last executing test programs: 24m51.386165655s ago: executing program 32 (id=60): clock_nanosleep(0xfcfdffff, 0x0, &(0x7f00000002c0)={0x77359400}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b7050000000000006910a800000000005dfc000000000000950092a500000000"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/109, 0x6d}], 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newneigh={0x30, 0x1c, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x0, 0x1}, [@NDA_DST_MAC={0xa, 0x1, @link_local}, @NDA_FLAGS_EXT={0x8, 0xf, 0x1}]}, 0x30}}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r4, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x3, &(0x7f0000000780)=@framed, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x2, &(0x7f0000000200)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x164}], 0x0, 0xfffffff9, 0x0, 0x0, 0x41100, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, r6, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xe, &(0x7f00000003c0)=@raw=[@cb_func={0x18, 0x4, 0x4, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7fff}, @ldst={0x2, 0x2, 0x4, 0xb, 0xa, 0x1, 0xffffffffffffffff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000200)='GPL\x00', 0x4, 0x6f, &(0x7f0000000440)=""/111, 0x1f00, 0xa, '\x00', r3, @fallback=0x37, r0, 0x8, &(0x7f0000000580)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x5, 0x200, 0x6}, 0x10, r5, r0, 0x1, &(0x7f0000000600), &(0x7f0000000640)=[{0x3, 0x5, 0x8, 0x6}], 0x10, 0x2}, 0x94) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x700, 0x80, 0xa, 0x6, {{0x21, 0x4, 0x2, 0x2a, 0x84, 0x66, 0xe, 0x40, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, {[@noop, @end, @ssrr={0x89, 0x17, 0x33, [@multicast1, @local, @local, @rand_addr=0x64010101, @remote]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x64, 0x1, 0x2, [{@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x4}, {@rand_addr=0x64010100, 0x7c}, {@private=0xa010102, 0x315}, {@multicast2, 0x1}]}, @generic={0x44, 0xc, "e210dd2d9419d2ba2412"}, @lsrr={0x83, 0x17, 0x1a, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @broadcast]}, @end, @end]}}}}}) futex_waitv(&(0x7f00000004c0)=[{0x0, &(0x7f0000000000), 0x2}, {0x3, &(0x7f0000000040)=0x3, 0x2}, {0x40000000, 0x0, 0x82}], 0x3, 0x0, 0x0, 0x0) 24m35.714560728s ago: executing program 33 (id=364): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x2000000}, 0xc) bind$netlink(r1, &(0x7f0000000480)={0x10, 0x0, 0x25dfdbfb}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mlockall(0x3) prlimit64(0x0, 0x9, &(0x7f0000000000)={0xfffffffffffffffb, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x8708, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_config_ext={0x9, 0x7}, 0x1118, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0xedf2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x8) syz_emit_ethernet(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000003200)=@newsa={0x15c, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@loopback, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8, 0x80}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @lifetime_val={0x24, 0x9, {0x200, 0x20000000081, 0x9, 0x100}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8801}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000580), 0x5, 0x4f3, &(0x7f00000005c0)="$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") truncate(0x0, 0x8008) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x2) mount$bind(0x0, 0x0, 0x0, 0x21, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000740)=ANY=[@ANYBLOB="400100001a000100feffffff00010000e0000002000000000000000000000000fc0100000000000000000000000000010001071c4e2300050a0000203a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d46c000000fc020000000000000000000000000001fe00000000000000922ca39b000000000000ffff0000000000001c250800000000000500000000000000fcffffffffffffff0000000000000000ffffffffffffffff00000000000000001f00000000000000fefffffffffffffffefffffffc030000000000008000000005350000020001002000000000eb815a05412e9aad65666c617465000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008001d00fffeffff"], 0x140}}, 0x844) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40480c0) brk(0x600000000000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x106, 0x106, 0x5, [@datasec={0x10, 0x1, 0x0, 0xf, 0x2, [{0x2, 0x1, 0x1000}], "d0ad"}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x0, 0x59, 0x2}, @var={0x4, 0x0, 0x0, 0xe, 0x5, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd}, {0x800, 0x5}, {0x5, 0x3}]}, @const={0xa, 0x0, 0x0, 0xa, 0x2}, @enum64={0x6, 0x4, 0x0, 0x13, 0x0, 0xf, [{0xd, 0x400, 0x3}, {0xd, 0xc80, 0xfffffffa}, {0x2, 0xe8, 0xff}, {0xd, 0x2, 0x800}]}, @enum64={0x10, 0x5, 0x0, 0x13, 0x1, 0x4, [{0x1, 0x401, 0x8}, {0xb, 0x6b4e497, 0x2}, {0xd, 0x520, 0x3}, {0x8, 0x1ff, 0x5}, {0x1, 0x1, 0x5}]}, @const={0x7}, @volatile={0x5, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x61, 0x30, 0x30]}}, &(0x7f00000001c0)=""/81, 0x125, 0x51, 0x0, 0x7ff}, 0x28) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r7, r5, 0x25, 0x0, @val=@perf_event={0x200}}, 0x18) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[], 0x0) 24m35.432868304s ago: executing program 34 (id=373): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x27, 0x2, 0xfe, 0x0, 0x0, 0x7, 0x100, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x1fe}, 0x0, 0x5, 0x2, 0x9, 0x7, 0x20009, 0xb, 0x0, 0x9, 0x0, 0x20000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000680)={'veth1_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="cd00000055003d00000007000000000000000000066aaa025f69640836a6555e0450547b73be2f2e2ef4c6bef6430b293ad0ebe0f5fc56052d42fa71e310500df79fbd09ff66b86dd72360169c65fdf867a969c10d1aa6a3112cf8480b0e75600aeaae711c23bbd8268326e249bc96506d79a69f9f3e3c80ca52641575e729a820ac01b17246f11c6630f6a919758da44dcd797880f9064482793bb5f2160b7cfe5a09099c2af0cf212c40d42670cfd82da31b86aeebb18f28d9f7b4cc05c926956a3a8726e8858a629b61f8249404aaf3f1de4a74e5aff4825fb88d917ae3da4c9ba05414e60dc24a1e0b9bf67f62a445b9", @ANYRES32=r2, @ANYBLOB="20000280", @ANYRES32=r0, @ANYBLOB="0000000000000000000000000a000000000000000000001420000100", @ANYRES32, @ANYBLOB="00000000ac1404ae00000000000000000000000086dd"], 0x58}}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffffa, 0x100, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x11a000, 0x7, 0x9, 0x3, 0xa5, 0x1, 0x1, 0x0, 0x3, 0x0, 0xf}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xd, r4, 0x2, &(0x7f0000000180)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) read$hiddev(r5, &(0x7f00000012c0)=""/4102, 0x1006) ptrace$cont(0x21, r4, 0x80000001, 0x4) r6 = socket$inet6_icmp(0xa, 0x2, 0x3a) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f0000000240)=r7, 0x4) r8 = socket$netlink(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'dummy0\x00', 0x0}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000580)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r9, @ANYBLOB="01002cbd7000fedbdf25110000000c00018008000100", @ANYRES32=r11, @ANYBLOB="cd60b3bb9512f65602484665dfb95a418dd37481446c781bd027313e2951ee2d14218feee236082abeaa169a91c498d13c894d32fd840218a479a2a92b1cd26ac8070000000000000064612b131ab0f06f83c63c404417"], 0x20}, 0x1, 0x0, 0x0, 0x4814}, 0x0) r12 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r12) sendmsg$NLBL_CIPSOV4_C_ADD(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r13, @ANYBLOB="010000000000000000070100000008000100000000000400048008000c8004000b800800020001000000a00008"], 0xd0}}, 0x0) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r5) sendmsg$IPVS_CMD_ZERO(r8, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)={0x68, r14, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x3c}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0x8000000) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0xf8, 0x0, 0x56, 0x0, 0x3, 0x8000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x10020, 0x3, 0x4, 0x6, 0x6, 0x8, 0x2, 0x0, 0x7fff, 0x0, 0x7f}, r4, 0xffffffffffffffff, r7, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) mbind(&(0x7f0000830000/0x2000)=nil, 0x2000, 0x4000, 0x0, 0x0, 0x6) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x3, 0x4000010, 0xffffffffffffffff, 0xfc434000) 24m33.930438731s ago: executing program 35 (id=381): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') r1 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x44, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}], [{@euid_eq={'euid', 0x3d, r1}}, {@obj_user={'obj_user', 0x3d, '(.-:'}}, {@audit}]}}) lseek(r0, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x5) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x40000, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xe}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0x9, 0x29, 0x80, 0x9, 0xffffffff, 0x91b1}, [@TCA_NETEM_LOSS={0x4}, @TCA_NETEM_DELAY_DIST={0x6, 0x2, "1fec"}]}}}]}, 0x58}}, 0x0) r4 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e25, 0x0, @empty, 0x7}, 0x1c) sendmmsg(r4, 0x0, 0x0, 0x0) 24m29.371492338s ago: executing program 36 (id=435): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r1, 0x1, 0xc3, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 24m9.670101715s ago: executing program 37 (id=830): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8, &(0x7f0000000040), 0x21, 0x4f3, &(0x7f00000012c0)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101800, 0x11) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000005c0)) pwritev2(r1, &(0x7f0000000cc0)=[{&(0x7f0000000240)=';', 0x1}], 0x1, 0x100fff, 0x7fffffff, 0x4f12eebf38599599) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000140)={"062ad332a24b30df893d7a3f09983c9c", r2, r3, {0x6, 0xfffffff7}, {0x400, 0x1}, 0xff, [0x9, 0x3, 0xffff, 0xe2, 0xffff, 0xf1d, 0xfffffffffffffffe, 0x40, 0x9, 0x8001, 0x1, 0x4, 0x100000000, 0xd76, 0x4, 0x26f]}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40140, 0x1) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setlease(r5, 0x400, 0x0) r6 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$lock(r6, 0x25, &(0x7f00000002c0)) close(r4) syz_mount_image$ext4(&(0x7f0000002180)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008802, &(0x7f0000000000)={[{@jqfmt_vfsv1}, {@abort}, {@discard}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@data_ordered}, {@mblk_io_submit}, {@usrquota}, {@nodioread_nolock}, {@errors_remount}, {}, {@auto_da_alloc}]}, 0x9, 0x606, &(0x7f0000000600)="$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") r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r9, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r9, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4000000010003904000000000000000600000000", @ANYRES32=r10, @ANYBLOB="01980000000000002000128008000100677265001400028008000700ac14"], 0x40}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x43403d0e, 0x0) setsockopt$packet_int(r11, 0x107, 0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendto$packet(r7, &(0x7f0000000240)="3f031c0003", 0x5, 0x0, &(0x7f0000000540)={0xc9, 0x0, r10, 0x1, 0x0, 0x6, @multicast}, 0x14) ioctl$SNDRV_TIMER_IOCTL_CREATE(r1, 0xc02054a5, &(0x7f0000000280)={0x0, r1, 'id0\x00'}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 24m4.127099858s ago: executing program 38 (id=959): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) syz_open_dev$sg(&(0x7f0000000740), 0x0, 0x18b203) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}}) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xffffffffffff0000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) setsockopt$inet6_int(r4, 0x29, 0x46, &(0x7f0000000000)=0xb2, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000600)="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", &(0x7f0000000040)=@udp6=r4, 0x4}, 0x20) 24m2.840980182s ago: executing program 39 (id=970): r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@getchain={0x24, 0x66, 0x0, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xc}}}, 0x24}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={0x0}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000009c0)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x4, {{@in6=@private1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xff}}, [@migrate={0x50, 0x11, [{@in6=@private1, @in=@private=0xa010100, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@rand_addr=0x6, 0x3c, 0x0, 0x0, 0x0, 0xa, 0xa}]}]}, 0xa0}}, 0x0) getsockname$packet(r0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="00000000000000001c0012800b000100697036746e6c00000c00028008000100", @ANYRES32=r0], 0x3c}}, 0x4880) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000004600)={&(0x7f0000000180)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000020010000300012800b000100697036746e6c0000200002800800"], 0x50}}, 0x20004010) 23m56.685540921s ago: executing program 40 (id=1070): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00'], 0x48) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x121201, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8418, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xfffffffffffffffb, 0x7}, 0x0, 0x6, 0x0, 0x1, 0x401, 0x20004, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0xbf}, @jmp={0x5, 0x0, 0x9, 0x0, 0xc}], &(0x7f0000000280)='GPL\x00'}, 0x94) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) bind$bt_hci(r2, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) socket$nl_generic(0x10, 0x3, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xef, 0x3d27}, 0x400, 0x32, 0x43a1bd76, 0x7, 0x203, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000001640)=""/193) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f00000003c0)={0x2f, @multicast1, 0x4e22, 0x0, 'lc\x00', 0x41, 0x0, 0x79}, 0x2c) syz_open_dev$loop(&(0x7f0000000080), 0x5, 0x4000) r7 = syz_io_uring_setup(0x4172, &(0x7f0000000780)={0x0, 0x4f5c, 0x10100}, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r7, 0x567, 0x0, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') pread64(r10, &(0x7f0000000600)=""/4099, 0xfdef, 0x110) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x27, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000081000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000ff7f00001831000005000000000000000000000095000000000000008d5b0c000800000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000000545d100020000001869000009000000000000004000000018410000fbffffff0000000000000000bf91000000000000b7020000010000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000440)='syzkaller\x00', 0xcd, 0x97, &(0x7f0000000a40)=""/151, 0x41100, 0x2, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000480)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x5, 0x8, 0x4, 0x80000000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000640)=[r0, r0, r0], &(0x7f0000000b00)=[{0x2, 0x3, 0x2, 0x7}, {0x0, 0x4, 0x1, 0x2}, {0x5, 0x4, 0x10, 0x1}, {0x3, 0x2, 0x7, 0x8}, {0x3, 0x1, 0x2, 0x4}, {0x4, 0x1c, 0x2, 0x7}], 0x10, 0x4}, 0x94) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newqdisc={0x50, 0x24, 0xf0b, 0x70bd26, 0x25dfdc01, {0x0, 0x0, 0x0, r6, {0x0, 0xc}, {0xffff, 0xffff}, {0xd, 0x8}}, [@qdisc_kind_options=@q_red={{0x8}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x8, 0x3, 0x9, 0x56, 0x20, 0x6}}]}}, @qdisc_kind_options=@q_hhf={{0x8}, {0x4}}]}, 0x50}, 0x1, 0x0, 0x0, 0x44004}, 0x0) recvmsg$can_bcm(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/97, 0x61}], 0x1, &(0x7f0000000800)=""/222, 0xde}, 0x40000040) 23m52.155890365s ago: executing program 41 (id=1159): r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x4, 0x4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000e80)={0x0, 'bridge_slave_1\x00', {0x1}}) r1 = socket(0x5, 0x4, 0x8000) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x439, 0x70bd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x40083}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @sit={{0x8}, {0x24, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x40}, @IFLA_IPTUN_6RD_PREFIXLEN={0x6, 0xd, 0x9}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) 23m46.785179058s ago: executing program 42 (id=1250): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setfsuid(0xee00) r1 = socket$netlink(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file1\x00', 0x2008000, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2bc, &(0x7f0000000440)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0185879, &(0x7f0000000000)={@id={0x2, 0x0, @a}}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f0000000080)=0x180004, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaa923986dd6c370c8900082b0120010000000000000000000000000000fe8000000000000000000000000000aaff"], 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x5c, 0x10, 0x639, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe802, 0xe280}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback={0xffffff7f00000000}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @loopback}]}}}]}, 0x5c}}, 0x24000000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000000c0)=0x1800, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x80d5}, 0x0) 23m30.26946125s ago: executing program 43 (id=1548): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000080)={0x0, 0x4a, "4f3ee26ed61c2dc679ff6d691fcf58e2f2922833e9b124a15aceadf13faa0667b3669681afdee5dd7c475bd55bf89721086817bff791a1ad871d384a40a5fac974d2a314a03229583e12"}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x2c, 0x3c, 0x107, 0x1, 0x25dfdbfb, {0x3, 0x7c}, [@nested={0x4, 0x8c}, @nested={0x14, 0x1, 0x0, 0x1, [@nested={0xe, 0x5a, 0x0, 0x1, [@typed={0x8, 0x25, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x22}}, @generic="1a36"]}]}]}, 0x2c}}, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) semget$private(0x0, 0x4, 0x44) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1f0519, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x9, 0x7}, 0xec25, 0x4085, 0xb, 0x4, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xa0, 0x30, 0xffff, 0xfffffffe, 0xf000000, {}, [{0x8c, 0x1, [@m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18, 0x2, {0x2, 0x5f, 0x0, 0x101, 0x8cb8}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x6}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x3}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}, 0xa0}}, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x4004743a, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr', 0x3) kexec_load(0x3, 0x4, &(0x7f00000002c0)=[{0x0, 0x0, 0x3e0000, 0x3e0000000000}], 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 22m37.738137169s ago: executing program 44 (id=2889): pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write(r2, &(0x7f0000000380)='\x00\x00', 0x2) splice(r2, &(0x7f0000000040), r1, 0x0, 0x800000000ff, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000480)='\x00', 0x1}], 0x1, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x8, 0x3, 0x1d8, 0x128, 0x43, 0xa0, 0x128, 0x98, 0x1d8, 0x178, 0x178, 0x1d8, 0x178, 0x49, 0x0, {[{{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xffffffff, 'veth0_vlan\x00', 'bond0\x00', {0xff}, {}, 0x0, 0x2}, 0x12a, 0x70, 0x90, 0x0, {0x0, 0x7a010000}}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x3, 0x1, "7a7d0d9452729a5afa3851200a44a3d28da04828d1768c081f126a6bc527"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x238) 20m59.201993348s ago: executing program 45 (id=4382): bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@generic={0x81, 0x1, 0x1, 0x5e}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_setup(0x10f, &(0x7f0000000300)={0x0, 0x8d2dc, 0x0, 0xffffffff}, &(0x7f00000003c0)=0x0, &(0x7f0000000140)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x58, 0x10, 0x403, 0x300, 0x3f00, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1e, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x58}}, 0x8000) 20m26.678466663s ago: executing program 46 (id=5130): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4081}, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4081}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000680)={0x0, 0xfffffe2f, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r5, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r4], 0x38}}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @remote, @void, {@llc={0x8864, {@snap={0x0, 0x0, '~', "3fab95", 0x892f}}}}}, 0x0) (async) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @remote, @void, {@llc={0x8864, {@snap={0x0, 0x0, '~', "3fab95", 0x892f}}}}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x421, 0x4, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x26d2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x3}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x25}]}}}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}}, @IFLA_BROADCAST={0xa}]}, 0x5c}}, 0xc080) (async) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x421, 0x4, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad, 