T15644] lo speed is unknown, defaulting to 1000 [ 313.979647][T15653] FAULT_INJECTION: forcing a failure. [ 313.979647][T15653] name failslab, interval 1, probability 0, space 0, times 0 [ 313.992346][T15653] CPU: 1 UID: 0 PID: 15653 Comm: syz.8.3529 Tainted: G W 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 313.992385][T15653] Tainted: [W]=WARN [ 313.992405][T15653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 313.992421][T15653] Call Trace: [ 313.992429][T15653] [ 313.992439][T15653] __dump_stack+0x1d/0x30 [ 313.992474][T15653] dump_stack_lvl+0xe8/0x140 [ 313.992499][T15653] dump_stack+0x15/0x1b [ 313.992522][T15653] should_fail_ex+0x265/0x280 [ 313.992577][T15653] should_failslab+0x8c/0xb0 [ 313.992675][T15653] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 313.992713][T15653] ? security_context_to_sid_core+0x69/0x3b0 [ 313.992789][T15653] kmemdup_nul+0x36/0xc0 [ 313.992843][T15653] security_context_to_sid_core+0x69/0x3b0 [ 313.992964][T15653] ? avc_has_perm_noaudit+0x1b1/0x200 [ 313.992999][T15653] security_context_to_sid+0x2e/0x40 [ 313.993043][T15653] selinux_inode_setxattr+0x4af/0x6e0 [ 313.993088][T15653] ? mntput+0x4b/0x80 [ 313.993152][T15653] security_inode_setxattr+0x13a/0x1b0 [ 313.993189][T15653] __vfs_setxattr_locked+0x83/0x1d0 [ 313.993222][T15653] vfs_setxattr+0x132/0x270 [ 313.993297][T15653] file_setxattr+0x139/0x1b0 [ 313.993330][T15653] path_setxattrat+0x290/0x310 [ 313.993404][T15653] __x64_sys_fsetxattr+0x6b/0x80 [ 313.993429][T15653] x64_sys_call+0x1ced/0x2ff0 [ 313.993456][T15653] do_syscall_64+0xd2/0x200 [ 313.993489][T15653] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 313.993588][T15653] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 313.993617][T15653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.993645][T15653] RIP: 0033:0x7fcc5602ebe9 [ 313.993664][T15653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.993687][T15653] RSP: 002b:00007fcc54697038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 313.993760][T15653] RAX: ffffffffffffffda RBX: 00007fcc56255fa0 RCX: 00007fcc5602ebe9 [ 313.993778][T15653] RDX: 00002000000004c0 RSI: 0000200000000480 RDI: 0000000000000005 [ 313.993796][T15653] RBP: 00007fcc54697090 R08: 0000000000000000 R09: 0000000000000000 [ 313.993813][T15653] R10: 000000000000001a R11: 0000000000000246 R12: 0000000000000001 [ 313.993830][T15653] R13: 00007fcc56256038 R14: 00007fcc56255fa0 R15: 00007ffe76dba788 [ 313.993852][T15653] [ 314.389226][T15661] netlink: 3 bytes leftover after parsing attributes in process `syz.9.3533'. [ 314.444505][T15661] batadv1: entered promiscuous mode [ 314.449839][T15661] batadv1: entered allmulticast mode [ 314.531281][T15665] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3532'. [ 314.540262][T15665] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3532'. [ 315.026131][T15675] netlink: 92 bytes leftover after parsing attributes in process `syz.5.3538'. [ 315.060547][T15677] 9pnet: Could not find request transport: flԩgO-d [ 315.302011][T15682] loop9: detected capacity change from 0 to 1024 [ 315.583723][T15682] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 315.601722][T15693] netlink: 100 bytes leftover after parsing attributes in process `syz.3.3542'. [ 315.890118][ T9640] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 316.020539][T15697] loop8: detected capacity change from 0 to 1024 [ 316.027146][T15698] loop9: detected capacity change from 0 to 512 [ 316.033675][T15698] EXT4-fs: test_dummy_encryption option not supported [ 316.046541][T15698] loop9: detected capacity change from 0 to 512 [ 316.078908][T15697] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 316.110564][T15697] ext4 filesystem being mounted at /307/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 316.160257][T15698] EXT4-fs (loop9): 1 orphan inode deleted [ 316.175097][ T3459] EXT4-fs error (device loop9): ext4_release_dquot:6969: comm kworker/u8:8: Failed to release dquot type 1 [ 316.196721][T15698] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 