0x26d2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x3}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x25}]}}}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}}, @IFLA_BROADCAST={0xa}]}, 0x5c}}, 0xc080) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(r7, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r8, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x20000084) (async) sendmsg$SMC_PNETID_FLUSH(r7, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r8, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x20000084) 19m16.435537434s ago: executing program 47 (id=6522): unshare(0xa000400) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 19m8.229831462s ago: executing program 48 (id=6850): r0 = syz_io_uring_setup(0x111, &(0x7f0000000200)={0x0, 0x0, 0x800, 0x3, 0x1}, &(0x7f0000000340)=0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @local, 'ip_vti0\x00'}}, 0x1e) r3 = syz_io_uring_setup(0x31c5, &(0x7f00000000c0)={0x0, 0x9e3b, 0x1}, &(0x7f00000001c0), &(0x7f00000003c0)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x95b, 0xa555, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffde, 0x1, @perf_config_ext={0x7fff, 0x2}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x5) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r6 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x12, r6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x28) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x1802, 0x0, 0x0, 0x5, 0x3, r6, 0x0}]) write$selinux_load(r5, &(0x7f0000000000)=ANY=[], 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_io_uring_setup(0x263f, &(0x7f0000000840)={0x0, 0xb8da, 0x186a, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) inotify_init1(0x0) set_mempolicy(0x4, 0x0, 0x5) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r0, 0x69ae, 0x2000, 0x0, 0x0, 0x0) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000100)={'xfrm0\x00', &(0x7f00000000c0)=@ethtool_sset_info={0x37, 0xffffffd7, 0x6}}) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="2c61b600370100010400000000fe0000fffeffffffffffff", @ANYRES32=0x0, @ANYBLOB="0e002f73656c696e75782f6c6f616400"], 0x2c) 18m29.969996481s ago: executing program 49 (id=7700): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0xffff, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x5, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x2000000, 0x11, &(0x7f0000000280)={{{@in=@empty, @in=@broadcast, 0x4e24, 0x0, 0x4e21, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x1, 0x0, 0x3, 0xffffffff80000000}, {0xfffffffffffffffc, 0x0, 0x100000000000, 0x200000}, 0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x3}, {{@in6=@mcast2, 0x0, 0x33}, 0x2, @in=@initdev={0xac, 0x1e, 0xff, 0x0}, 0x3502, 0x7, 0x3, 0xb7, 0xffffffff}}, 0xe8) 17m55.47802688s ago: executing program 50 (id=8111): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x125d, &(0x7f0000001080)) fcntl$lock(0xffffffffffffffff, 0x24, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x32, 0x43a1bd79, 0x3, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x8, 0x3fff8000}, 0xa00, 0x81, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0xa) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$nl_route_sched_retired(0xffffffffffffffff, &(0x7f000000b0c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000080}, 0x0) tgkill(r2, r2, 0x21) 15m56.724729616s ago: executing program 51 (id=10720): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd25, 0x25dfdbfe, {0x28}}, 0x14}}, 0x4000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000001c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x80, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r6, {0x0, 0x3}, {0xffff, 0xffff}, {0x4}}, [@TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x9, 0x5, 0x5, 0x800, 0x0, 0x1aa2, 0xc}}, {0x4}}]}, @qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x1d, 0x5, 0x2, 0x0, 0x3, 0x4}}, {0x4}}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x1d4}, 0x8840) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x2a, 0x200000, {{0x29, 0x4, 0x1, 0x27, 0xa4, 0x67, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}, @broadcast, {[@timestamp_prespec={0x44, 0x44, 0x2a, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x645b}, {@private=0xa010100, 0x4}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xc}, {@loopback, 0xffff}, {@private=0xa010102, 0x3}, {@local, 0x8}, {@dev={0xac, 0x14, 0x14, 0xf}, 0xe30}]}, @ssrr={0x89, 0x1f, 0x76, [@multicast2, @private=0xa010102, @local, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast2, @remote, @empty]}, @timestamp_addr={0x44, 0x24, 0x64, 0x1, 0x2, [{@rand_addr=0x64010102, 0x5}, {@rand_addr=0x64010100, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@broadcast, 0x81}]}, @rr={0x7, 0x7, 0x52, [@dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r8, 0x0, 0x2e, &(0x7f0000000340)={0x5, {{0x2, 0xfffe, @multicast1}}, {{0x2, 0x400, @loopback}}}, 0xfea5) setsockopt$inet_group_source_req(r8, 0x0, 0x2e, &(0x7f0000000700)={0x3, {{0x2, 0x0, @multicast2}}, {{0x2, 0x2, @private=0x80000001}}}, 0x108) getsockopt$inet_buf(r8, 0x0, 0x30, &(0x7f0000000340)=""/224, &(0x7f00000001c0)=0xe0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000780)={0x6d8, r3, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2c0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xe0, 0x5, "a547489aed71086f9bb3f9ec3bccc8bc80877a90413d67a5780045444ff2780e3ac61cffef458c0659a6d3c3ed7ee9022f818468fb986e6210786fa4349252898ed933f7a034afe135501ad8882426d2f211e52998547239d90463821bd4f67dbfb7881f0a98dd89b3701143dae9997442f3c9bb763591c21db87ebf6a2cc5df0839cd104706246b862e4cd85941a6bfb96d98e501bc6358159bb404fef4d05ccf3e531a393f0082f3cca95cb757285df4a1a7926aa641910c967e614f270e55db2d4928f605149738d9965f26a4037cbe110e297b897d715208190d"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x94, 0x5, "a9441ce2d70b6bd8f22956207c06baf49c8547e8f4b610e3dc7f50f126df4c6267576316ba4037393118d69245421d558ef9dac5d4a88d9951964369f73fe5ca5059281b434206cf62fe8e2a18fa2ffe351a08cf428b8ac5dbead415e24d51509a865e5908359e3bcd087ec595cf78b7d34480e6c0f860f0f7cf129a41503a2c168aa05b1030c9f09458651c9aa6de28"}, @ETHTOOL_A_BITSET_MASK={0x56, 0x5, "1aae379b6fd37b7f12c67c1fe23ef15dca730624dd1b86c554c640634d7c63f223d32bab43e0ab2106a93da9fb61b2356e2cf2514d19c08dbd3c6fce6308d693be4fa232c8e20d80b6f55a00d73928f5602a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x43, 0x4, "e52c1bc0c93026934c191d47a890b16ad888549935ac6241c0349018e6fddb87246be8bd6261d14782fa8e51a082888302f1a4a87281283d7d51881ca55966"}, @ETHTOOL_A_BITSET_MASK={0x9f, 0x5, "b8c03c044e8d4b1e91c0550fae0cde0e33c86ab5739926b108583a30c13c0059f8e7ad0e24ce8b0a98024775eafce8434f2435f4a9bdad80cc980ae4dae58368f6f0cd056b2cb0bf7f4cae7d79e76b88115002e7c93a715ad992d41f6a900d9447aba8a00085fb904b3bf23d829c32a0970742dd8f8b35205374917aeca3a6fdc512ca68faa5e118ec71a335e434b854439852e4fa0b0cc0c5cf57"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf2}]}, @ETHTOOL_A_FEATURES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_FEATURES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x1ac, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x78, 0x4, "3811a00aee1bac02483fa63c75de38406d560cee293342ac60c305bfe41133d6179687d900463ace0c3cacccc88ace7010fc70b89f864019866efd0b792e00d8d2dc3b9279dfcdeacc1adbd8c19f0c1f6c36feebbcdcfaea212ec62f66a8b48d1c6015509a1454ffbde44870968ea4ed6c3d5507"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xa77d}, @ETHTOOL_A_BITSET_MASK={0xc1, 0x5, "f0df7deb1278849f1dca2fb41b4c03bdbdaf2fd040cd465d2ce290b48fc1f4fca6cd01783e87e6395fd09ca848ce5ba05ddca34543672a0b0a0c582c2dda61047e9cf0ae9d0297ef6cce322164cfde68ebfc0bbdd8131fcc9ef60751d6cc976d12de60d9b3c635487d1000d4b1a4babd67ac0fe6097e8b95a16feea6eb6742b8f21ae36501ed839be9d88163a3ad68f28e05822a42cf982cfbd14387e641964e0f39c576b91aeec7444c4cd064db481bfd73a89a51abc8b1fc226fb017"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x11ff}]}, @ETHTOOL_A_FEATURES_WANTED={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffffff}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x114, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb4bf}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#&\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x35}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa64}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, 'syzkaller\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, 'syzkaller\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'tmpfs\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'tmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6e06cdf3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd4a4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x6d8}, 0x1, 0x0, 0x0, 0x9e3fb21ce34a028b}, 0x4000080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x71, 0x0, &(0x7f0000000040)="d2ff03cb4608008cb89e08d986dd", 0x0, 0xb22a, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000080, &(0x7f0000000280)=ANY=[@ANYBLOB='nr_inodes=M']) 15m45.617528523s ago: executing program 52 (id=11217): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000400)="2ae0e710", 0x4, 0xf401000000000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 15m16.727907226s ago: executing program 53 (id=11479): openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000100000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x0) r5 = io_uring_setup(0xfd5, &(0x7f0000002b00)={0x0, 0x5a0b, 0x2, 0xffffffff, 0x3c3}) io_uring_register$IORING_REGISTER_BUFFERS2(r5, 0x14, &(0x7f0000003480)={0x4, 0x0, 0x4, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x0}, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000004c0)={'veth1_virt_wifi\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000800)={r1, r8, 0x25, 0x0, @val=@tcx}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 13m18.002776621s ago: executing program 54 (id=13196): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) (async) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000100)='\x00', 0x20000101}], 0x1000000000000044, 0x0) (async) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') r2 = socket(0x1d, 0x2, 0x6) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 11m23.390433361s ago: executing program 55 (id=14993): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="a8000000100001000000000000b890c1a000000a80000000160a01030000000000000200020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f627269646765001400010077673200000000"], 0xa8}}, 0x0) 10m21.929238863s ago: executing program 56 (id=16046): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000004a641c0012000c000100626f6e6400"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) futex(0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, 0x2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000030425bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="0005000082180000140012800b00010062726964676500000400028008000a00", @ANYRES32=r5], 0x3c}, 0x1, 0x0, 0x0, 0x24000804}, 0x8000) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) r8 = socket(0x2b, 0x1, 0x1) setsockopt$inet6_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r8, &(0x7f00000001c0)={0xa, 0x4e1f, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000500), r9) sendmsg$NFC_CMD_DEV_DOWN(r9, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="210026bd7000fddbdf2503000000080001"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r11 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$IEEE802154_SET_MACPARAMS(r9, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x208000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)={0x64, r11, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_TXPOWER={0x5, 0x21, 0x9}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4d}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LBT_ENABLED={0x5}, @IEEE802154_ATTR_CSMA_MIN_BE={0x5, 0x26, 0xd}, @IEEE802154_ATTR_LBT_ENABLED={0x5, 0x22, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LBT_ENABLED={0x5}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x40}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x1) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x4e25, 0x0, @loopback, 0x40200005}, 0x1c) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000040)=0x80000000, 0x4) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x4c}}, 0x884) 9m44.8401813s ago: executing program 57 (id=16926): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'dvmrp0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x0, 0x5, [@remote, @empty, @broadcast, @local, @local]}) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x200) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000300)={0x0, 0x1, &(0x7f0000000040)="b1"}) syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b09000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRESHEX=r2], 0x0, 0xffffffff, 0x0, 0x0, 0x100, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000100)={'gre0\x00', r3, 0x40, 0x80, 0x8001, 0x8, {{0x6, 0x4, 0x1, 0x8, 0x18, 0x66, 0x0, 0x0, 0x29, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}, {[@generic={0x44, 0x4, "2091"}]}}}}}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'bond0\x00'}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) r7 = socket$kcm(0x29, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000200)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x4}, 0x8007, 0x10000, 0x8, 0x1, 0x5, 0x2020005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = gettid() timer_create(0x9, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 9m2.216412441s ago: executing program 58 (id=17318): r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x0) bind$nfc_llcp(r0, &(0x7f0000000280)={0x27, r1, 0xffffffffffffffff, 0x6, 0x2, 0x3, "fed59831e5662717946619395c9940c94fe89c89a75620e79fca514887d231772ad6113f3f9b64cb9795d97d569b92ef9eca64c62f28cd8e8d97026cf00b7c", 0x22}, 0x60) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000004830000000000000fa40000007010000080020007514feff0000820095000000d3031a006dd015836e4d27f5182b60bbb7c19e21eec859fe68f9428ac407630eac8eb682f5b2d86b4abf9e63ad263fec7db9338ca9eebf2218c8b9ca64bcdcdaa06fc4c7aa217fcecd9443c54143bde8ddcbc3b8ac619930206d8d0881af823d6d18c66f021c20b55013d7fb6ea7013c062d13176d71d7dad98eb976ed679fa639"], &(0x7f0000000000)='GPL\x00', 0x8, 0x29, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf2, 0x10, 0x0, 0x23, 0x0, 0x0, 0xff87}, 0x23) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4b, &(0x7f0000000100)=0x401, 0x4) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22, 0x20020003, @private2, 0x5}, 0x1c) listen(r2, 0x6) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000680)={0x38, r4, 0x1, 0x100, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0x38}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) sendmsg$NFT_MSG_GETOBJ(r6, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x88021850}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x13, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_OBJ_TYPE={0xfffffffffffffed7, 0x3, 0x1, 0x0, 0x9}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r5) 8m6.818044749s ago: executing program 59 (id=18950): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000200)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@prjquota}, {@bsdgroups}, {@oldalloc}, {@errors_continue}]}, 0x2, 0x45d, &(0x7f0000000ac0)="$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") sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8040}, 0x24040014) 6m41.126422747s ago: executing program 60 (id=20438): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @empty=0xf5ff}, 0x10, 0x0, 0x0, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x3e}}, @ip_tos_u8={{0x11, 0x29, 0x2}}, @ip_tos_u8={{0x11}}], 0x48}, 0xff00) 5m8.719026508s ago: executing program 8 (id=22063): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg(r0, &(0x7f0000000540)=[{{&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x4, @dev={0xfe, 0x80, '\x00', 0x11}, 0xa, 0xfffffffd}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)="ef", 0x1}], 0x1}, 0x11}, {{0x0, 0x0, 0x0}}], 0x2, 0x200cc945) 5m8.718823038s ago: executing program 8 (id=22064): socket(0x10, 0x3, 0x0) unshare(0x8040480) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="183f000000000000000000000300000095008a000000000095"], &(0x7f00000003c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) 5m8.718658518s ago: executing program 8 (id=22065): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000580)='\a', 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "a2a39dfa893a9cbe", "b89e490e7bcb1e08ec563bed46b0cc6f", "8fe196e8", "fbbdf440caa16a37"}, 0x28) 5m8.718378818s ago: executing program 8 (id=22066): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x7fff, 0x0, 0x0, 0x2}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x20, 0x12, 0xa01, 0x0, 0x0, {0x14}, [@generic="97f35c1e0942ad430c"]}, 0x20}}, 0x0) 5m8.707735938s ago: executing program 8 (id=22067): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000740)={@multicast1, @local}, 0xc) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) listen(0xffffffffffffffff, 0x4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a0101"], 0x57) 5m8.695760899s ago: executing program 8 (id=22068): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x16, 0xe, &(0x7f0000001480)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffd}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x800000, 0x1000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000500)="05804ab38284c7d5a5b66406d704", 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x76, 0x4) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}]}, 0x6c}, 0x1, 0x1100000000000000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x40401, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='reno', 0x4) sendmmsg$inet(r1, &(0x7f0000002240)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002340)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c42200fd9232f5aa6a361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0feae13c8c2a1dcc8a3122aaa3dcd5b9247a915378e6492e5b94073dcdc87e7c794fb262a7e9ee0b9432f7433", 0xc8}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000800)}], 0x1}}], 0x3, 0x2090) sendto$inet(r1, &(0x7f0000000580)='1', 0xfffffffffffffc21, 0x10008095, 0x0, 0x21) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="680000001000ffff2bbd7000bbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="100a0500231a0500480012800e00010069703665727370616e00000034000280060003003000000014000700fc0200000500000000f3000000000014000600f402000000000000000000e9ffffff040000"], 0x68}, 0x1, 0x20000, 0x0, 0x240440d5}, 0x9080) mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0xcd0b3000) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000b80)=ANY=[@ANYBLOB="1c0000005e00010025bd7000fddbdf2500000000", @ANYRES32=r8, @ANYBLOB='>'], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x60040050) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000003, 0x110, r7, 0xd1ca1000) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') openat(r9, &(0x7f0000000440)='./cgroup\x00', 0x440, 0x80) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000040)) 4m52.59760289s ago: executing program 61 (id=22068): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x16, 0xe, &(0x7f0000001480)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffd}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x800000, 0x1000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000500)="05804ab38284c7d5a5b66406d704", 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x76, 0x4) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}]}, 0x6c}, 0x1, 0x1100000000000000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x40401, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='reno', 0x4) sendmmsg$inet(r1, &(0x7f0000002240)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002340)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c42200fd9232f5aa6a361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0feae13c8c2a1dcc8a3122aaa3dcd5b9247a915378e6492e5b94073dcdc87e7c794fb262a7e9ee0b9432f7433", 0xc8}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000800)}], 0x1}}], 0x3, 0x2090) sendto$inet(r1, &(0x7f0000000580)='1', 0xfffffffffffffc21, 0x10008095, 0x0, 0x21) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="680000001000ffff2bbd7000bbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="100a0500231a0500480012800e00010069703665727370616e00000034000280060003003000000014000700fc0200000500000000f3000000000014000600f402000000000000000000e9ffffff040000"], 0x68}, 0x1, 0x20000, 0x0, 0x240440d5}, 0x9080) mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0xcd0b3000) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000b80)=ANY=[@ANYBLOB="1c0000005e00010025bd7000fddbdf2500000000", @ANYRES32=r8, @ANYBLOB='>'], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x60040050) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000003, 0x110, r7, 0xd1ca1000) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') openat(r9, &(0x7f0000000440)='./cgroup\x00', 0x440, 0x80) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000040)) 2m25.234843672s ago: executing program 2 (id=24708): r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x2, 0x36, 0x31, 0x0, 0x71, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x71e, 0x1}, 0x400, 0x9, 0x5, 0x2, 0x8000000000000001, 0x4, 0x6, 0x0, 0x4e61546a, 0x0, 0x100000000}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x1, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x44841}, 0x4000000) mkdirat$cgroup(r1, &(0x7f0000000b80)='syz0\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 2m25.081315661s ago: executing program 2 (id=24709): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="380000000206010800000040000000000000000014000780080011400000005205001500dd000000050001000600000005000500"], 0x38}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="840000000002010400000000000000000a00000004000180300003802c00018014000300fc00000000000000000000100000000014004400fe800000001f610000000000000000bb3c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014"], 0x84}}, 0x0) r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='!\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000228bd7000fedbdf2518000000080001007063690011000200303030303a30303a31302e3000000000080003"], 0x60}, 0x1, 0x0, 0x0, 0x200400c0}, 0x20044014) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x1, 0x470bd26, 0x25dfdbff, {0x0, 0x0, 0x0, r4, 0x64e10, 0x36a01}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT={0x8, 0x25, 0x1}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x400c080}, 0xc802) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x9) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffeb) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000001100)='./file0/../file0\x00', 0x0, 0x989046, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') lseek(r6, 0xfffd, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000000010003b0e2a1a86eb2636037f00000000", @ANYRES32=r5, @ANYBLOB="0200000000008000800012000800010076746936740002"], 0xa0}}, 0x0) 2m25.039396073s ago: executing program 2 (id=24712): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 2m25.022291315s ago: executing program 2 (id=24713): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0xac, 0x30, 0x1, 0x0, 0x0, {}, [{0x98, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x68, 0x1, 0x0, 0x0, {{0x8}, {0x40, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}, @TCA_IFE_SMAC={0xa, 0x4, @multicast}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x3}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xac}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0xdbcf5164e35decb8, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000300), r2, 0x7}}, 0x18) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000001e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x74}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={0x0, r2, 0x0, 0x3, 0x4000}}, 0x20) 2m24.963910478s ago: executing program 2 (id=24714): recvmmsg(0xffffffffffffffff, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/6, 0x6}], 0x1}, 0x85}], 0x1, 0x40, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0x42, &(0x7f0000000140)={@broadcast, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "1e1907", 0xc, 0x2f, 0x0, @remote, @mcast2, {[], {0x0, 0x22eb, 0xffffffffffffff00, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xfffe}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x3c, 0x4, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8}, @NFTA_IMMEDIATE_DATA={0x18, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffc}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xd8}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x510, &(0x7f0000000740)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000002c0)=0x20) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000080)={0x40002, 0x0, 0x1}, 0x18) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x4, 0x24e, &(0x7f0000000a00)="$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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x183042, 0x15) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc880}, 0x8000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000440)='bbr', 0x3) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000001c0), 0x4) close(0x3) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000044c0), 0x4000000000001c0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0), 0x400, 0x0) syz_io_uring_setup(0x5f3f, &(0x7f0000000500)={0x0, 0x651f, 0x1, 0x0, 0xb9, 0x0, r3}, &(0x7f00000005c0), &(0x7f0000000600)) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/60, 0xdb, 0x40, 0x0, 0x0) 2m24.726937212s ago: executing program 2 (id=24715): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x2000000000000000, {0x2, 0x0, @empty}, {0x4, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x184, 0x0, 0x0, 0xfdffffffffffffff, 0x0, &(0x7f0000000180)='lo\x00', 0x4}) 2m8.675452s ago: executing program 62 (id=24715): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x2000000000000000, {0x2, 0x0, @empty}, {0x4, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x184, 0x0, 0x0, 0xfdffffffffffffff, 0x0, &(0x7f0000000180)='lo\x00', 0x4}) 49.696944516s ago: executing program 0 (id=26681): unlink(&(0x7f0000000380)='./cgroup.cpu/cgroup.procs\x00') stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000180)={[{@dax_always}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@appraise}, {@euid_gt={'euid>', r0}}, {@uid_gt={'uid>', r0}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'dax=always'}}, {@obj_user={'obj_user', 0x3d, 'dax=always'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x31, 0x38, 0x62, 0x64, 0x49, 0x31, 0x53], 0x2d, [0x65, 0x34, 0x0, 0x61], 0x2d, [0x65, 0x5f, 0x39, 0x37], 0x2d, [0x39, 0x31, 0x34, 0x54], 0x2d, [0x61, 0x35, 0x33, 0x36, 0x36, 0x30, 0x35, 0x66]}}}, {@dont_appraise}]}, 0x2, 0x5e5, &(0x7f0000000ac0)="$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") 49.602949711s ago: executing program 0 (id=26682): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000180001000000000000000000020000000003000900000000060015000400000014001680100008800c000180050002"], 0x38}}, 0x2000000000000000) 49.602755071s ago: executing program 0 (id=26683): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="a40100001b00674c0000000000000000fe80080000000000000000000000001a2001000003000000000000000006000000000000000000100a"], 0x1a4}}, 0x0) 49.580453912s ago: executing program 0 (id=26684): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x1214040, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) (async) pivot_root(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000000)='./file0\x00') 49.543139725s ago: executing program 0 (id=26686): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semtimedop(0x0, &(0x7f00000003c0)=[{0x2, 0x4, 0x800}], 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x141002, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000400)='./file0\x00', 0x3, &(0x7f0000000f80)={[{@nombcache}, {@nobarrier}, {@norecovery}, {@errors_remount}, {@resgid}]}, 0x8, 0x625, &(0x7f0000002ac0)="$eJzs3c9vFFUcAPDv7PYXrdpCjIoHaWIMJEpLCxhiTIQ7Ifjj5qnSQpBCSVujRRJLghcT48WDiScP4n+hJF49ePXgxZMhIYb0IIbAmpndKdvtbrtdtt3Sfj5h2HkzO/PetP32vX19byaAXWs4/a8QsT8iriYRg1X7uqKyc7j8vqV7188t3Uu3lUrv/5PE9S+SxepzJZXXgcrBDwcj+b0Qsa+4Ot+5hWuXJqanp2Yr6dH5y1dH5xauHb54eeLC1IWpK+Nvjp84fuz4ibEjrV9cMfu37PTNjz8d/OrMhz9+/yAZ++nPM0mcjEeVN6TXVnt4b+s5Z4ZjOEpl96u3p1/XE0947u3i38H85+SxpHYD29b5ys9jd0S8GINRrPpuDsaX73a0cMCmKiWR11HArpO0FP997S8IsMXydkD5s315Wb/VUNjkVgmwFe6eKncAlGO/OyLy+O8q9w1GX9Y30L+UrOjnSSLiCXrmlqV5/PbrmZvpEjX9cHW6DYE2WryR93LX1v9JFptD0Zel+pcKK+K/ULWk299rMf/hmnRz7Q+gHRZvRMRLlfq/JzYU/8NV8f9Ri/mLfwAAAAAAAGif26ci4o164/8Ky+N/euqM/xmIiJNtyH/9v/8V7lRWkjZkB1S5eyri7brjf5fH+A4VK6lns/EA3cn5i9NTRyLiuYg4FN29aXqs5rzVI4QPf73vu0b5V4//S5c0/3wsYOVMd7pqJuJOTsxPPOl1AxF3b0S8nI3/PVDZsnL8T1r/J3Xq/zS+rzaZx77Xbp1ttG/9+Ac2S+mHiIN16//Hze1k7ftzjGbtgdG8VbDaK59/83Oj/MU/dE5a//evHf+9SfX9euY2dv6eiDi60FVqtL/V9n9P8kExFrPz55MY52fHInqS08U839RnE/Pzs+MbKzPsVHk8ZK9j5fg/9Ora/X9JPCy3/6vicE9ELDaZ5wuPBv5qtG84Ir+JmPoftlga/5Nr1/9DK+v/ja+M3xr6pUH2ydmm6v9jWZ1+qLJF/x9UW30/jmYDtCPFBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAICnXCEinomkMLK8XiiMjEQMRMTz0V+Ynpmbf/38zCdXJtN92fP/C/mTfgfL6SR//v9QRHRHRJoer6Tz/UcjYm9EfFvck6VHzs1MT3b64gEAAAAAAAAAAAAAAAAAAGCbGMjm/Jd6a+f/p/4udrp0wKbrqryKd9h9ulo+stTb1oIAW671+Aeeds3Hf/emlgPYeo3j//6DUmZLiwNsIe1/2L1ajH9/LoAdQP0Pu1WTfXp9m10OoBPU/wAAAAAAsKPsPXD7jyQiFt/aky2pnso+g/1hZyt0ugBAxxjDC7tX10ynSwB0is/4QLK89l/dyf6NR/8nm1MgAAAAAAAAAAAAAGCVg/vN/4fdau35/8b2w062xvz/esHvdgGwgzR+9Ie6H3Y6n/GBZJ1fBOb/AwAAAAAAAAAAAMA20Hft0sT09NTs3MLTt/JOC0f1drrwixPb4UvX3pVHrR4eyVrv6Y6I7XGB7VpJIqKZN+e34OhgUTv8ewkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFj2fwAAAP//st0iDA==") openat(0xffffffffffffff9c, 0x0, 0x2002, 0x49) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0), 0xe8}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001200010000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', @ANYRES32=r3], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x802) 49.090426021s ago: executing program 0 (id=26705): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, 0x0, 0xc010) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x300840e, &(0x7f00000003c0), 0x1, 0x553, &(0x7f0000001080)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x2002, 0x49) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0x8004587d, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x8000200000000000, 0x0, 0x85c, 0x5}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000002680)=[&(0x7f0000000240)={0x0, 0x0, 0xa0, 0x1, 0x65e, r1, 0x0, 0x0, 0x5fe}]) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@dellinkprop={0x28, 0x6d, 0x1, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8814}, 0x4000) socket$nl_route(0x10, 0x3, 0x0) 49.071151612s ago: executing program 63 (id=26705): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, 0x0, 0xc010) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x300840e, &(0x7f00000003c0), 0x1, 0x553, &(0x7f0000001080)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x2002, 0x49) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0x8004587d, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x8000200000000000, 0x0, 0x85c, 0x5}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000002680)=[&(0x7f0000000240)={0x0, 0x0, 0xa0, 0x1, 0x65e, r1, 0x0, 0x0, 0x5fe}]) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@dellinkprop={0x28, 0x6d, 0x1, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8814}, 0x4000) socket$nl_route(0x10, 0x3, 0x0) 33.570918368s ago: executing program 1 (id=27094): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x8, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000003f001001000001"], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 33.570594088s ago: executing program 1 (id=27095): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1000000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000c7dcf27ffcf354f6826350739656564b696cc7e58d847b6c34cc81bb7e078b60579925c04647b5238e8b515e5ef95713c5129553f0c8d64ff911f04c772f689ad38496ced753b69ff6d7"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000480), &(0x7f0000000380)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r5, r1}, 0x14) syz_emit_ethernet(0x9a, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60010100006411fffe8000000000000000000000000000bbfe8000000000000000000000000000aa4e200e2200649078020000000100000001000000628e0960f6d6d3f6ee6d6b84b345dccac643e7df3e526ff07833b291322d4a74882e8a741e7632033c970114f245aed68fb3d9fd3efe8e4ea8b5ec7448ddd6a3215990e1b896120966af96b22cf049f067242e6ba9cf813c41c104d48ee0fbff024433e8165f757748707c"], 0x0) 33.570295838s ago: executing program 1 (id=27096): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001100)=@migrate={0xec, 0x21, 0x1, 0x4, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@dev={0xfe, 0x80, '\x00', 0x3a}, 0x0, 0x0, 0x0, 0x2, 0xa, 0x0, 0xa0, 0x2e}}, [@migrate={0x9c, 0x11, [{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@loopback, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@loopback, 0x3c, 0x4, 0x0, 0x20, 0xa, 0xa}, {@in=@private=0xa010101, @in6=@empty, @in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x34}, 0x3c, 0x4, 0x0, 0x0, 0x8, 0x2}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 33.5379472s ago: executing program 1 (id=27098): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x20440, &(0x7f00000000c0), 0x5, 0x597, &(0x7f0000001a40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/1810], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r3, 0x4) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[], 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x10000000000001, 0x0, 0x0, 0x2) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x3, 0x3032, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x208143) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = io_uring_setup(0x2f82, &(0x7f0000000200)={0x0, 0x446c5, 0x0, 0xfffffffc}) close(r6) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYRESOCT], 0x10b8}, 0x110) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x2, 0x80805, 0x0) accept4$nfc_llcp(r7, 0x0, 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x4e24, @private=0xa010100}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x79, &(0x7f0000000080)={r10, 0x5, 0xff}, 0x8) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="b8000000190001000000000000000100e00000020000000000000000000000000000000000000000000000000000000000000010000000000a00200062000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0800000000000000100000000002000002000000010000000000000000000000fe0f00000000000073b4ffffffffffffffffffffffffffff0000000000000000000000001000000003000000000000200200000000000000fffffffffffffffffeffffff000000000000000300000000eb592f6c5f4b916cca08529646059f8d240ba1f091248258593cbc5c06bfb4a8f2df826e5fe54a28044670da8f765acb2f5cb78b74a2aa42488b1973ee2b9f3b9b4992aa1498bbdaa4e7e1d0e3fb7ab336772d19e61a173e11"], 0xb8}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) 33.02941217s ago: executing program 1 (id=27111): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x110cc0, 0x91d, 0xf, 0x0, 0x6, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x2, 0x80805, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001740)=@newqdisc={0x434, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, 0x0, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x408, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xffffffff, 0x33, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x4, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x400, 0x7fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0x2, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x40000007, 0x4, 0x99, 0x9, 0x5, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x7ffffffe, 0x400, 0x8, 0xfffffa72, 0xcd, 0xffffff80, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x1, 0x4dc, 0x80, 0x3, 0x7fffffff, 0xff, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x7, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x3, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x9, 0x6, 0x5, 0x5, 0x4d15, 0x1ff, 0xfffff060, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x3, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x7, 0x8, 0xfff, 0x9, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x1, 0x1ff, 0x3e, 0x10, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x0, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x4, 0x1, 0x6, 0x200, 0x2]}]}}]}, 0x434}, 0x1, 0x0, 0x0, 0x40098}, 0x0) r1 = open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x140000}], 0x14, 0x7800, 0x0, 0x3) sendmmsg$inet_sctp(r0, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)="03bada", 0x3}], 0x1, 0x0, 0x0, 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000300)="359cb6", 0x3}], 0x2, 0x0, 0x30}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000006000000000000000100000d0300000003000000030000000000000000000006040000000400000000000012020000000000005f5f"], 0x0, 0x4a}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x80, 0x7ffc1ffb}]}) socket$nl_route(0x10, 0x3, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)={0x14, r4, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x800) 32.594857125s ago: executing program 1 (id=27117): r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80009, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8, 0x6}, 0x68a5, 0x10000, 0x0, 0x6, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100000000000400048008000c8004000b800800020001000000a00008801c000780080077144ebb00000800060000000000080005"], 0xd0}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) io_setup(0x4, &(0x7f00000014c0)=0x0) r5 = fcntl$getown(r0, 0x9) r6 = syz_open_procfs(r5, &(0x7f0000000200)='net/vlan/config\x00') futex(&(0x7f000000cffc), 0x9, 0x0, 0x0, 0x0, 0xfffffffe) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0xfffffffd) futex(&(0x7f000000cffc), 0x3, 0x0, &(0x7f0000fd7ff0), &(0x7f0000000200), 0x2) io_submit(r4, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, r6, 0x0}]) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000082}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000006000000020000000100000c02000000000000000000000d0000000000002e"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x10000, @value=r6}, 0x28) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000001c0)={'veth1_vlan\x00', 0x400}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000001000ffff27bd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="150c0004000000001c00128009000100766c606e000000000c000280060001000400000008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB="0a000100aaaaaaaaaa160000"], 0x58}, 0x1, 0x0, 0x0, 0x28001}, 0x8000) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x281, 0x0) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f00000002c0)=0x1) 32.594368285s ago: executing program 64 (id=27117): r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80009, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8, 0x6}, 0x68a5, 0x10000, 0x0, 0x6, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100000000000400048008000c8004000b800800020001000000a00008801c000780080077144ebb00000800060000000000080005"], 0xd0}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) io_setup(0x4, &(0x7f00000014c0)=0x0) r5 = fcntl$getown(r0, 0x9) r6 = syz_open_procfs(r5, &(0x7f0000000200)='net/vlan/config\x00') futex(&(0x7f000000cffc), 0x9, 0x0, 0x0, 0x0, 0xfffffffe) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0xfffffffd) futex(&(0x7f000000cffc), 0x3, 0x0, &(0x7f0000fd7ff0), &(0x7f0000000200), 0x2) io_submit(r4, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, r6, 0x0}]) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000082}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000006000000020000000100000c02000000000000000000000d0000000000002e"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x10000, @value=r6}, 0x28) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000001c0)={'veth1_vlan\x00', 0x400}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000001000ffff27bd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="150c0004000000001c00128009000100766c606e000000000c000280060001000400000008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB="0a000100aaaaaaaaaa160000"], 0x58}, 0x1, 0x0, 0x0, 0x28001}, 0x8000) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x281, 0x0) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f00000002c0)=0x1) 25.440689484s ago: executing program 4 (id=27278): r0 = memfd_create(&(0x7f00000004c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xecz\xabq\x95t*T9\xa9\b X \x04\"\x17\xbf\xcb\xccF\xda\xcf\xdd^\xa0\x15\xc0\xcb^h>\x1b\xb5d\xc7\x7f0\x9a&\xb0\x12#\x9c`\xa6\xed\x05\x95g\a\xccYb\xaf\xe9\xb6G?\x9f\xf5\xfe\xc1\xc0JJ\xc8\xd9d\x80\x13\x8fX\xb4\x19\xc4\\\xcb\x89-)\x90\x01\v\xac^\xdbBQ|\xaej;\x92\\\xf8u\x19Y\xee\x99EI\xf1t\xadn<\x9b\xc9\x87\xd0\xa7\x1a\x81\xb9\xc87sq\xd7\x15\xd6\x91O\x9c\x99!9>\xff\xa8\xfa\xe6=d\xcf\xca\xa9\xc61!