316.243692][T15707] loop7: detected capacity change from 0 to 256 [ 316.269493][T15698] ext4 filesystem being mounted at /287/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 316.282449][T15707] msdos: Unknown parameter '0x0000000000000000BJ [ 316.282449][T15707] #yB͐`H' [ 316.331998][T15709] loop5: detected capacity change from 0 to 8192 [ 316.375330][T15709] loop5: p2 p3 p4 [ 316.379973][ T9535] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 316.389113][T15709] loop5: p2 start 2936012800 is beyond EOD, truncated [ 316.396040][T15709] loop5: p3 start 1912602624 is beyond EOD, truncated [ 316.402846][T15709] loop5: p4 size 656640 extends beyond EOD, truncated [ 316.425217][ T9640] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 316.458818][T15717] netlink: 'syz.7.3551': attribute type 10 has an invalid length. [ 316.459190][T15716] netlink: 92 bytes leftover after parsing attributes in process `syz.9.3550'. [ 316.527914][T15720] netlink: 20 bytes leftover after parsing attributes in process `syz.9.3554'. [ 316.550213][T15720] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3554'. [ 316.702295][T15732] netlink: 'syz.9.3558': attribute type 10 has an invalid length. [ 316.839837][ T29] kauditd_printk_skb: 515 callbacks suppressed [ 316.839857][ T29] audit: type=1326 audit(1754457312.199:15523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 316.869781][ T29] audit: type=1326 audit(1754457312.199:15524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 316.893463][ T29] audit: type=1326 audit(1754457312.199:15525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 316.917079][ T29] audit: type=1326 audit(1754457312.199:15526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 316.940719][ T29] audit: type=1326 audit(1754457312.199:15527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 316.964428][ T29] audit: type=1326 audit(1754457312.199:15528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15740 comm="syz.9.3560" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efeb5ceebe9 code=0x7ffc0000 [ 316.988159][ T29] audit: type=1326 audit(1754457312.199:15529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 317.011838][ T29] audit: type=1326 audit(1754457312.199:15530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15738 comm="syz.8.3559" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc5602ebe9 code=0x7ffc0000 [ 317.037550][ T29] audit: type=1326 audit(1754457312.249:15531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15740 comm="syz.9.3560" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7efeb5ceebe9 code=0x7ffc0000 [ 317.061198][ T29] audit: type=1326 audit(1754457312.249:15532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15740 comm="syz.9.3560" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efeb5ceebe9 code=0x7ffc0000 [ 317.093889][T15743] loop9: detected capacity change from 0 to 512 [ 317.100557][T15743] EXT4-fs: test_dummy_encryption option not supported [ 317.143619][T15743] loop9: detected capacity change from 0 to 512 [ 317.153721][T15733] ================================================================== [ 317.161845][T15733] BUG: KCSAN: data-race in __htab_map_lookup_elem / bpf_lru_pop_free [ 317.169946][T15733] [ 317.172271][T15733] write to 0xffff8881291e1828 of 4 bytes by task 15746 on cpu 0: [ 317.179993][T15733] bpf_lru_pop_free+0xbf0/0xcd0 [ 317.184858][T15733] __htab_lru_percpu_map_update_elem+0xea/0x600 [ 317.191120][T15733] bpf_percpu_hash_update+0x61/0xa0 [ 317.196340][T15733] bpf_map_update_value+0x297/0x3a0 [ 317.201547][T15733] generic_map_update_batch+0x3f5/0x540 [ 317.207117][T15733] bpf_map_do_batch+0x255/0x380 [ 317.211990][T15733] __sys_bpf+0x5ee/0x7b0 [ 317.216247][T15733] __x64_sys_bpf+0x41/0x50 [ 317.220683][T15733] x64_sys_call+0x2aea/0x2ff0 [ 317.225371][T15733] do_syscall_64+0xd2/0x200 [ 317.229889][T15733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.235791][T15733] [ 317.238121][T15733] read to 0xffff8881291e1828 of 4 bytes by