\xc6P\x13\xd0\x88gZ\xbe\xdfl\xfa\xff\xb0m;d07\x8ex\xbb\xabd\xe5\x16\xc4\xae\xf0', 0x1) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x64, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}]}, 0x64}}, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f00000006c0)="f740ee12f2", 0x0}, 0x50) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x40, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x300c}]}, 0x40}}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed000e, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@noload}, {@errors_remount}, {@resgid={'resgid', 0x3d, 0xee00}}, {@min_batch_time={'min_batch_time', 0x3d, 0x6}}, {@usrjquota}, {@nombcache}, {@noquota}, {@grpid}, {@norecovery}]}, 0x0, 0x45f, &(0x7f0000001940)="$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") getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@qipcrtr, &(0x7f0000000240)=0x80) 25.394783236s ago: executing program 4 (id=27280): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x110cc0, 0x91d, 0xf, 0x0, 0x6, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x2, 0x80805, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001740)=@newqdisc={0x434, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, 0x0, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x408, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xffffffff, 0x33, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x4, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x400, 0x7fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0x2, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x40000007, 0x4, 0x99, 0x9, 0x5, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x7ffffffe, 0x400, 0x8, 0xfffffa72, 0xcd, 0xffffff80, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x1, 0x4dc, 0x80, 0x3, 0x7fffffff, 0xff, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x7, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x3, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x9, 0x6, 0x5, 0x5, 0x4d15, 0x1ff, 0xfffff060, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x3, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x7, 0x8, 0xfff, 0x9, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x1, 0x1ff, 0x3e, 0x10, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x0, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x4, 0x1, 0x6, 0x200, 0x2]}]}}]}, 0x434}, 0x1, 0x0, 0x0, 0x40098}, 0x0) r1 = open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x140000}], 0x14, 0x7800, 0x0, 0x3) sendmmsg$inet_sctp(r0, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000140)="03bada", 0x3}], 0x1, 0x0, 0x0, 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000300)="359cb6", 0x3}], 0x2, 0x0, 0x30}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000006000000000000000100000d0300000003000000030000000000000000000006040000000400000000000012020000000000005f5f"], 0x0, 0x4a}, 0x28) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x80, 0x7ffc1ffb}]}) socket$nl_route(0x10, 0x3, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x800) 25.057564526s ago: executing program 4 (id=27286): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x100000b3, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr=0x64010100, @remote}, {0x0, 0x883e, 0x48, 0x0, @wg=@cookie={0x3, 0x3, "90c7205b89c6ba79f201fb2a7ccdec3f092308bf4d1ae199", "11da928cceb7f2257669a73e935ab02244656cfe8638fefb94440b907850c38e"}}}}}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44f81}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x4}}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x80c0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="24000000200001032bbd70000300000002000000050000603360eb30ae6ffda06e750800000000080017004e214e22"], 0x24}}, 0x42094) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x2e, &(0x7f0000000100)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1303}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}]}}}]}, 0x3c}}, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000100)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@abort}, {@resgid}, {@bh}, {@nouid32}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth1\x00', 0x0}) r7 = openat$selinux_policy(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r7, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r8, &(0x7f0000002640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@sndinfo={0x20, 0x84, 0x2, {0x5, 0x8000, 0x8001, 0x4}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x3ff, 0x4, 0x2, 0x4, 0x80, 0xf, 0x800}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010101}, @init={0x18, 0x84, 0x0, {0x1, 0x8, 0x7fd9, 0x4}}, @authinfo={0x18, 0x84, 0x6, {0xf5}}], 0x98, 0x81}], 0x1, 0x41) r9 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r9, 0x84, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x44, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {0x0, 0xffff}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x0, 0x5, 0x1, 0x4}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x50, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7f, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffc00, 0x3, 0x2, 0xfffffffd, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5412, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x100000b3, 0x4) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) close(0x3) 24.922511743s ago: executing program 4 (id=27289): r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x21004eed4548091b, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x29833, 0x1105}, [@IFLA_NET_NS_PID={0x0, 0x13, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x410c0}, 0x4048014) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendto$packet(r2, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r3}, 0x14) 24.762954793s ago: executing program 4 (id=27291): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r0, 0xffffffffffffffff, 0x100000000000000) 24.762488323s ago: executing program 4 (id=27292): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b82, 0x0, @perf_bp={0x0, 0x1}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x6, 0x7, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_mount_image$msdos(&(0x7f0000000340), &(0x7f0000001cc0)='.\x00', 0x1aca4b8, &(0x7f0000000480)=ANY=[@ANYRES16, @ANYRESHEX, @ANYBLOB="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", @ANYRESOCT, @ANYRESHEX, @ANYRES32], 0xb, 0x0, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) shmctl$SHM_LOCK(0x0, 0xb) r2 = gettid() rt_sigtimedwait(&(0x7f0000000100)={[0x3ff]}, 0x0, 0x0, 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000040)=""/140, 0x8c}, {0x0}], 0x2, 0x2fd, 0x4) tkill(r2, 0x7) r4 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x8000) socket$caif_stream(0x25, 0x1, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdir(0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) unshare(0x2c020400) r7 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) lseek(r7, 0x0, 0x1) mount$9p_fd(0x0, &(0x7f0000000100)='./cgroup/../file0\x00', &(0x7f0000000140), 0x2000040, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_fscache}]}}) 8.699159782s ago: executing program 65 (id=27292): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b82, 0x0, @perf_bp={0x0, 0x1}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x6, 0x7, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_mount_image$msdos(&(0x7f0000000340), &(0x7f0000001cc0)='.\x00', 0x1aca4b8, &(0x7f0000000480)=ANY=[@ANYRES16, @ANYRESHEX, @ANYBLOB="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", @ANYRESOCT, @ANYRESHEX, @ANYRES32], 0xb, 0x0, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) shmctl$SHM_LOCK(0x0, 0xb) r2 = gettid() rt_sigtimedwait(&(0x7f0000000100)={[0x3ff]}, 0x0, 0x0, 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000040)=""/140, 0x8c}, {0x0}], 0x2, 0x2fd, 0x4) tkill(r2, 0x7) r4 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x8000) socket$caif_stream(0x25, 0x1, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdir(0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) unshare(0x2c020400) r7 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) lseek(r7, 0x0, 0x1) mount$9p_fd(0x0, &(0x7f0000000100)='./cgroup/../file0\x00', &(0x7f0000000140), 0x2000040, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_fscache}]}}) 1.867325601s ago: executing program 6 (id=27686): semop(0x0, &(0x7f0000000000)=[{0x4, 0x3, 0x1800}], 0x1) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x3, 0x5, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x12) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x2, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800ff800400000000000000080003851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50afdff00000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0xa}, 0x94) 1.866909791s ago: executing program 6 (id=27688): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000001680)=0x1, 0x4) shutdown(r0, 0x1) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x9, @ipv4={'\x00', '\xff\xff', @loopback}, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000140)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x2, @empty, 0xfffffffe}, 0x1c, &(0x7f0000000b40)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1}}], 0x1, 0x20080058) 1.847100513s ago: executing program 6 (id=27691): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x60, r1, 0x1, 0x0, 0x0, {0x3, 0x0, 0x5f00}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0xa, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x60}}, 0x0) 1.783657926s ago: executing program 6 (id=27694): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5, r0}) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet(0x2, 0x80000, 0x98b) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000240)={0x0, @broadcast, 0x4e24, 0x2, 'sh\x00', 0x2, 0x4, 0xf}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x2f, 0xad, 0x8, 0x8, 0x15, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x48, 0x700, 0x2, 0x679}}) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0xa, &(0x7f0000000440)=@raw=[@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x61}, @ldst={0x1, 0x1, 0x6, 0xb, 0xa, 0x20, 0xfffffffffffffffc}], &(0x7f0000000500)='syzkaller\x00', 0x2, 0x6b, &(0x7f0000000540)=""/107, 0x41100, 0x20, '\x00', r4, @fallback=0x2, r5, 0x8, &(0x7f0000000800)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000840)=[{0x2, 0x2, 0x9, 0x7}]}, 0x94) syz_genetlink_get_family_id$nfc(&(0x7f0000000280), r2) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r6 = timerfd_create(0x9, 0x0) timerfd_settime(r6, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = syz_io_uring_setup(0xbdc, &(0x7f00000000c0)={0x0, 0x5edc, 0x1000, 0x1, 0x40000333}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x8, 0x0, @fd=r6, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000900)=""/259, 0x103}, {0x0}], 0x2}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000b80)={[{@errors_remount}, {@nobh}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@dioread_lock}]}, 0x3, 0x439, &(0x7f0000002380)="$eJzs3MtvG0UYAPBv105LXyRU5dEHECiIikfSpKX0wAUEEgeQkOBQjiFJq1K3QU2QaFVBQKgcUSXuiCMSfwEnuCDghMQV7qhShXJp4WS09m5iO3aauE5c8O8nrTuzO9bM592xZ3a6CWBgjWYvScTuiPg9Iobr2eYCo/V/bi1dmf576cp0EtXqW38ltXI3l65MF0WL9+0qMuWI9LMkDrapd/7S5XNTlcrsxTw/vnD+/fH5S5efO3t+6szsmdkLkydPHj828cKJyed7EmcW180DH80d2v/aO9femD517d2fv02K+Fvi6JHRtQ4+Wa32uLr+2tOQTsp9bAgbUqp30xiq9f/hKMXKyRuOVz/ta+OATVWtVqsPdD68WAX+x5LodwuA/ih+6LP5b7Ft0dDjrnDjpfoEKIv7Vr7Vj5QjzcsMtcxve2k0Ik4t/vNVtsXm3IcAAGjyfTb+ebbd+C+NxvtC9+ZrKCMRcV9E7I2IExGxLyLuj6iVfTAiHtpg/a2LJKvHP+n1rgJbp2z892K+ttU8/itGfzFSynN7avEPJafPVmaP5p/JkRjanuUn1qjjh1d++6LTscbxX7Zl9Rdjwbwd18vbm98zM7UwdScxN7rxScSBcrv4k+WVgCQi9kfEgS7rOPv0N4c6Hbt9/GvowTpT9euIp+rnfzFa4i8ka69Pjt8Tldmj48VVsdovv159s1P9dxR/D2Tnf2fb6385/pGkcb12fuN1XP3j845zmm6v/23J2037PpxaWLg4EbEteb3e6JX9pYuTLeUmV8pn8R853L7/742VT+JgRGQX8cMR8UhEPJq3/bGIeDwiDq8R/08vP/Fe9/Fvriz+mQ2d/5XEtmjd0z5ROvfjd02Vjmwk/uz8H6+ljuR71vP9t552dXc1AwAAwH9PGhG7I0nHltNpOjZW/z/8+2JnWpmbX3jm9NwHF2bqzwiMxFBa3OkabrgfOpFP64v8ZEv+WH7f+MvSjlp+bHquMtPv4GHA7erQ/zN/lvrdOmDTdbeOlva8HcDW87wmDC79HwaX/g+Dq03/39GPdgBbr93v/8d9aAew9coNr/nfBAMGhPk/DC79HwaX/g8DaX5H3P4heQmJVYlI74pmSGxSot/fTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAL3xbwAAAP//1Xjmag==") r10 = open(&(0x7f00000003c0)='./file2\x00', 0x842200, 0x8) ioctl$PPPIOCGL2TPSTATS(r10, 0x80487436, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000000), &(0x7f00000001c0)=ANY=[], 0xfe37, 0x0) lremovexattr(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=@known='user.syz\x00') io_uring_enter(r7, 0x847ba, 0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0xfff8000000000001, 0xffffffffffffffff, 0x1) sendmmsg$unix(r11, &(0x7f00000bd000), 0x318, 0x0) ioctl$int_in(r11, 0x5452, &(0x7f00000021c0)=0x95) 1.71083357s ago: executing program 5 (id=27698): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}, {@in6=@remote, 0x4d5, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x1100}}]}, 0x13c}}, 0x0) 1.71060721s ago: executing program 5 (id=27699): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="5766b1020affff20c311df259149e300", 0x10) (async) listen(r0, 0x0) (async) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)={0x14, 0x0, 0x800, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000000) (async) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)={0x20, 0x1a, 0x15, 0x0, 0xfeffffff, "", [@typed={0xa, 0x0, 0x0, 0x0, @str='\x02\x02\x00\x00\x00\x00'}, @nested={0x4, 0x10}]}, 0x20}], 0x1}, 0x800) (async) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc010000190001000000000002000000e0000001000000000000000000000000ac1414bb00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000440105007f000001000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000e50000bb000000003c00000000000000fe8000000000000000000000000000000000000000000000000000004a000000800000007f000001000000000000000000000000000000006c00000000000000e0000001000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000001000000006c"], 0x1fc}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010026bd7000fcdbdf250200000008000100", @ANYRES32=r4], 0x1c}}, 0x840) (async) write$nci(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="61050208030480"], 0x61) (async) r7 = syz_io_uring_setup(0x239, &(0x7f0000000680)={0x0, 0x405e5, 0x10100, 0x2, 0x2e0}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) (async) socketpair(0x28, 0x800, 0x28, &(0x7f00000002c0)) r10 = socket$inet(0xa, 0x801, 0x84) connect$inet(r10, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) (async) listen(r10, 0xfffffffd) r11 = accept4(r10, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r11, 0x84, 0xb, 0x0, 0x0) (async) syz_io_uring_submit(r8, r9, &(0x7f0000000500)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x31a0}}) (async) io_uring_enter(r7, 0x663e, 0x0, 0x2, 0x0, 0x0) (async) shutdown(r0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r12, 0x5, 0xe, 0x0, &(0x7f00000001c0)="0101000871a7832e6b7303c3cd59", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x50) 1.695289141s ago: executing program 5 (id=27701): fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) writev(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) sendmsg$can_raw(r1, &(0x7f0000000280)={&(0x7f0000000040), 0x10, &(0x7f0000000140)={&(0x7f0000000300)=@canfd={{0x0, 0x0, 0x1}, 0x25, 0x3, 0x0, 0x0, "60d66442c383b99ff8958c81f27a361bbd10d1bf5b654e6534620a6356df58324595c1a2161da843ee2fdf1707b95fa88dc9627cd4d9e73e95020997942fbf64"}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4000095) sendmsg$can_raw(r1, 0x0, 0x8005) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x58) shutdown(r0, 0x1) r2 = io_uring_setup(0x1133, &(0x7f0000000080)={0x0, 0x0, 0x80, 0x1, 0x119}) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r2, 0x11, &(0x7f00000002c0), 0x2) r3 = syz_io_uring_setup(0x110, &(0x7f00000003c0)={0x0, 0x0, 0x1, 0x0, 0x10}, &(0x7f0000000380)=0x0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r3, 0x3f70, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6, 0xfd, 0xc, 0x43}]}, 0x10) listen(r0, 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x24040014, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r6 = fcntl$dupfd(r5, 0x406, r0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f0000000280)="dc8daf8d760c", 0x6) getsockopt$inet_tcp_buf(r7, 0x6, 0x21, 0x0, &(0x7f0000000580)) sendmsg$ETHTOOL_MSG_WOL_GET(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000001600)=ANY=[], 0x2c}}, 0x0) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r8, 0xffffffffffffffff, 0x100000000000000) 1.671105022s ago: executing program 5 (id=27702): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[], 0x134}, 0x1, 0x0, 0x0, 0x2004a800}, 0x24000000) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x5a476f3fcb0229da}, 0xc045) syz_genetlink_get_family_id$nl80211(0x0, r1) 826.030932ms ago: executing program 6 (id=27722): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x21}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="84400100000001000c002b80", @ANYRES32=r0, @ANYBLOB="08001b"], 0x34}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 789.568464ms ago: executing program 6 (id=27725): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="620ac4ff0000000271109d00000000009500000000000000061a59e5086d813a63ba8a6a0b1a75cfba3223e003f19c0a31af538487ff45e07820802a2ba0a82732885a6f82e6f0aefb1bdff5c31d4333cd22cc3c20ed9a233e3ab1e2f8b5b34c195d45c347e6c02c244fd153ff482c3b8cc1960b31be9ded032604000000000000000b1448c638e606867b9b3c20562cc5"], &(0x7f0000000480)='GPL\x00'}, 0x94) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r1, 0x29, 0x4d, &(0x7f0000000040)=0x7, 0x4) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000000)=0x9, 0x4) syz_emit_ethernet(0x36, &(0x7f00000003c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @multicast, @void, {@ipv6={0x86dd, @generic={0xc, 0x6, '\x00', 0x0, 0xa5, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote}}}}, 0x0) recvmmsg(r1, &(0x7f00000063c0)=[{{0x0, 0x0, 0x0}, 0x9}], 0x1, 0x10102, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), r0) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="33032b80000000dbdf2505"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x8080) syz_genetlink_get_family_id$nfc(&(0x7f0000000300), r0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r4, 0x0, 0x62, 0x0, &(0x7f0000d23000)) ptrace(0x10, r3) ptrace$setregs(0x1a, r3, 0xfbfffffffffffff8, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x9, 0x5, 0x0, 0x2, 0x0, 0xf5b, 0x30811, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x1000, 0x6}, 0x18c85, 0xfffffffe, 0x8000, 0x4, 0x3, 0x5, 0x0, 0x0, 0x7, 0x0, 0x87fffffff}, r3, 0xfffffffffffffffb, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40062) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_SETINFO(r5, 0xffffffff80000600, r6, &(0x7f0000000140)={0x7, 0x2, 0x1}) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000000206010500000000000000000500000a0900020073797a32000000e2"], 0x20}, 0x1, 0x0, 0x0, 0x20000855}, 0x0) 747.025477ms ago: executing program 5 (id=27729): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) sendmsg$NFC_CMD_START_POLL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010023dbdf2500", @ANYRES32=0x0, @ANYBLOB="08000e0046000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004c084}, 0x0) 689.75028ms ago: executing program 5 (id=27730): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[], 0x134}, 0x1, 0x0, 0x0, 0x2004a800}, 0x24000000) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x5a476f3fcb0229da}, 0xc045) 649.440112ms ago: executing program 9 (id=27735): r0 = socket(0x10, 0x3, 0x0) setsockopt(0xffffffffffffffff, 0x84, 0x81, 0x0, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) socket$pptp(0x18, 0x1, 0x2) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x7fff, 0x0, 0x0, 0x2}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x14, 0x12, 0xa01, 0x0, 0x0, {0x14}}, 0x14}}, 0x0) 615.830184ms ago: executing program 9 (id=27737): r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = socket$xdp(0x2c, 0x3, 0x0) (async) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0xf, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x1}, @in6={0xa, 0x4e24, 0x20f, @mcast1, 0xc}, @in6={0xa, 0x4e22, 0x2, @mcast1, 0x81}, @in={0x2, 0x4e23, @local}], 0x74) (async) r6 = socket$rxrpc(0x21, 0x2, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000012c0)={r4, 0x58, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r6, &(0x7f0000001580)={&(0x7f0000000140)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000001200)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="6a13a1778f505106c07ba8756931149e45f1230b85821a4241b53d4222175f2ae87da8c2220a4c0a289296eb31b539916012714d58115a10336cb67729f4b1c3c3eebc748393c092a3f50328622d2b98304e2ebd8c19f9b69ef8a53fd1dca0cb1211d0d50a1387", 0x67}], 0x2, &(0x7f0000001300)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xd}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffa}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast1, @multicast2}}}, @ip_retopts={{0x128, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x34, 0x51, 0x3, 0x1, [{@empty, 0x5}, {@empty, 0x3}, {@private=0xa010101, 0x8000}, {@multicast1, 0x5}, {@private=0xa010100, 0x2}, {@rand_addr=0x64010101, 0x9}]}, @rr={0x7, 0x27, 0xb5, [@rand_addr=0x64010102, @empty, @empty, @multicast2, @loopback, @local, @private=0xa010100, @multicast1, @dev={0xac, 0x14, 0x14, 0x37}]}, @cipso={0x86, 0x2e, 0x2, [{0x1, 0x8, "c7fd7926b4e3"}, {0x5, 0xf, "689681dd69b24a29ce8d2d5ea6"}, {0x5, 0x11, "d75916786b6ada40d998efa6333a4e"}]}, @cipso={0x86, 0x6, 0x1}, @generic={0x94, 0x2}, @end, @cipso={0x86, 0x64, 0x2, [{0x0, 0x2}, {0x7, 0x8, "9b6fd51db34c"}, {0x0, 0x3, "8e"}, {0x1, 0xe, "9640d9807f372067888fc265"}, {0x5, 0xf, "c492fbf1f9573ccc83ec5c9a7b"}, {0x5, 0xa, "914f62fef4b9f6fd"}, {0x1, 