task 15733 on cpu 1: [ 317.245756][T15733] __htab_map_lookup_elem+0xab/0x150 [ 317.251056][T15733] htab_lru_percpu_map_lookup_elem+0x20/0xb0 [ 317.257054][T15733] bpf_prog_1592a6279ab44e8a+0x48/0x50 [ 317.262518][T15733] bpf_trace_run2+0x104/0x1c0 [ 317.267208][T15733] __traceiter_kfree+0x2e/0x50 [ 317.271996][T15733] kfree+0x27b/0x320 [ 317.275906][T15733] ___sys_recvmsg+0x135/0x370 [ 317.280609][T15733] do_recvmmsg+0x1ef/0x540 [ 317.285030][T15733] __x64_sys_recvmmsg+0xe5/0x170 [ 317.289975][T15733] x64_sys_call+0x27a6/0x2ff0 [ 317.294664][T15733] do_syscall_64+0xd2/0x200 [ 317.299178][T15733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.305085][T15733] [ 317.307414][T15733] value changed: 0x3354c23d -> 0xd2342a43 [ 317.313132][T15733] [ 317.315459][T15733] Reported by Kernel Concurrency Sanitizer on: [ 317.321615][T15733] CPU: 1 UID: 0 PID: 15733 Comm: syz.7.3555 Tainted: G W 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 317.335344][T15733] Tainted: [W]=WARN SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 317.339146][T15733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 317.349206][T15733] ================================================================== [ 317.422548][T15743] EXT4-fs (loop9): 1 orphan inode deleted [ 317.429020][T15743] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 317.455996][ T3459] EXT4-fs error (device loop9): ext4_release_dquot:6969: comm kworker/u8:8: Failed to release dquot type 1 [ 317.482172][T15743] ext4 filesystem being mounted at /292/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 317.621945][T15743] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 317.798952][ T3459] bridge_slave_1: left allmulticast mode [ 317.804632][ T3459] bridge_slave_1: left promiscuous mode [ 317.810398][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.818488][ T3459] bridge_slave_0: left allmulticast mode [ 317.824211][ T3459] bridge_slave_0: left promiscuous mode [ 317.829856][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.907648][ T3459] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 317.917089][ T3459] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 317.926317][ T3459] bond0 (unregistering): Released all slaves [ 317.934692][ T3459] bond1 (unregistering): Released all slaves [ 318.029702][ T3459] hsr_slave_0: left promiscuous mode [ 318.035630][ T3459] hsr_slave_1: left promiscuous mode [ 318.041376][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 318.049257][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 318.398365][ T3459] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.467494][ T3459] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.527910][ T3459] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.597953][ T3459] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.659149][ T3459] bridge_slave_1: left allmulticast mode [ 318.664830][ T3459] bridge_slave_1: left promiscuous mode [ 318.670516][ T3459] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.678276][ T3459] bridge_slave_0: left allmulticast mode [ 318.683915][ T3459] bridge_slave_0: left promiscuous mode [ 318.689698][ T3459] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.767471][ T3459] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 318.777714][ T3459] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 318.787496][ T3459] bond0 (unregistering): Released all slaves [ 318.848457][ T3459] hsr_slave_0: left promiscuous mode [ 318.854211][ T3459] hsr_slave_1: left promiscuous mode [ 318.860020][ T3459] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 318.867459][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 318.875026][ T3459] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 318.882495][ T3459] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 318.893396][ T3459] veth1_macvtap: left promiscuous mode [ 318.898932][ T3459] veth0_macvtap: left promiscuous mode [ 318.904420][ T3459] veth1_vlan: left promiscuous mode [ 318.909728][ T3459] veth0_vlan: left promiscuous mode