0x11, "6e722a2ac507c26abc6cfc1f64f03d"}, {0x7, 0xd, "247a9de384381c87cb9d2a"}, {0x1, 0xc, "1b2100011d5f8235224c"}]}, @rr={0x7, 0x1f, 0x89, [@broadcast, @dev={0xac, 0x14, 0x14, 0x1c}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @local, @rand_addr=0x64010102]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xc530}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @dev={0xac, 0x14, 0x14, 0x24}}}}, @ip_retopts={{0xa0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x12, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@empty, 0x2}, {@local, 0x2}, {@private=0xa010102, 0x5aa7019a}, {@multicast2, 0x122}]}, @generic={0x82, 0x12, "76c714dd2b6cc1a20c8ab417184b86e5"}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x5, [0x5, 0xfffffffb, 0xffffffff, 0xb, 0x0, 0x6, 0x8001, 0x3]}, @generic={0x94, 0xf, "1193bcec35fb8c24e0640068a9"}, @timestamp_addr={0x44, 0x1c, 0x68, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0x34}, 0x9}, {@loopback, 0x5}, {@multicast2, 0xf}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x268}, 0x20000054) sendmsg$inet(r0, &(0x7f00000019c0)={&(0x7f00000015c0)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000001740)=[{&(0x7f0000001600)="7745daf416bdc83516b421aa28b0b13c18969e62915af59a", 0x18}, {&(0x7f0000001640)="fbaef26a49ceac239cc44871fa3bcacc93b6b3766aebcd25c57491544e70b0bf5a28eac6543a5f0d45400a670b3507b2ca426c9e386c921388d4e7485c297f73d4364674047b874e497c73ac492b5457b482a445a92d9950afef45e829c3bfbfe1049e9ece271ee511f5377694c934bf", 0x70}, {&(0x7f00000016c0)="bec6297652b9629660f461845941", 0xe}, {&(0x7f0000001700)="9423194775f1aead3fe019ab647708706b8a703dee5422d0c421e3a367af2cd740ce211d6aaf21750bc8368f3a81df60a90e6aca4a2555d52ca1", 0x3a}], 0x4, &(0x7f0000001780)=[@ip_ttl={{0x14, 0x0, 0x2, 0xedd4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @empty, @broadcast}}}, @ip_retopts={{0x194, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0x3e, 0x3, 0xc, [{@private=0xa010102, 0x8aa}, {@local, 0x9}, {@multicast2, 0x9}, {@local, 0x5}, {@local, 0x1f21}, {@rand_addr=0xc, 0x207f}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@remote, 0x8000}]}, @lsrr={0x83, 0x13, 0x15, [@remote, @rand_addr=0x64010102, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @cipso={0x86, 0x56, 0xffffffffffffffff, [{0x0, 0x6, "a26699d3"}, {0x6, 0x8, "49e27a272c51"}, {0x0, 0xc, "452742daed05d5ec2085"}, {0x1, 0x2}, {0x7, 0x11, "6c9f52600aeb2d25a05d6f504b6bce"}, {0x5, 0x12, "962eed1f0f376d8b7cd72c3d7a5d3639"}, {0x7, 0x11, "6221872de8ac377fbf55a04e6e9fe0"}]}, @cipso={0x86, 0x48, 0xfffffffffffffffe, [{0x7, 0x3, 'o'}, {0x6, 0x8, "cf6d58d88b05"}, {0x0, 0xb, "72a579d23f69d8cde3"}, {0x5, 0xb, "5408bd318167a63bb9"}, {0x5, 0x10, "18e865eaf1d13e59e980c6075843"}, {0x5, 0x7, "38a4000e1b"}, {0x2, 0x6, "c5b825d8"}, {0x0, 0x4, "9628"}]}, @cipso={0x86, 0x6d, 0x1, [{0x2, 0x12, "158be0092096912cd558dc3880c0eeb4"}, {0x6, 0x10, "5e727e8f522981a019d185a1eaea"}, {0x5, 0x10, "d450171894b8ddbd49bc64ad3278"}, {0x2, 0x12, "e9d3645ae55db654ece5b4550ee5e0a4"}, {0x1, 0xe, "a79aa4a3205167c36bbcee1d"}, {0x2, 0x11, "a27b1b4bd952083d2d1c9fb16296ec"}, {0x1, 0x4, "ae62"}]}, @ssrr={0x89, 0x1f, 0xed, [@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @private=0xa010102, @multicast1, @dev={0xac, 0x14, 0x14, 0xb}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x230}, 0x4040080) (async) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000001a40), r0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000001b00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x1c, r8, 0x100, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40044000}, 0x4800) (async) io_setup(0x1, &(0x7f0000001b40)=0x0) (async) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000001e40)={r2, 0x3, 0xfffffffffffffff9}) io_submit(r9, 0x3, &(0x7f0000001ec0)=[&(0x7f0000001c40)={0x0, 0x0, 0x0, 0x16, 0x1, r4, &(0x7f0000001b80)="bf47e6affa14a4833dd69c4080cb9f87965a0a4a91a54e756f08c38b07547a1425f5e6e101758985eb80c26c040411d492aaa2d2599c550224fa46096c0d662c2bbfa050263673368ec1939f4a5fd1249282da68e0d9f40c5bdfe02a17071a33aae4745a8edd1f229ac854926fb45150474737089dff5215b1f1ea4e068ecab20808e7138932ee5c5997596d82b3c73b26c11b8989916fbeba12bacba03c136e78980a86efd1", 0xa6, 0x100}, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x7, 0x5000, r5, &(0x7f0000001c80)="e833c86e2bbef531d456f1b69e550bdbe05dc8b95c80945ba27f59f230dc8986381bcbfb2bd84f4e19cc216e70d755ad257af0b2da3e340ec5cc020ae490a7fd006300a5a49c04e6f958d84cbc7ce44eb4f9bc40f458f1", 0x57, 0x3, 0x0, 0x5, r4}, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x2, 0x200, r5, &(0x7f0000001d40)="7a3a522557dfd8d995e12c6cd6b277884cc8b8c951fb6d0a63e1606f3cec7d3e02c52ed2b1bf357364e904ea8f3ea7d197b3c0f8696951b14ad66ecb786ee4b49bde10a3f1a35bc97828767b4e5ca0e2ed9086fa79693d7166f35e5d3fd2ae6117716ac43c46d1955abfa3a1ef28c1a9b163fe1048a0ca5818bf5d80ba64433324dfb979277867f373a01416032d987b5913deb0c9fdb72a8b8de454efb6c6071f775a5400c7b4d18b8f93778867afa60198061efbb098d1a5d8fe92c57d952257ef0979343607534ba230df62d16b1f5cba815978701e28a4fd74596e12db55208a0fb02debd5344d77a3", 0xeb, 0x7, 0x0, 0x3, r10}]) connect$caif(r0, &(0x7f0000001f00)=@dgm={0x25, 0x8, 0x3}, 0x18) (async) pipe2$9p(&(0x7f0000001fc0)={0xffffffffffffffff}, 0x0) r12 = socket$rxrpc(0x21, 0x2, 0x2) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002000)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private1}}, &(0x7f0000002100)=0xe8) mount$9p_fd(0x0, &(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80), 0x1020, &(0x7f0000002140)={'trans=fd,', {'rfdno', 0x3d, r11}, 0x2c, {'wfdno', 0x3d, r12}, 0x2c, {[{@uname={'uname', 0x3d, '\xff\xff'}}, {@afid={'afid', 0x3d, 0x35f8}}, {@dfltuid={'dfltuid', 0x3d, r13}}, {@afid={'afid', 0x3d, 0x5}}, {@posixacl}, {@access_user}, {@mmap}, {@posixacl}], [{@appraise_type}, {@obj_user={'obj_user', 0x3d, '\'['}}, {@obj_user={'obj_user', 0x3d, '/selinux/mls\x00'}}, {@fsname={'fsname', 0x3d, '\xff\xff'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) r14 = msgget$private(0x0, 0x0) (async) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() (async) stat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000002400)={'\x00', 0x7, 0x0, 0xfff, 0x3, 0x1, 0xffffffffffffffff}) msgctl$IPC_SET(r14, 0x1, &(0x7f0000002480)={{0x1, r15, r16, r13, r17, 0x130, 0x6}, 0x0, 0x0, 0x0, 0x80000000, 0x2, 0x8000000000000001, 0x8000000000000000, 0x4, 0x2, 0x2, 0x0, r18}) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000025c0)={'macsec0\x00', &(0x7f0000002500)=@ethtool_regs={0x4, 0x2, 0x80, "315cb2238aedc555e6fd7829cd2b035a204062ed018e94eed44832c2cd1f37348688c62a5fb9f77286207d6676afec2c82e427c4e957f7c5816c7c96f9473d54248a42b5b2e59f48a2ec0edbb016aeea4638197ce5a1bdb9304ab8fd597586a70a20fd0b03265cdac0d92c4f2324bbd0c773605dd453aacdcb1ec6b0d12adfe4"}}) (async) fsetxattr$trusted_overlay_redirect(r10, &(0x7f0000002600), &(0x7f0000002640)='./file0\x00', 0x8, 0x2) (async) pipe2$9p(&(0x7f0000002680), 0x84000) (async) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000002800)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x1c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 561.258587ms ago: executing program 7 (id=27738): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x3, @perf_bp={0x0, 0x6}, 0x24, 0x2, 0xfff, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1900403, &(0x7f00000002c0)={[{@noload}], [{@fsmagic={'fsmagic', 0x3d, 0x80008000}}]}, 0x0, 0x5e5, &(0x7f0000000ac0)="$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") faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x1) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r4, {0xffff}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@gettfilter={0x5c, 0x2e, 0x8, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0x2, 0xfff2}, {0xc, 0xf}, {0xe, 0x8}}, [{0x8, 0xb, 0x8}, {0x8, 0xb, 0x3ff}, {0x8, 0xb, 0x8001}, {0x8, 0xb, 0x80}, {0x8, 0xb, 0x81ff}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xfef3, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6001010000641100fe8000000000000000000000000000bbfe8000000000000000000000000000aa4e200e22"], 0x0) 560.734257ms ago: executing program 3 (id=27740): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x8, 0x3, 0x288, 0x158, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1f0, 0xffffff7a, 0xffffffff, 0x1f0, 0xffffffff, 0x7fffffe, 0x0, {[{{@uncond, 0x6, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "007f0100cbd047da9ca965f96ad5801f0514d363ee84bb895919d9490f6785fba3c4a44f1e25ecefef2a2d6054f5260ece5ce1a56a5ef73be11d65bfe8c37674024c183ebacdf741cea92ded3a9ca54de15dd9ec8ef62f9e000000000100000000ffffff7f00", 0x83, 0x3, {0x4}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x9, 0x38, 0x1d}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0xff000000, 'team_slave_0\x00', 'ip6gre0\x00', {0xff}, {}, 0x6, 0x3}, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x4}, {0x4, 0x5, 0x6}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) 527.91761ms ago: executing program 9 (id=27741): timer_create(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x4e21, 0xadd0, @mcast1={0xff, 0x7}, 0x10000}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x3}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) preadv(r2, &(0x7f0000000380)=[{&(0x7f0000000580)=""/128, 0x80}], 0x1, 0xaf, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010029bd7000ffdbdf2500000000", @ANYRES32=r5, @ANYBLOB="100804002010000024001280110001006272696467655f736c618c65000000000c000580050019"], 0x44}, 0x1, 0x0, 0x0, 0x404c1}, 0x40040d4) timer_create(0x7, 0x0, &(0x7f0000000080)) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/power/image_size', 0x129a82, 0x0) sendfile(r6, r6, 0x0, 0x7) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r6, &(0x7f00000000c0)={0x40002008}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x24044040) 527.688059ms ago: executing program 3 (id=27742): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000000000d07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xf, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000280)=0x3, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x21}, 0x94) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, 0x0, 0x25, 0x2, @void}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) 527.261269ms ago: executing program 3 (id=27743): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) (async) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) (async) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r1, @ANYBLOB="0000000002000000b70500000800000085000000c900000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x1002, &(0x7f00000014c0)=""/4098}, 0x94) 499.489051ms ago: executing program 9 (id=27744): r0 = socket$inet6(0xa, 0x2, 0x3a) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000016c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x840e, &(0x7f0000001080)={[{@discard}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@bsdgroups}, {@quota}]}, 0x3, 0x43a, &(0x7f0000001100)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, 0x0) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c, &(0x7f0000000b40)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="24000000000000002900000032000000fc020000000000000000000000000001cd"], 0x28}}], 0x1, 0x4c0c0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtaction={0x134, 0x30, 0x10b, 0x0, 0x25dfdbff, {}, [{0x120, 0x1, [@m_connmark={0x11c, 0x7, 0x0, 0x0, {{0xd}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xc, 0x10000000, 0x5, 0x5}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x4, 0x2, 0x6, 0xa}, 0xe}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9e57, 0x5, 0x7, 0x80000000, 0xed9}, 0xd87}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1ff, 0x10, 0x7, 0x8, 0x324a}, 0xffff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0xfffffffa, 0x7, 0x3, 0x1}, 0x2e}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x6, 0x0, 0x5, 0x48}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x1, 0x8, 0x7, 0x8001}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x8, 0x7, 0x3, 0x4e7fc3ac}, 0x6}}]}, {0x9, 0x6, "8d4fae6184"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x8881}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a48000000060a010400000000000000000a0000040900010073797a31000000000900020073797a32000001800d00010073796e70726f78790000000004000280"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), r2) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)={0x8c, r3, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xac7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400c140}, 0x4008001) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000101401"], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x24001850) r5 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) recvmmsg(r5, &(0x7f0000008340)=[{{0x0, 0x0, 0x0}, 0xff}], 0x1, 0x40002170, 0x0) r6 = syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000440)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@max_dir_size_kb}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@prjquota}, {@usrquota}, {@oldalloc}, {@errors_continue}]}, 0x3, 0x45f, &(0x7f0000000ac0)="$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") r7 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r7, &(0x7f0000000140)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x6, 0x3a, '/dev:ptp0\x00', 0x3a, '/dev/ptp0\x00', 0x3a, './file1'}, 0x3b) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r9 = syz_open_dev$loop(&(0x7f0000000240), 0xfffffffffffffbff, 0x100) ioctl$BLKGETSIZE64(r9, 0x80081272, &(0x7f0000000380)) r10 = socket$kcm(0x2, 0xa, 0x2) renameat2(r6, &(0x7f0000000080)='./file0\x00', r6, &(0x7f0000000140)='./file0\x00', 0x1) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4c00000010000304000020000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x4c}, 0x1, 0xba01}, 0x0) socket$packet(0x11, 0x3, 0x300) write$tun(r8, &(0x7f0000000840)=ANY=[@ANYBLOB="000086dd0001090004000000a60c6eec00be00442ffffe8000000000000000000000000000aaff020000000000000000000000000001042088be000000030c000800050086dd88a888be000000021609660501000000000088a8080022eb00020000200cf0080200000000000002000494030800655800000002b20d235633f7efeedde71fbfde844ef80da6b5b3951f0efda06b728db32440c242f9beeb13899176e80d67e79ea82d0dff7553685eefd659da33ca9414899ca43728e938a7a53a783c02201ed6f9ca1559ce7b3baf38feeea5c917171c95b47efe2d42eaa67d9e3f6f2a21766a1ccfe4d515d4e7da29f44720ca186e78beeab88b5120831974890e63030ad1210ceb4555484b913ca6aadbfde271b3e01bd9210074e7a0f38f9913afcfda448e340badd2a142b653ffe11b4ea86b12d43195c057f7528577dc082071d4e6289023abc0579f673ed386bdf0b4e7677dcf94e0dbb6a65ea1953e12cecf4f5d6d74616fe1b885d2c9a8aad764fc25274c216c7f8b7ab058ab9a"], 0x7a) syz_genetlink_get_family_id$wireguard(&(0x7f00000005c0), r2) socket$inet6_mptcp(0xa, 0x1, 0x106) 499.085031ms ago: executing program 7 (id=27745): futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) 438.911084ms ago: executing program 7 (id=27746): ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000600)=0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000001680)=0x1, 0x4) shutdown(0xffffffffffffffff, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x9, @ipv4={'\x00', '\xff\xff', @loopback}, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x2, @empty, 0xfffffffe}, 0x1c, &(0x7f0000000b40)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1}}], 0x1, 0x20080058) 438.578344ms ago: executing program 7 (id=27747): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000100), 0x0, 0x2}, 0x20) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000086dd00001100000000000fc060ec97000f982c00fe8000000000000000000000000000aaff02000000000000000000000000000189"], 0xfce) 381.718138ms ago: executing program 3 (id=27748): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000090601020000ffff00000000020000000900020073797a31000000000500010007000000280007800c00018020000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 369.283269ms ago: executing program 3 (id=27749): sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x248}, 0x1, 0x0, 0x0, 0x4010}, 0x800) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) (async) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000000)=""/102, 0x365}, {&(0x7f0000000280)=""/76, 0x14c}, {&(0x7f0000000fc0)=""/4083, 0x197}, {&(0x7f00000006c0)=""/107, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/76, 0x188}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/7, 0x1e0}], 0x21, &(0x7f0000000600)=""/191, 0x41, 0xa1}}], 0x4000000000003b4, 0x40010360, &(0x7f0000003700)={0x77359400}) (async) sendfile(r0, r0, 0x0, 0xfffffffffffffffa) 296.102213ms ago: executing program 3 (id=27750): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0xffffffffffffff8d, &(0x7f0000000080)={0x0, 0xb8}, 0x1, 0x0, 0x0, 0x48040}, 0x114) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x3, 0x0, {0x2, 0x20, 0xa, 0xff, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x480d0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x9}}}, 0x24}}, 0x0) (fail_nth: 8) 295.840193ms ago: executing program 9 (id=27751): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000640)=ANY=[@ANYBLOB="c400000019000100000000000000000020010030000000000000000000000000ff02000000000000000000000000000100000000000000000a000000", @ANYRES32], 0xc4}}, 0x0) 292.559073ms ago: executing program 7 (id=27752): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000d80)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@multicast2, 0x4d2, 0x33}, @in=@broadcast, {0x0, 0x0, 0x0, 0x40000, 0x2}, {}, {0x0, 0x1}, 0x70bd29, 0x0, 0xa}}}, 0xf8}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000800)=@can_newroute={0x34, 0x18, 0x1, 0x70bd27, 0x25dfdbfd, {0x1d, 0x1, 0x4}, [@CGW_CS_XOR={0x8, 0x5, {0x5, 0x1, 0x7, 0x2}}, @CGW_MOD_SET={0x15, 0x4, {{{0x2, 0x1, 0x1}, 0x6, 0x1, 0x0, 0x0, "b3bfbc44d6e0d6b2"}, 0x2}}]}, 0x34}}, 0x240440c8) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@ipv4={'\x00', '\xff\xff', @empty}, 0x0, 0x32}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x6}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x72}}}, 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 21.294669ms ago: executing program 9 (id=27753): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc097, 0x2, @perf_bp={0x0, 0x8}, 0x8216, 0x6, 0x11000, 0x0, 0x9484, 0x1, 0x400}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3f, 0xc488}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_MULTI_BOOLOPT={0xc, 0x2e, {0x3, 0x3}}]}}}]}, 0x40}, 0x1, 0x0, 0xa1}, 0x0) 0s ago: executing program 7 (id=27754): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x14, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000004000000000000000300000000000000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000200850000007000000095"], &(0x7f0000000080)='GPL\x00', 0xea2, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x10, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x42500, 0x0) r3 = dup(r2) ioctl$GIO_UNISCRNMAP(r3, 0x43403d0e, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) sendmsg$nl_route_sched(r4, 0x0, 0x0) readv(r4, &(0x7f0000002a40)=[{0x0}, {0x0}, {&(0x7f0000002580)=""/228, 0xe4}, {&(0x7f0000002680)=""/222, 0xde}, {0x0}, {&(0x7f0000002880)=""/135, 0x87}], 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x0) 0s ago: executing program 9 (id=27755): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="380000000206010800000040000000000000000014000780080011400000005205001500dd000000050001000600000005000500"], 0x38}}, 0x0) (async) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="840000000002010400000000000000000a00000004000180300003802c00018014000300fc00000000000000000000100000000014004400fe800000001f610000000000000000bb3c0002800c00028005000100000000002c00018014000300fc02000000000000000000000000000014"], 0x84}}, 0x0) (async, rerun: 32) r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) (rerun: 32) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='!\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000228bd7000fedbdf2518000000080001007063690011000200303030303a30303a31302e3000000000080003"], 0x60}, 0x1, 0x0, 0x0, 0x200400c0}, 0x20044014) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) vmsplice(r1, &(0x7f00000004c0)=[{&(0x7f00000008c0)="ff", 0x1}], 0x1, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'net_cls'}, {0x2d, 'cpuacct'}]}, 0x21) r2 = socket(0x10, 0x803, 0x0) fstat(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x40020, &(0x7f0000000540)={[{@quota}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x37, 0x25, 0x38]}}, {@grpquota_inode_hardlimit={'grpquota_inode_hardlimit', 0x3d, [0x38, 0x74]}}, {@usrquota_block_hardlimit={'usrquota_block_hardlimit', 0x3d, [0x78, 0x35, 0xec, 0x2d, 0x70, 0x32]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x31]}}, {@mode={'mode', 0x3d, 0x3}}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net_cls'}}, {@pcr={'pcr', 0x3d, 0x15}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r3}}, {@dont_hash}]}) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x9) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000000010003b0e2a1a86eb2636037f00000000", @ANYRES32=r4, @ANYBLOB="0200000000008000800012000800010076746936740002"], 0xa0}}, 0x0) kernel console output (not intermixed with test programs): do_syscall_64+0xc0/0x2a0 [ 1489.022706][ T8839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1489.022730][ T8839] RIP: 0033:0x7ff895beaeb9 [ 1489.022748][ T8839] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1489.022799][ T8839] RSP: 002b:00007ff894647028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1489.022826][ T8839] RAX: ffffffffffffffda RBX: 00007ff895e65fa0 RCX: 00007ff895beaeb9 [ 1489.022902][ T8839] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000003 [ 1489.022916][ T8839] RBP: 00007ff894647090 R08: 0000000000000000 R09: 0000000000000000 [ 1489.022931][ T8839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1489.023019][ T8839] R13: 00007ff895e66038 R14: 00007ff895e65fa0 R15: 00007ffc024d79f8 [ 1489.023043][ T8839] [ 1489.323108][ T8843] netlink: 32 bytes leftover after parsing attributes in process `syz.5.27055'. [ 1489.393092][ T8877] netlink: 24 bytes leftover after parsing attributes in process `syz.5.27061'. [ 1489.559248][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1162.tmp-b7:1' failed: Read-only file system [ 1489.582767][ T8902] team0 (unregistering): Failed to send port change of device team_slave_0 via netlink (err -105) [ 1489.608207][ T8902] team0 (unregistering): Port device team_slave_0 removed [ 1489.609601][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1162.tmp-b7:1' failed: Read-only file system [ 1489.628896][ T8902] team0 (unregistering): Failed to send options change via netlink (err -105) [ 1489.650216][ T8902] team0 (unregistering): Failed to send port change of device team_slave_1 via netlink (err -105) [ 1489.661482][ T8902] team0 (unregistering): Port device team_slave_1 removed [ 1489.704280][ T8928] netlink: 'syz.7.27073': attribute type 21 has an invalid length. [ 1489.729436][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1162.tmp-b7:1' failed: Read-only file system [ 1489.773883][ T8938] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1489.891184][ T8957] netlink: 24 bytes leftover after parsing attributes in process `syz.1.27079'. [ 1489.891695][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1162.tmp-b7:1' failed: Read-only file system [ 1489.947245][ T8965] bond3: entered promiscuous mode [ 1489.955933][ T8967] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1489.982946][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1162.tmp-b7:1' failed: Read-only file system [ 1489.983285][ T9006] loop1: detected capacity change from 0 to 512 [ 1490.011373][ T9006] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 1490.022681][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1162.tmp-b7:1' failed: Read-only file system [ 1490.034360][ T9006] EXT4-fs error (device loop1): ext4_orphan_get:1391: inode #13: comm syz.1.27083: iget: bad i_size value: 12154757448730 [ 1490.042815][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-label/syzkaller.tmp-b7:1' failed: Read-only file system [ 1490.059143][ T9006] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.27083: couldn't read orphan inode 13 (err -117) [ 1490.073558][ T9006] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1490.091320][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1163.tmp-b7:1' failed: Read-only file system [ 1490.103882][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-label/syzkaller.tmp-b7:1' failed: Read-only file system [ 1490.106040][ T9006] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1490.179628][T30629] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1490.212656][T30810] udevd[30810]: symlink '../../loop1' '/dev/disk/by-diskseq/1163.tmp-b7:1' failed: Read-only file system [ 1490.479623][ T9070] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1490.496635][ T9071] netlink: 12 bytes leftover after parsing attributes in process `syz.1.27089'. [ 1490.505741][ T9071] netlink: 12 bytes leftover after parsing attributes in process `syz.1.27089'. [ 1490.725133][ T9097] loop1: detected capacity change from 0 to 512 [ 1490.732134][ T9095] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1491.152762][ T9124] x_tables: duplicate underflow at hook 3 [ 1491.183171][ T9126] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1491.304667][ T9138] FAULT_INJECTION: forcing a failure. [ 1491.304667][ T9138] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.317419][ T9138] CPU: 0 UID: 0 PID: 9138 Comm: syz.7.27112 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1491.317450][ T9138] Tainted: [W]=WARN [ 1491.317456][ T9138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1491.317466][ T9138] Call Trace: [ 1491.317471][ T9138] [ 1491.317479][ T9138] __dump_stack+0x1d/0x30 [ 1491.317506][ T9138] dump_stack_lvl+0x95/0xd0 [ 1491.317530][ T9138] dump_stack+0x15/0x1b [ 1491.317549][ T9138] should_fail_ex+0x263/0x280 [ 1491.317578][ T9138] should_failslab+0x8c/0xb0 [ 1491.317600][ T9138] kmem_cache_alloc_noprof+0x68/0x490 [ 1491.317628][ T9138] ? vm_area_dup+0x33/0x2c0 [ 1491.317657][ T9138] vm_area_dup+0x33/0x2c0 [ 1491.317683][ T9138] __split_vma+0xe9/0x660 [ 1491.317713][ T9138] vms_gather_munmap_vmas+0x17a/0x7b0 [ 1491.317745][ T9138] ? vma_link+0x390/0x400 [ 1491.317765][ T9138] do_vmi_align_munmap+0x1e1/0x400 [ 1491.317810][ T9138] do_vmi_munmap+0x1da/0x220 [ 1491.317828][ T9138] move_vma+0xa1a/0xd40 [ 1491.317870][ T9138] mremap_to+0x3ea/0x440 [ 1491.317896][ T9138] ? check_prep_vma+0x5d5/0x660 [ 1491.317925][ T9138] __se_sys_mremap+0x667/0xb50 [ 1491.317958][ T9138] ? mutex_lock+0x57/0x90 [ 1491.317982][ T9138] ? mutex_unlock+0x4e/0x90 [ 1491.318005][ T9138] ? fput+0x8f/0xc0 [ 1491.318032][ T9138] ? ksys_write+0x194/0x1a0 [ 1491.318055][ T9138] __x64_sys_mremap+0x67/0x80 [ 1491.318081][ T9138] x64_sys_call+0x2944/0x3000 [ 1491.318103][ T9138] do_syscall_64+0xc0/0x2a0 [ 1491.318131][ T9138] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1491.318150][ T9138] RIP: 0033:0x7f6272c5aeb9 [ 1491.318167][ T9138] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1491.318187][ T9138] RSP: 002b:00007f6271696028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 1491.318209][ T9138] RAX: ffffffffffffffda RBX: 00007f6272ed6090 RCX: 00007f6272c5aeb9 [ 1491.318225][ T9138] RDX: 0000000005000000 RSI: 0000000000002000 RDI: 0000200000ff5000 [ 1491.318240][ T9138] RBP: 00007f6271696090 R08: 0000200000ffd000 R09: 0000000000000000 [ 1491.318256][ T9138] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 1491.318270][ T9138] R13: 00007f6272ed6128 R14: 00007f6272ed6090 R15: 00007ffe611649a8 [ 1491.318294][ T9138] [ 1491.502124][ T9142] xt_CONNSECMARK: invalid mode: 0 [ 1491.562314][ T9140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9140 comm=syz.9.27113 [ 1491.847109][ T9161] chnl_net:caif_netlink_parms(): no params data found [ 1491.855070][ T9228] FAULT_INJECTION: forcing a failure. [ 1491.855070][ T9228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1491.868960][ T9228] CPU: 1 UID: 0 PID: 9228 Comm: syz.6.27121 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1491.869046][ T9228] Tainted: [W]=WARN [ 1491.869055][ T9228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1491.869102][ T9228] Call Trace: [ 1491.869108][ T9228] [ 1491.869115][ T9228] __dump_stack+0x1d/0x30 [ 1491.869138][ T9228] dump_stack_lvl+0x95/0xd0 [ 1491.869162][ T9228] dump_stack+0x15/0x1b [ 1491.869184][ T9228] should_fail_ex+0x263/0x280 [ 1491.869264][ T9228] should_fail+0xb/0x20 [ 1491.869295][ T9228] should_fail_usercopy+0x1a/0x20 [ 1491.869358][ T9228] _copy_from_user+0x1c/0xb0 [ 1491.869381][ T9228] ___sys_sendmsg+0xc1/0x1e0 [ 1491.869418][ T9228] __x64_sys_sendmsg+0xd4/0x160 [ 1491.869467][ T9228] x64_sys_call+0x17ba/0x3000 [ 1491.869565][ T9228] do_syscall_64+0xc0/0x2a0 [ 1491.869593][ T9228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1491.869673][ T9228] RIP: 0033:0x7f4a8c5eaeb9 [ 1491.869692][ T9228] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1491.869713][ T9228] RSP: 002b:00007f4a8b047028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1491.869733][ T9228] RAX: ffffffffffffffda RBX: 00007f4a8c865fa0 RCX: 00007f4a8c5eaeb9 [ 1491.869746][ T9228] RDX: 0000000000000802 RSI: 00002000000003c0 RDI: 0000000000000040 [ 1491.869759][ T9228] RBP: 00007f4a8b047090 R08: 0000000000000000 R09: 0000000000000000 [ 1491.869826][ T9228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1491.869840][ T9228] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1491.869865][ T9228] [ 1492.046768][ T9161] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.054521][ T9161] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.062233][ T9161] bridge_slave_0: entered allmulticast mode [ 1492.071081][ T9161] bridge_slave_0: entered promiscuous mode [ 1492.079218][ T9161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.084088][ T9286] usb usb8: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1492.086483][ T9161] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.101902][ T9161] bridge_slave_1: entered allmulticast mode [ 1492.108497][ T9161] bridge_slave_1: entered promiscuous mode [ 1492.163003][ T9161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1492.173586][ T9161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1492.180307][ T4532] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1492.206301][ T9161] team0: Port device team_slave_0 added [ 1492.213073][ T9161] team0: Port device team_slave_1 added [ 1492.237372][ T9161] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1492.244382][ T9161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1492.270327][ T9161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1492.330598][ T9161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1492.337578][ T9161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1492.363605][ T9161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1492.381109][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 1492.381124][ T29] audit: type=1326 audit(2000001978.001:147856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.416277][ T29] audit: type=1326 audit(2000001978.001:147857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.440038][ T29] audit: type=1326 audit(2000001978.001:147858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.463826][ T29] audit: type=1326 audit(2000001978.001:147859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.487517][ T29] audit: type=1326 audit(2000001978.038:147860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.512378][ T29] audit: type=1326 audit(2000001978.038:147861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.536183][ T29] audit: type=1326 audit(2000001978.038:147862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.603982][ T9161] hsr_slave_0: entered promiscuous mode [ 1492.610278][ T9161] hsr_slave_1: entered promiscuous mode [ 1492.616500][ T9161] debugfs: 'hsr0' already exists in 'hsr' [ 1492.616783][ T29] audit: type=1326 audit(2000001978.225:147863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.622336][ T9161] Cannot create hsr debugfs directory [ 1492.652446][ T29] audit: type=1326 audit(2000001978.225:147864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9345 comm="syz.7.27127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1492.679238][T29165] bridge_slave_1: left allmulticast mode [ 1492.684943][T29165] bridge_slave_1: left promiscuous mode [ 1492.690558][T29165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.737686][T28009] SELinux: failure in sel_netif_sid_slow(), invalid network interface (13) [ 1492.746934][T18271] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1492.963052][T29165] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1492.972329][T29165] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1492.981449][T29165] bond0 (unregistering): Released all slaves [ 1493.008942][ T9442] bond1: option primary: mode dependency failed, not supported in mode balance-rr(0) [ 1493.020250][ T9442] bond1 (unregistering): Released all slaves [ 1493.027983][ T29] audit: type=1326 audit(2000001978.609:147865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9488 comm="syz.6.27135" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1493.072566][T29165] tipc: Disabling bearer [ 1493.078886][T29165] tipc: Disabling bearer [ 1493.083849][T29165] tipc: Left network mode [ 1493.096713][T29165] hsr_slave_0: left promiscuous mode [ 1493.103288][T29165] hsr_slave_1: left promiscuous mode [ 1493.109507][T29165] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1493.117252][T29165] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1493.148621][T29165] team0 (unregistering): Port device team_slave_1 removed [ 1493.161777][T29165] team0 (unregistering): Port device team_slave_0 removed [ 1493.219782][ T9563] __nla_validate_parse: 8 callbacks suppressed [ 1493.219801][ T9563] netlink: 12 bytes leftover after parsing attributes in process `syz.5.27138'. [ 1493.260407][ T9592] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1493.339157][ T9605] FAULT_INJECTION: forcing a failure. [ 1493.339157][ T9605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1493.363267][ T9605] CPU: 1 UID: 0 PID: 9605 Comm: syz.5.27141 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1493.363374][ T9605] Tainted: [W]=WARN [ 1493.363383][ T9605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1493.363397][ T9605] Call Trace: [ 1493.363403][ T9605] [ 1493.363410][ T9605] __dump_stack+0x1d/0x30 [ 1493.363436][ T9605] dump_stack_lvl+0x95/0xd0 [ 1493.363460][ T9605] dump_stack+0x15/0x1b [ 1493.363527][ T9605] should_fail_ex+0x263/0x280 [ 1493.363580][ T9605] should_fail+0xb/0x20 [ 1493.363609][ T9605] should_fail_usercopy+0x1a/0x20 [ 1493.363641][ T9605] _copy_from_iter+0xcf/0xea0 [ 1493.363671][ T9605] ? __pfx_anon_pipe_write+0x10/0x10 [ 1493.363695][ T9605] ? mutex_lock+0x4f/0x90 [ 1493.363720][ T9605] copy_page_from_iter+0x178/0x2a0 [ 1493.363742][ T9605] ? anon_pipe_write+0x21/0xb30 [ 1493.363768][ T9605] anon_pipe_write+0x53f/0xb30 [ 1493.363809][ T9605] ? anon_pipe_write+0x21/0xb30 [ 1493.363842][ T9605] ? __pfx_anon_pipe_write+0x10/0x10 [ 1493.363875][ T9605] vfs_write+0x5a6/0x9f0 [ 1493.363899][ T9605] ksys_write+0xdc/0x1a0 [ 1493.363950][ T9605] __x64_sys_write+0x40/0x50 [ 1493.363971][ T9605] x64_sys_call+0x2847/0x3000 [ 1493.363994][ T9605] do_syscall_64+0xc0/0x2a0 [ 1493.364022][ T9605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1493.364114][ T9605] RIP: 0033:0x7ff895bab78e [ 1493.364133][ T9605] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1493.364161][ T9605] RSP: 002b:00007ff894646ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1493.364184][ T9605] RAX: ffffffffffffffda RBX: 00007ff8946476c0 RCX: 00007ff895bab78e [ 1493.364200][ T9605] RDX: 0000000000000029 RSI: 00007ff894646e90 RDI: 0000000000000002 [ 1493.364216][ T9605] RBP: 00007ff894646e90 R08: 0000000000000000 R09: 0000000000000000 [ 1493.364279][ T9605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 1493.364294][ T9605] R13: 00007ff895e34640 R14: 00007ff895e2b4a0 R15: 0000000000000001 [ 1493.364319][ T9605] [ 1493.373048][ T9606] netlink: 12 bytes leftover after parsing attributes in process `syz.9.27142'. [ 1493.489047][ T9634] netlink: 8 bytes leftover after parsing attributes in process `syz.5.27144'. [ 1493.666679][ T9658] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1493.730944][ T9665] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1493.861964][ T9685] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1493.953932][ T9701] netlink: 24 bytes leftover after parsing attributes in process `syz.6.27154'. [ 1494.137898][ T9749] netlink: 32 bytes leftover after parsing attributes in process `syz.6.27157'. [ 1494.163674][ T9161] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1494.190742][ T9161] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1494.252175][ T9768] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1494.270198][ T9161] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1494.283268][ T9161] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1494.323166][ T9784] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1494.368873][ T9794] block device autoloading is deprecated and will be removed. [ 1494.388487][ T9161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1494.400774][ T9161] 8021q: adding VLAN 0 to HW filter on device team0 [ 1494.410821][T29170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1494.417928][T29170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1494.430031][T29170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1494.437223][T29170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1494.453836][ T9161] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1494.464895][ T9161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1494.488233][ T9810] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1494.559708][ T9823] netlink: 24 bytes leftover after parsing attributes in process `syz.5.27166'. [ 1494.617620][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1494.621784][ T9161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1494.752801][ T9863] netlink: 8 bytes leftover after parsing attributes in process `syz.5.27172'. [ 1494.849781][ T9877] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1494.873251][ T9866] SELinux: failed to load policy [ 1494.880432][ T9866] netlink: 4 bytes leftover after parsing attributes in process `syz.9.27171'. [ 1494.907918][ T9161] veth0_vlan: entered promiscuous mode [ 1494.918310][ T9161] veth1_vlan: entered promiscuous mode [ 1494.939958][ T9872] FAULT_INJECTION: forcing a failure. [ 1494.939958][ T9872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1494.946957][ T9161] veth0_macvtap: entered promiscuous mode [ 1494.954262][ T9872] CPU: 0 UID: 0 PID: 9872 Comm: syz.6.27174 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1494.954296][ T9872] Tainted: [W]=WARN [ 1494.954304][ T9872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1494.954349][ T9872] Call Trace: [ 1494.954356][ T9872] [ 1494.954363][ T9872] __dump_stack+0x1d/0x30 [ 1494.954389][ T9872] dump_stack_lvl+0x95/0xd0 [ 1494.954412][ T9872] dump_stack+0x15/0x1b [ 1494.954434][ T9872] should_fail_ex+0x263/0x280 [ 1494.954548][ T9872] should_fail_alloc_page+0xf2/0x100 [ 1494.954576][ T9872] __alloc_frozen_pages_noprof+0x108/0x350 [ 1494.954611][ T9872] alloc_pages_mpol+0xb3/0x260 [ 1494.954709][ T9872] ? anon_pipe_write+0x21/0xb30 [ 1494.954775][ T9872] alloc_pages_noprof+0x8f/0x130 [ 1494.954868][ T9872] anon_pipe_write+0x69f/0xb30 [ 1494.954893][ T9872] ? anon_pipe_write+0x21/0xb30 [ 1494.954926][ T9872] ? __pfx_anon_pipe_write+0x10/0x10 [ 1494.955018][ T9872] vfs_write+0x5a6/0x9f0 [ 1494.955102][ T9872] ksys_write+0xdc/0x1a0 [ 1494.955125][ T9872] __x64_sys_write+0x40/0x50 [ 1494.955146][ T9872] x64_sys_call+0x2847/0x3000 [ 1494.955172][ T9872] do_syscall_64+0xc0/0x2a0 [ 1494.955205][ T9872] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1494.955245][ T9872] RIP: 0033:0x7f4a8c5ab78e [ 1494.955300][ T9872] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1494.955320][ T9872] RSP: 002b:00007f4a8b046ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1494.955342][ T9872] RAX: ffffffffffffffda RBX: 00007f4a8b0476c0 RCX: 00007f4a8c5ab78e [ 1494.955358][ T9872] RDX: 0000000000000029 RSI: 00007f4a8b046e90 RDI: 0000000000000002 [ 1494.955384][ T9872] RBP: 00007f4a8b046e90 R08: 0000000000000000 R09: 0000000000000000 [ 1494.955399][ T9872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 1494.955413][ T9872] R13: 00007f4a8c834640 R14: 00007f4a8c82b4a0 R15: 0000000000000001 [ 1494.955506][ T9872] [ 1495.159405][ T9161] veth1_macvtap: entered promiscuous mode [ 1495.189571][ T9161] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1495.204911][ T9161] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1495.225127][T29154] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1495.271738][T29170] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1495.296233][T29170] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1495.334980][ T9943] netlink: 'syz.9.27181': attribute type 4 has an invalid length. [ 1495.423723][T29170] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1495.486874][ T9949] syzkaller0: entered promiscuous mode [ 1495.492462][ T9949] syzkaller0: entered allmulticast mode [ 1495.505604][ T9949] FAULT_INJECTION: forcing a failure. [ 1495.505604][ T9949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1495.519535][ T9949] CPU: 1 UID: 0 PID: 9949 Comm: syz.6.27182 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1495.519573][ T9949] Tainted: [W]=WARN [ 1495.519581][ T9949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1495.519659][ T9949] Call Trace: [ 1495.519666][ T9949] [ 1495.519675][ T9949] __dump_stack+0x1d/0x30 [ 1495.519698][ T9949] dump_stack_lvl+0x95/0xd0 [ 1495.519719][ T9949] dump_stack+0x15/0x1b [ 1495.519816][ T9949] should_fail_ex+0x263/0x280 [ 1495.519847][ T9949] should_fail+0xb/0x20 [ 1495.519934][ T9949] should_fail_usercopy+0x1a/0x20 [ 1495.519963][ T9949] _copy_from_iter+0x21c/0xea0 [ 1495.519984][ T9949] ? __rcu_read_unlock+0x4e/0x70 [ 1495.520020][ T9949] packet_sendmsg+0x2046/0x3370 [ 1495.520112][ T9949] ? avc_has_perm+0x101/0x190 [ 1495.520143][ T9949] ? selinux_socket_sendmsg+0x192/0x1c0 [ 1495.520175][ T9949] ? __pfx_packet_sendmsg+0x10/0x10 [ 1495.520202][ T9949] ____sys_sendmsg+0x5af/0x600 [ 1495.520225][ T9949] ___sys_sendmsg+0x195/0x1e0 [ 1495.520296][ T9949] __x64_sys_sendmsg+0xd4/0x160 [ 1495.520319][ T9949] x64_sys_call+0x17ba/0x3000 [ 1495.520378][ T9949] do_syscall_64+0xc0/0x2a0 [ 1495.520412][ T9949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1495.520513][ T9949] RIP: 0033:0x7f4a8c5eaeb9 [ 1495.520531][ T9949] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1495.520583][ T9949] RSP: 002b:00007f4a8b047028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1495.520601][ T9949] RAX: ffffffffffffffda RBX: 00007f4a8c865fa0 RCX: 00007f4a8c5eaeb9 [ 1495.520615][ T9949] RDX: 0000000000000004 RSI: 00002000000000c0 RDI: 0000000000000007 [ 1495.520627][ T9949] RBP: 00007f4a8b047090 R08: 0000000000000000 R09: 0000000000000000 [ 1495.520639][ T9949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1495.520652][ T9949] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1495.520677][ T9949] [ 1496.070417][ T9993] netlink: 8 bytes leftover after parsing attributes in process `syz.6.27184'. [ 1496.235967][T10005] netlink: 5 bytes leftover after parsing attributes in process `syz.6.27187'. [ 1496.246581][T10005] ..0ªî{X¹¦: renamed from gretap0 [ 1496.268412][T10005] ..0ªî{X¹¦: entered allmulticast mode [ 1496.273995][T10005] A link change request failed with some changes committed already. Interface ..0ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 1496.308313][T10040] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1496.508680][T10078] netlink: 'syz.4.27201': attribute type 1 has an invalid length. [ 1496.716476][T10102] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1496.889140][T10133] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1497.090496][T10163] ip6erspan0: entered allmulticast mode [ 1497.307461][T29170] Bluetooth: hci0: Frame reassembly failed (-84) [ 1497.439756][T10238] FAULT_INJECTION: forcing a failure. [ 1497.439756][T10238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1497.453598][T10238] CPU: 1 UID: 0 PID: 10238 Comm: syz.5.27246 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1497.453636][T10238] Tainted: [W]=WARN [ 1497.453644][T10238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1497.453658][T10238] Call Trace: [ 1497.453724][T10238] [ 1497.453731][T10238] __dump_stack+0x1d/0x30 [ 1497.453814][T10238] dump_stack_lvl+0x95/0xd0 [ 1497.453835][T10238] dump_stack+0x15/0x1b [ 1497.453883][T10238] should_fail_ex+0x263/0x280 [ 1497.453917][T10238] should_fail+0xb/0x20 [ 1497.453943][T10238] should_fail_usercopy+0x1a/0x20 [ 1497.453978][T10238] _copy_from_user+0x1c/0xb0 [ 1497.454057][T10238] kstrtouint_from_user+0x69/0xf0 [ 1497.454153][T10238] proc_fail_nth_write+0x50/0x160 [ 1497.454183][T10238] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1497.454209][T10238] vfs_write+0x269/0x9f0 [ 1497.454232][T10238] ? __rcu_read_unlock+0x4e/0x70 [ 1497.454316][T10238] ? __fget_files+0x184/0x1c0 [ 1497.454339][T10238] ? mutex_lock+0x57/0x90 [ 1497.454367][T10238] ksys_write+0xdc/0x1a0 [ 1497.454470][T10238] __x64_sys_write+0x40/0x50 [ 1497.454489][T10238] x64_sys_call+0x2847/0x3000 [ 1497.454519][T10238] do_syscall_64+0xc0/0x2a0 [ 1497.454548][T10238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1497.454648][T10238] RIP: 0033:0x7ff895bab78e [ 1497.454665][T10238] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1497.454686][T10238] RSP: 002b:00007ff894646fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1497.454707][T10238] RAX: ffffffffffffffda RBX: 00007ff8946476c0 RCX: 00007ff895bab78e [ 1497.454721][T10238] RDX: 0000000000000001 RSI: 00007ff8946470a0 RDI: 0000000000000004 [ 1497.454745][T10238] RBP: 00007ff894647090 R08: 0000000000000000 R09: 0000000000000000 [ 1497.454758][T10238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1497.454815][T10238] R13: 00007ff895e66038 R14: 00007ff895e65fa0 R15: 00007ffc024d79f8 [ 1497.454840][T10238] [ 1497.682815][T10246] netlink: 'syz.5.27249': attribute type 11 has an invalid length. [ 1497.784946][T10262] ref_ctr_offset mismatch. inode: 0x281 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x20 [ 1497.882798][ T29] kauditd_printk_skb: 232 callbacks suppressed [ 1497.882813][ T29] audit: type=1400 audit(2000001984.150:148098): avc: denied { relabelto } for pid=10267 comm="syz.9.27256" name="429" dev="tmpfs" ino=2249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 1497.915382][ T29] audit: type=1400 audit(2000001984.150:148099): avc: denied { associate } for pid=10267 comm="syz.9.27256" name="429" dev="tmpfs" ino=2249 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hwdata_t:s0" [ 1498.001546][ T29] audit: type=1326 audit(2000001984.262:148100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.025587][ T29] audit: type=1326 audit(2000001984.262:148101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=195 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.049676][ T29] audit: type=1326 audit(2000001984.262:148102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.073567][ T29] audit: type=1326 audit(2000001984.262:148103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.097351][ T29] audit: type=1326 audit(2000001984.262:148104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.130156][ T29] audit: type=1326 audit(2000001984.337:148105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.154469][ T29] audit: type=1326 audit(2000001984.337:148106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.178993][ T29] audit: type=1326 audit(2000001984.337:148107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10267 comm="syz.9.27256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7ff7a5acaeb9 code=0x7ffc0000 [ 1498.352294][T10318] netlink: 'syz.9.27267': attribute type 3 has an invalid length. [ 1498.510679][T10343] vlan1: entered promiscuous mode [ 1498.515787][T10343] gretap0: entered promiscuous mode [ 1498.563976][T10351] FAULT_INJECTION: forcing a failure. [ 1498.563976][T10351] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1498.577589][T10351] CPU: 1 UID: 0 PID: 10351 Comm: syz.5.27275 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1498.577684][T10351] Tainted: [W]=WARN [ 1498.577688][T10351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1498.577745][T10351] Call Trace: [ 1498.577750][T10351] [ 1498.577756][T10351] __dump_stack+0x1d/0x30 [ 1498.577772][T10351] dump_stack_lvl+0x95/0xd0 [ 1498.577785][T10351] dump_stack+0x15/0x1b [ 1498.577796][T10351] should_fail_ex+0x263/0x280 [ 1498.577862][T10351] should_fail+0xb/0x20 [ 1498.577906][T10351] should_fail_usercopy+0x1a/0x20 [ 1498.577925][T10351] _copy_to_user+0x20/0xa0 [ 1498.577938][T10351] simple_read_from_buffer+0xb5/0x130 [ 1498.577976][T10351] proc_fail_nth_read+0x10e/0x150 [ 1498.578066][T10351] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1498.578081][T10351] vfs_read+0x1ab/0x7f0 [ 1498.578170][T10351] ? __rcu_read_unlock+0x4e/0x70 [ 1498.578189][T10351] ? __fget_files+0x184/0x1c0 [ 1498.578333][T10351] ? mutex_lock+0x57/0x90 [ 1498.578349][T10351] ksys_read+0xdc/0x1a0 [ 1498.578361][T10351] __x64_sys_read+0x40/0x50 [ 1498.578373][T10351] x64_sys_call+0x2889/0x3000 [ 1498.578468][T10351] do_syscall_64+0xc0/0x2a0 [ 1498.578487][T10351] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1498.578500][T10351] RIP: 0033:0x7ff895bab78e [ 1498.578541][T10351] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1498.578553][T10351] RSP: 002b:00007ff894646fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1498.578566][T10351] RAX: ffffffffffffffda RBX: 00007ff8946476c0 RCX: 00007ff895bab78e [ 1498.578575][T10351] RDX: 000000000000000f RSI: 00007ff8946470a0 RDI: 0000000000000005 [ 1498.578583][T10351] RBP: 00007ff894647090 R08: 0000000000000000 R09: 0000000000000000 [ 1498.578667][T10351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1498.578675][T10351] R13: 00007ff895e66038 R14: 00007ff895e65fa0 R15: 00007ffc024d79f8 [ 1498.578731][T10351] [ 1498.812042][T10355] 8021q: VLANs not supported on ip6gre0 [ 1498.935227][T10371] FAULT_INJECTION: forcing a failure. [ 1498.935227][T10371] name failslab, interval 1, probability 0, space 0, times 0 [ 1498.948050][T10371] CPU: 0 UID: 0 PID: 10371 Comm: syz.6.27284 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1498.948087][T10371] Tainted: [W]=WARN [ 1498.948093][T10371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1498.948187][T10371] Call Trace: [ 1498.948193][T10371] [ 1498.948276][T10371] __dump_stack+0x1d/0x30 [ 1498.948299][T10371] dump_stack_lvl+0x95/0xd0 [ 1498.948320][T10371] dump_stack+0x15/0x1b [ 1498.948343][T10371] should_fail_ex+0x263/0x280 [ 1498.948379][T10371] should_failslab+0x8c/0xb0 [ 1498.948500][T10371] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 1498.948530][T10371] ? __alloc_skb+0x2f0/0x4b0 [ 1498.948565][T10371] __alloc_skb+0x2f0/0x4b0 [ 1498.948680][T10371] ? __alloc_skb+0x219/0x4b0 [ 1498.948707][T10371] netlink_alloc_large_skb+0xbf/0xf0 [ 1498.948786][T10371] netlink_sendmsg+0x40c/0x6f0 [ 1498.948885][T10371] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1498.948903][T10371] ____sys_sendmsg+0x5af/0x600 [ 1498.948929][T10371] ___sys_sendmsg+0x195/0x1e0 [ 1498.949083][T10371] __x64_sys_sendmsg+0xd4/0x160 [ 1498.949107][T10371] x64_sys_call+0x17ba/0x3000 [ 1498.949130][T10371] do_syscall_64+0xc0/0x2a0 [ 1498.949159][T10371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1498.949193][T10371] RIP: 0033:0x7f4a8c5eaeb9 [ 1498.949333][T10371] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1498.949349][T10371] RSP: 002b:00007f4a8b047028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1498.949367][T10371] RAX: ffffffffffffffda RBX: 00007f4a8c865fa0 RCX: 00007f4a8c5eaeb9 [ 1498.949381][T10371] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000003 [ 1498.949395][T10371] RBP: 00007f4a8b047090 R08: 0000000000000000 R09: 0000000000000000 [ 1498.949410][T10371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1498.949473][T10371] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1498.949498][T10371] [ 1499.168699][T10372] __nla_validate_parse: 7 callbacks suppressed [ 1499.168716][T10372] netlink: 32 bytes leftover after parsing attributes in process `syz.5.27281'. [ 1499.206164][T10379] net_ratelimit: 2 callbacks suppressed [ 1499.206182][T10379] ip_tunnel: non-ECT from 100.1.1.0 with TOS=0x3 [ 1499.234317][T10374] netlink: 16 bytes leftover after parsing attributes in process `syz.6.27285'. [ 1499.240532][T10379] netlink: 8 bytes leftover after parsing attributes in process `syz.4.27286'. [ 1499.348434][T10405] netlink: 36 bytes leftover after parsing attributes in process `syz.4.27289'. [ 1499.492673][ T4650] Bluetooth: hci0: command 0x1003 tx timeout [ 1499.498834][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1499.545540][T10427] FAULT_INJECTION: forcing a failure. [ 1499.545540][T10427] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.558631][T10427] CPU: 1 UID: 0 PID: 10427 Comm: syz.7.27296 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1499.558706][T10427] Tainted: [W]=WARN [ 1499.558710][T10427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1499.558718][T10427] Call Trace: [ 1499.558722][T10427] [ 1499.558728][T10427] __dump_stack+0x1d/0x30 [ 1499.558819][T10427] dump_stack_lvl+0x95/0xd0 [ 1499.558865][T10427] dump_stack+0x15/0x1b [ 1499.558882][T10427] should_fail_ex+0x263/0x280 [ 1499.558902][T10427] should_failslab+0x8c/0xb0 [ 1499.558956][T10427] kmem_cache_alloc_noprof+0x68/0x490 [ 1499.559048][T10427] ? mempool_alloc_slab+0x1a/0x30 [ 1499.559104][T10427] mempool_alloc_slab+0x1a/0x30 [ 1499.559124][T10427] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1499.559200][T10427] mempool_init_node+0x147/0x250 [ 1499.559251][T10427] ? __pfx_mempool_free_slab+0x10/0x10 [ 1499.559353][T10427] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1499.559385][T10427] mempool_init_noprof+0x3a/0x50 [ 1499.559467][T10427] bioset_init+0x177/0x480 [ 1499.559482][T10427] ? __pfx_no_op+0x10/0x10 [ 1499.559500][T10427] ? percpu_ref_init+0x1dd/0x250 [ 1499.559527][T10427] mddev_init+0xfc/0x420 [ 1499.559544][T10427] ? __pfx_md_probe+0x10/0x10 [ 1499.559560][T10427] md_alloc+0x99/0xa10 [ 1499.559620][T10427] ? vsscanf+0x11c7/0x1270 [ 1499.559633][T10427] ? __pfx_md_probe+0x10/0x10 [ 1499.559705][T10427] md_alloc_and_put+0x18/0x170 [ 1499.559721][T10427] md_probe+0x68/0x80 [ 1499.559736][T10427] blk_request_module+0x1bd/0x1e0 [ 1499.559756][T10427] blkdev_get_no_open+0x4b/0x100 [ 1499.559872][T10427] bdev_file_open_by_dev+0xa5/0x250 [ 1499.559893][T10427] swsusp_check+0x3f/0x290 [ 1499.559905][T10427] software_resume+0x41/0x2f0 [ 1499.559950][T10427] resume_store+0x2d9/0x3d0 [ 1499.559968][T10427] ? __pfx_resume_store+0x10/0x10 [ 1499.559986][T10427] kobj_attr_store+0x4a/0x70 [ 1499.559998][T10427] ? __pfx_kobj_attr_store+0x10/0x10 [ 1499.560043][T10427] sysfs_kf_write+0xfe/0x120 [ 1499.560056][T10427] ? __pfx_sysfs_kf_write+0x10/0x10 [ 1499.560068][T10427] kernfs_fop_write_iter+0x1eb/0x300 [ 1499.560088][T10427] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 1499.560176][T10427] vfs_write+0x5a6/0x9f0 [ 1499.560193][T10427] ksys_write+0xdc/0x1a0 [ 1499.560219][T10427] __x64_sys_write+0x40/0x50 [ 1499.560231][T10427] x64_sys_call+0x2847/0x3000 [ 1499.560246][T10427] do_syscall_64+0xc0/0x2a0 [ 1499.560264][T10427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1499.560345][T10427] RIP: 0033:0x7f6272c5aeb9 [ 1499.560356][T10427] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1499.560367][T10427] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1499.560380][T10427] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1499.560389][T10427] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000003 [ 1499.560399][T10427] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1499.560434][T10427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1499.560442][T10427] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1499.560455][T10427] [ 1499.560762][T10427] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1499.609499][ T4532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=4532 comm=kworker/0:10 [ 1499.733562][ T3469] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=3469 comm=kworker/1:16 [ 1499.961353][T10447] netlink: 12 bytes leftover after parsing attributes in process `syz.9.27303'. [ 1499.970470][T10447] netlink: 12 bytes leftover after parsing attributes in process `syz.9.27303'. [ 1499.980407][T10447] netlink: 12 bytes leftover after parsing attributes in process `syz.9.27303'. [ 1500.421538][T10460] autofs4:pid:10460:validate_dev_ioctl: path string terminator missing for cmd(0xc0189375) [ 1500.468959][T10465] netlink: 8 bytes leftover after parsing attributes in process `syz.5.27309'. [ 1500.478056][T10465] netlink: 4 bytes leftover after parsing attributes in process `syz.5.27309'. [ 1500.912274][T10480] syzkaller0: entered promiscuous mode [ 1500.917937][T10480] syzkaller0: entered allmulticast mode [ 1500.985636][T10490] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1501.120287][T10477] chnl_net:caif_netlink_parms(): no params data found [ 1501.184732][T10477] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.191857][T10477] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.202793][T10477] bridge_slave_0: entered allmulticast mode [ 1501.210254][T10477] bridge_slave_0: entered promiscuous mode [ 1501.217340][T10477] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.224536][T10477] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.231905][T10477] bridge_slave_1: entered allmulticast mode [ 1501.238586][T10477] bridge_slave_1: entered promiscuous mode [ 1501.260230][T10477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1501.270999][T10477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1501.293497][T10477] team0: Port device team_slave_0 added [ 1501.300492][T10477] team0: Port device team_slave_1 added [ 1501.318993][T10477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1501.325992][T10477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1501.351981][T10477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1501.363385][T10477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1501.370334][T10477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1501.396331][T10477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1501.428635][T10477] hsr_slave_0: entered promiscuous mode [ 1501.434629][T10477] hsr_slave_1: entered promiscuous mode [ 1501.440706][T10477] debugfs: 'hsr0' already exists in 'hsr' [ 1501.446412][T10477] Cannot create hsr debugfs directory [ 1501.721870][T10477] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1501.730667][T10477] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1501.740254][T10477] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1501.749615][T10477] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1501.766526][T10477] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.773787][T10477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1501.781082][T10477] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.788170][T10477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1501.817299][T10477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1501.829493][ T8012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.837679][ T8012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.848993][T10477] 8021q: adding VLAN 0 to HW filter on device team0 [ 1501.859683][ T8012] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.866749][ T8012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1501.878364][T29169] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.885427][T29169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1501.948410][T10477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1502.026048][T10797] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.067105][T10477] veth0_vlan: entered promiscuous mode [ 1502.080337][T10477] veth1_vlan: entered promiscuous mode [ 1502.095147][T10797] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.114485][T10477] veth0_macvtap: entered promiscuous mode [ 1502.122326][T10477] veth1_macvtap: entered promiscuous mode [ 1502.134047][T10477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1502.147329][T10797] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.150240][T10810] netlink: 4 bytes leftover after parsing attributes in process `syz.7.27322'. [ 1502.167857][T10477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1502.183906][ T8012] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.193281][ T8012] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.251829][ T8012] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.264925][T10797] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.275977][ T8012] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.322351][T10824] bond4: option primary: mode dependency failed, not supported in mode balance-rr(0) [ 1502.335092][T10824] bond4 (unregistering): Released all slaves [ 1502.360697][ T8012] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.374289][ T8012] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.391984][ T8012] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.401958][ T8012] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1502.418830][T10903] syzkaller0: entered promiscuous mode [ 1502.424425][T10903] syzkaller0: entered allmulticast mode [ 1502.884218][T10927] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.895615][T10927] bridge_slave_0 (unregistering): left allmulticast mode [ 1502.902749][T10927] bridge_slave_0 (unregistering): left promiscuous mode [ 1502.910394][T10927] bridge0: port 1(bridge_slave_0) entered disabled state [ 1503.264651][T10937] netlink: 'syz.9.27331': attribute type 1 has an invalid length. [ 1503.280789][T10937] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1503.295768][T10937] bond2 (unregistering): Released all slaves [ 1503.441404][T11008] openvswitch: netlink: Flow key attr not present in new flow. [ 1503.600790][T11016] FAULT_INJECTION: forcing a failure. [ 1503.600790][T11016] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.613467][T11016] CPU: 1 UID: 0 PID: 11016 Comm: syz.7.27338 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1503.613650][T11016] Tainted: [W]=WARN [ 1503.613659][T11016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1503.613673][T11016] Call Trace: [ 1503.613681][T11016] [ 1503.613691][T11016] __dump_stack+0x1d/0x30 [ 1503.613715][T11016] dump_stack_lvl+0x95/0xd0 [ 1503.613744][T11016] dump_stack+0x15/0x1b [ 1503.613765][T11016] should_fail_ex+0x263/0x280 [ 1503.613796][T11016] should_failslab+0x8c/0xb0 [ 1503.613824][T11016] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 1503.613854][T11016] ? __d_alloc+0x37/0x340 [ 1503.613943][T11016] __d_alloc+0x37/0x340 [ 1503.614021][T11016] d_alloc_parallel+0x54/0xce0 [ 1503.614057][T11016] ? lockref_get_not_dead+0x120/0x1c0 [ 1503.614080][T11016] ? __rcu_read_unlock+0x4e/0x70 [ 1503.614130][T11016] ? try_to_unlazy+0x3c0/0x5b0 [ 1503.614202][T11016] __lookup_slow+0x96/0x260 [ 1503.614229][T11016] lookup_slow+0x3c/0x60 [ 1503.614314][T11016] path_lookupat+0x2f7/0x500 [ 1503.614332][T11016] filename_lookup+0x190/0x390 [ 1503.614411][T11016] user_path_at+0x3e/0x130 [ 1503.614458][T11016] do_fchownat+0x92/0x1e0 [ 1503.614475][T11016] __x64_sys_chown+0x47/0x60 [ 1503.614492][T11016] x64_sys_call+0x2eb9/0x3000 [ 1503.614544][T11016] do_syscall_64+0xc0/0x2a0 [ 1503.614627][T11016] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1503.614640][T11016] RIP: 0033:0x7f6272c5aeb9 [ 1503.614715][T11016] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1503.614732][T11016] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 1503.614745][T11016] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1503.614775][T11016] RDX: 000000000000ee00 RSI: 0000000000000000 RDI: 00002000000001c0 [ 1503.614783][T11016] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1503.614791][T11016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1503.614799][T11016] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1503.614824][T11016] [ 1503.869752][T11021] netlink: 'syz.7.27339': attribute type 10 has an invalid length. [ 1503.877860][T11021] batadv0: entered promiscuous mode [ 1503.883100][T11021] batadv0: entered allmulticast mode [ 1503.889762][T11021] bridge0: port 3(batadv0) entered blocking state [ 1503.896200][T11021] bridge0: port 3(batadv0) entered disabled state [ 1503.903505][T11021] bridge0: port 3(batadv0) entered blocking state [ 1503.909978][T11021] bridge0: port 3(batadv0) entered forwarding state [ 1503.942087][T11023] FAULT_INJECTION: forcing a failure. [ 1503.942087][T11023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1503.955885][T11023] CPU: 1 UID: 0 PID: 11023 Comm: syz.7.27340 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1503.955921][T11023] Tainted: [W]=WARN [ 1503.955929][T11023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1503.955945][T11023] Call Trace: [ 1503.955951][T11023] [ 1503.955959][T11023] __dump_stack+0x1d/0x30 [ 1503.955987][T11023] dump_stack_lvl+0x95/0xd0 [ 1503.956011][T11023] dump_stack+0x15/0x1b [ 1503.956108][T11023] should_fail_ex+0x263/0x280 [ 1503.956139][T11023] should_fail+0xb/0x20 [ 1503.956198][T11023] should_fail_usercopy+0x1a/0x20 [ 1503.956233][T11023] _copy_from_user+0x1c/0xb0 [ 1503.956256][T11023] kstrtouint_from_user+0x69/0xf0 [ 1503.956343][T11023] proc_fail_nth_write+0x50/0x160 [ 1503.956425][T11023] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1503.956454][T11023] vfs_write+0x269/0x9f0 [ 1503.956477][T11023] ? __rcu_read_unlock+0x4e/0x70 [ 1503.956612][T11023] ? __fget_files+0x184/0x1c0 [ 1503.956638][T11023] ? mutex_lock+0x57/0x90 [ 1503.956665][T11023] ksys_write+0xdc/0x1a0 [ 1503.956690][T11023] __x64_sys_write+0x40/0x50 [ 1503.956739][T11023] x64_sys_call+0x2847/0x3000 [ 1503.956824][T11023] do_syscall_64+0xc0/0x2a0 [ 1503.956939][T11023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1503.956986][T11023] RIP: 0033:0x7f6272c1b78e [ 1503.957048][T11023] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1503.957069][T11023] RSP: 002b:00007f62716b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1503.957091][T11023] RAX: ffffffffffffffda RBX: 00007f62716b76c0 RCX: 00007f6272c1b78e [ 1503.957158][T11023] RDX: 0000000000000001 RSI: 00007f62716b70a0 RDI: 0000000000000004 [ 1503.957245][T11023] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1503.957258][T11023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1503.957331][T11023] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1503.957390][T11023] [ 1504.299276][T11034] netlink: 'syz.7.27344': attribute type 30 has an invalid length. [ 1504.323447][T11034] bond4: option arp_missed_max: invalid value (0) [ 1504.329968][T11034] bond4: option arp_missed_max: allowed values 1 - 255 [ 1504.338297][T11034] bond4 (unregistering): Released all slaves [ 1504.378562][T29165] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1504.387790][T29165] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1504.409536][T11103] netem: change failed [ 1504.832646][T11161] __nla_validate_parse: 4 callbacks suppressed [ 1504.832663][T11161] netlink: 12 bytes leftover after parsing attributes in process `syz.9.27353'. [ 1504.903498][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 1504.903585][ T29] audit: type=1326 audit(2000001990.716:148225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1504.933926][ T29] audit: type=1326 audit(2000001990.716:148226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1504.957766][ T29] audit: type=1326 audit(2000001990.754:148227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1504.981820][ T29] audit: type=1326 audit(2000001990.754:148228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.005613][ T29] audit: type=1326 audit(2000001990.754:148229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.029547][ T29] audit: type=1326 audit(2000001990.754:148230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.053408][ T29] audit: type=1326 audit(2000001990.754:148231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.077225][ T29] audit: type=1326 audit(2000001990.754:148232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.100991][ T29] audit: type=1326 audit(2000001990.754:148233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.124775][ T29] audit: type=1326 audit(2000001990.754:148234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11173 comm="syz.7.27356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6272c5aeb9 code=0x7ffc0000 [ 1505.251686][T11178] netlink: 12 bytes leftover after parsing attributes in process `syz.7.27357'. [ 1505.370885][T11185] netlink: 36 bytes leftover after parsing attributes in process `syz.7.27360'. [ 1505.405717][T11185] netlink: 20 bytes leftover after parsing attributes in process `syz.7.27360'. [ 1505.594389][T11210] netlink: 'syz.9.27370': attribute type 1 has an invalid length. [ 1505.680554][T11214] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1505.716564][T11216] netlink: 'syz.9.27372': attribute type 13 has an invalid length. [ 1505.725383][T11216] gretap0: refused to change device tx_queue_len [ 1505.731760][T11216] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 1505.897005][T11218] SELinux: failed to load policy [ 1506.060245][T11237] netlink: 8 bytes leftover after parsing attributes in process `syz.5.27377'. [ 1506.069717][T11237] netlink: 4 bytes leftover after parsing attributes in process `syz.5.27377'. [ 1506.078758][T11237] netlink: 'syz.5.27377': attribute type 14 has an invalid length. [ 1506.220295][T11261] FAULT_INJECTION: forcing a failure. [ 1506.220295][T11261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1506.234207][T11261] CPU: 1 UID: 0 PID: 11261 Comm: syz.5.27384 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1506.234250][T11261] Tainted: [W]=WARN [ 1506.234258][T11261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1506.234273][T11261] Call Trace: [ 1506.234281][T11261] [ 1506.234291][T11261] __dump_stack+0x1d/0x30 [ 1506.234362][T11261] dump_stack_lvl+0x95/0xd0 [ 1506.234414][T11261] dump_stack+0x15/0x1b [ 1506.234434][T11261] should_fail_ex+0x263/0x280 [ 1506.234533][T11261] should_fail+0xb/0x20 [ 1506.234559][T11261] should_fail_usercopy+0x1a/0x20 [ 1506.234641][T11261] _copy_to_user+0x20/0xa0 [ 1506.234663][T11261] simple_read_from_buffer+0xb5/0x130 [ 1506.234804][T11261] proc_fail_nth_read+0x10e/0x150 [ 1506.234874][T11261] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1506.234895][T11261] vfs_read+0x1ab/0x7f0 [ 1506.234918][T11261] ? __rcu_read_unlock+0x4e/0x70 [ 1506.234936][T11261] ? __fget_files+0x184/0x1c0 [ 1506.234951][T11261] ? mutex_lock+0x57/0x90 [ 1506.234966][T11261] ksys_read+0xdc/0x1a0 [ 1506.234979][T11261] __x64_sys_read+0x40/0x50 [ 1506.235014][T11261] x64_sys_call+0x2889/0x3000 [ 1506.235090][T11261] do_syscall_64+0xc0/0x2a0 [ 1506.235109][T11261] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1506.235141][T11261] RIP: 0033:0x7fad9110b78e [ 1506.235152][T11261] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1506.235237][T11261] RSP: 002b:00007fad8fba6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1506.235255][T11261] RAX: ffffffffffffffda RBX: 00007fad8fba76c0 RCX: 00007fad9110b78e [ 1506.235271][T11261] RDX: 000000000000000f RSI: 00007fad8fba70a0 RDI: 0000000000000004 [ 1506.235311][T11261] RBP: 00007fad8fba7090 R08: 0000000000000000 R09: 0000000000000000 [ 1506.235319][T11261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1506.235327][T11261] R13: 00007fad913c6038 R14: 00007fad913c5fa0 R15: 00007ffd9d623338 [ 1506.235395][T11261] [ 1506.460610][T11263] netlink: 52 bytes leftover after parsing attributes in process `syz.5.27385'. [ 1506.470445][T11263] netlink: 'syz.5.27385': attribute type 7 has an invalid length. [ 1506.478327][T11263] netlink: 'syz.5.27385': attribute type 8 has an invalid length. [ 1506.693856][T11298] gtp0: entered promiscuous mode [ 1506.699241][T11298] gtp0: entered allmulticast mode [ 1506.720918][T11304] netlink: 28 bytes leftover after parsing attributes in process `syz.5.27394'. [ 1506.730520][T11304] netlink: 28 bytes leftover after parsing attributes in process `syz.5.27394'. [ 1507.096407][T11344] syzkaller0: entered promiscuous mode [ 1507.101960][T11344] syzkaller0: entered allmulticast mode [ 1507.442654][T11276] delete_channel: no stack [ 1507.463780][T11383] FAULT_INJECTION: forcing a failure. [ 1507.463780][T11383] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.476587][T11383] CPU: 0 UID: 0 PID: 11383 Comm: syz.7.27411 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1507.476625][T11383] Tainted: [W]=WARN [ 1507.476633][T11383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1507.476648][T11383] Call Trace: [ 1507.476656][T11383] [ 1507.476666][T11383] __dump_stack+0x1d/0x30 [ 1507.476759][T11383] dump_stack_lvl+0x95/0xd0 [ 1507.476783][T11383] dump_stack+0x15/0x1b [ 1507.476839][T11383] should_fail_ex+0x263/0x280 [ 1507.476936][T11383] should_failslab+0x8c/0xb0 [ 1507.476961][T11383] kmem_cache_alloc_noprof+0x68/0x490 [ 1507.476990][T11383] ? mempool_alloc_slab+0x1a/0x30 [ 1507.477082][T11383] mempool_alloc_slab+0x1a/0x30 [ 1507.477188][T11383] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1507.477224][T11383] mempool_init_node+0x147/0x250 [ 1507.477265][T11383] ? __pfx_mempool_free_slab+0x10/0x10 [ 1507.477295][T11383] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1507.477366][T11383] mempool_init_noprof+0x3a/0x50 [ 1507.477404][T11383] bioset_init+0x177/0x480 [ 1507.477433][T11383] ? __pfx_no_op+0x10/0x10 [ 1507.477461][T11383] ? percpu_ref_init+0x1dd/0x250 [ 1507.477546][T11383] mddev_init+0xfc/0x420 [ 1507.477606][T11383] ? __pfx_md_probe+0x10/0x10 [ 1507.477637][T11383] md_alloc+0x99/0xa10 [ 1507.477659][T11383] ? vsscanf+0x11c7/0x1270 [ 1507.477730][T11383] ? __pfx_md_probe+0x10/0x10 [ 1507.477758][T11383] md_alloc_and_put+0x18/0x170 [ 1507.477860][T11383] md_probe+0x68/0x80 [ 1507.477928][T11383] blk_request_module+0x1bd/0x1e0 [ 1507.477963][T11383] blkdev_get_no_open+0x4b/0x100 [ 1507.478020][T11383] bdev_file_open_by_dev+0xa5/0x250 [ 1507.478052][T11383] swsusp_check+0x3f/0x290 [ 1507.478075][T11383] software_resume+0x41/0x2f0 [ 1507.478116][T11383] resume_store+0x2d9/0x3d0 [ 1507.478154][T11383] ? __pfx_resume_store+0x10/0x10 [ 1507.478188][T11383] kobj_attr_store+0x4a/0x70 [ 1507.478211][T11383] ? __pfx_kobj_attr_store+0x10/0x10 [ 1507.478302][T11383] sysfs_kf_write+0xfe/0x120 [ 1507.478322][T11383] ? __pfx_sysfs_kf_write+0x10/0x10 [ 1507.478340][T11383] kernfs_fop_write_iter+0x1eb/0x300 [ 1507.478442][T11383] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 1507.478493][T11383] vfs_write+0x5a6/0x9f0 [ 1507.478518][T11383] ksys_write+0xdc/0x1a0 [ 1507.478538][T11383] __x64_sys_write+0x40/0x50 [ 1507.478561][T11383] x64_sys_call+0x2847/0x3000 [ 1507.478604][T11383] do_syscall_64+0xc0/0x2a0 [ 1507.478639][T11383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1507.478722][T11383] RIP: 0033:0x7f6272c5aeb9 [ 1507.478737][T11383] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1507.478767][T11383] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1507.478790][T11383] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1507.478807][T11383] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000003 [ 1507.478822][T11383] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1507.478838][T11383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1507.478852][T11383] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1507.478933][T11383] [ 1507.793439][T11383] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1507.906244][T11399] xt_hashlimit: size too large, truncated to 1048576 [ 1507.926191][T11400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11400 comm=syz.7.27415 [ 1507.957904][T11401] netlink: 8 bytes leftover after parsing attributes in process `syz.5.27406'. [ 1507.992023][T11401] bond1: option ad_user_port_key: invalid value (1136) [ 1507.998963][T11401] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 1508.007997][T11401] bond1 (unregistering): Released all slaves [ 1508.040035][T11397] syzkaller0: entered promiscuous mode [ 1508.045782][T11397] syzkaller0: entered allmulticast mode [ 1508.255149][T11495] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1508.313938][T11502] netlink: 'syz.6.27423': attribute type 1 has an invalid length. [ 1508.358102][T11502] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 1508.376232][T11502] bond1: (slave batadv1): making interface the new active one [ 1508.390136][T11502] bond1: (slave batadv1): Enslaving as an active interface with an up link [ 1508.457436][T11554] bond1 (unregistering): (slave batadv1): Releasing active interface [ 1508.475537][T11554] bond1 (unregistering): Released all slaves [ 1508.585500][T11601] syzkaller0: entered promiscuous mode [ 1508.591138][T11601] syzkaller0: entered allmulticast mode [ 1508.641598][T11606] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 1508.690350][T11612] 9pnet_fd: Insufficient options for proto=fd [ 1509.593703][T11734] FAULT_INJECTION: forcing a failure. [ 1509.593703][T11734] name failslab, interval 1, probability 0, space 0, times 0 [ 1509.606523][T11734] CPU: 0 UID: 0 PID: 11734 Comm: syz.9.27444 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1509.606561][T11734] Tainted: [W]=WARN [ 1509.606569][T11734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1509.606582][T11734] Call Trace: [ 1509.606589][T11734] [ 1509.606599][T11734] __dump_stack+0x1d/0x30 [ 1509.606689][T11734] dump_stack_lvl+0x95/0xd0 [ 1509.606758][T11734] dump_stack+0x15/0x1b [ 1509.606782][T11734] should_fail_ex+0x263/0x280 [ 1509.606818][T11734] should_failslab+0x8c/0xb0 [ 1509.606887][T11734] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 1509.606955][T11734] ? __d_alloc+0x37/0x340 [ 1509.606988][T11734] __d_alloc+0x37/0x340 [ 1509.607016][T11734] ? selinux_inode_alloc_security+0x7e/0x130 [ 1509.607054][T11734] d_alloc_pseudo+0x1e/0x80 [ 1509.607091][T11734] alloc_file_pseudo+0x91/0x190 [ 1509.607123][T11734] ? security_inode_alloc+0x69/0x100 [ 1509.607308][T11734] sock_alloc_file+0x9c/0x1e0 [ 1509.607336][T11734] do_accept+0x1e3/0x390 [ 1509.607384][T11734] __sys_accept4+0xbe/0x170 [ 1509.607494][T11734] __x64_sys_accept4+0x51/0x60 [ 1509.607567][T11734] x64_sys_call+0x2b3e/0x3000 [ 1509.607593][T11734] do_syscall_64+0xc0/0x2a0 [ 1509.607622][T11734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1509.607643][T11734] RIP: 0033:0x7ff7a5acaeb9 [ 1509.607685][T11734] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1509.607706][T11734] RSP: 002b:00007ff7a4506028 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 1509.607782][T11734] RAX: ffffffffffffffda RBX: 00007ff7a5d46090 RCX: 00007ff7a5acaeb9 [ 1509.607822][T11734] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1509.607836][T11734] RBP: 00007ff7a4506090 R08: 0000000000000000 R09: 0000000000000000 [ 1509.607852][T11734] R10: 0000000000080800 R11: 0000000000000246 R12: 0000000000000001 [ 1509.607867][T11734] R13: 00007ff7a5d46128 R14: 00007ff7a5d46090 R15: 00007ffea0db5c58 [ 1509.607893][T11734] [ 1509.871326][T11738] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1509.943701][T11754] netlink: 'syz.7.27446': attribute type 1 has an invalid length. [ 1509.961145][T11754] bond4: entered promiscuous mode [ 1509.966277][T11754] bond4: entered allmulticast mode [ 1509.972207][T11754] 8021q: adding VLAN 0 to HW filter on device bond4 [ 1509.986073][T11754] macvlan2: entered promiscuous mode [ 1509.991475][T11754] macvlan2: entered allmulticast mode [ 1509.998226][T11754] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1510.094106][T11808] openvswitch: netlink: Flow key attr not present in new flow. [ 1510.325879][T11859] program syz.7.27455 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1510.336365][T11859] blktrace: Concurrent blktraces are not allowed on sg0 [ 1510.397611][T11875] program syz.7.27460 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1510.439951][T11877] FAULT_INJECTION: forcing a failure. [ 1510.439951][T11877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1510.453091][T11877] CPU: 0 UID: 0 PID: 11877 Comm: syz.6.27461 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1510.453179][T11877] Tainted: [W]=WARN [ 1510.453186][T11877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1510.453198][T11877] Call Trace: [ 1510.453204][T11877] [ 1510.453212][T11877] __dump_stack+0x1d/0x30 [ 1510.453272][T11877] dump_stack_lvl+0x95/0xd0 [ 1510.453292][T11877] dump_stack+0x15/0x1b [ 1510.453311][T11877] should_fail_ex+0x263/0x280 [ 1510.453391][T11877] should_fail+0xb/0x20 [ 1510.453415][T11877] should_fail_usercopy+0x1a/0x20 [ 1510.453446][T11877] _copy_to_user+0x20/0xa0 [ 1510.453466][T11877] simple_read_from_buffer+0xb5/0x130 [ 1510.453533][T11877] proc_fail_nth_read+0x10e/0x150 [ 1510.453560][T11877] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1510.453585][T11877] vfs_read+0x1ab/0x7f0 [ 1510.453649][T11877] ? __rcu_read_unlock+0x4e/0x70 [ 1510.453677][T11877] ? __fget_files+0x184/0x1c0 [ 1510.453759][T11877] ? mutex_lock+0x57/0x90 [ 1510.453782][T11877] ksys_read+0xdc/0x1a0 [ 1510.453802][T11877] __x64_sys_read+0x40/0x50 [ 1510.453878][T11877] x64_sys_call+0x2889/0x3000 [ 1510.453910][T11877] do_syscall_64+0xc0/0x2a0 [ 1510.453940][T11877] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1510.453961][T11877] RIP: 0033:0x7f4a8c5ab78e [ 1510.453976][T11877] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1510.454070][T11877] RSP: 002b:00007f4a8b046fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1510.454089][T11877] RAX: ffffffffffffffda RBX: 00007f4a8b0476c0 RCX: 00007f4a8c5ab78e [ 1510.454103][T11877] RDX: 000000000000000f RSI: 00007f4a8b0470a0 RDI: 0000000000000004 [ 1510.454115][T11877] RBP: 00007f4a8b047090 R08: 0000000000000000 R09: 0000000000000000 [ 1510.454128][T11877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1510.454176][T11877] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1510.454197][T11877] [ 1510.711970][T11891] syzkaller0: entered promiscuous mode [ 1510.717488][T11891] syzkaller0: entered allmulticast mode [ 1510.724688][T11888] netlink: 'syz.7.27466': attribute type 4 has an invalid length. [ 1510.802720][T11888] bridge0: port 3(batadv0) entered disabled state [ 1510.809334][T11888] bridge0: port 2(bridge_slave_1) entered disabled state [ 1510.816503][T11888] bridge0: port 1(bridge_slave_0) entered disabled state [ 1510.991925][T11888] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1511.006932][T11888] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1511.113602][ T8014] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1511.133456][ T8014] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1511.174572][T29169] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1511.186650][T29169] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1511.621684][T11939] __nla_validate_parse: 8 callbacks suppressed [ 1511.621699][T11939] netlink: 8 bytes leftover after parsing attributes in process `syz.7.27481'. [ 1511.637054][T11939] netlink: 24 bytes leftover after parsing attributes in process `syz.7.27481'. [ 1511.646076][T11939] netlink: 24 bytes leftover after parsing attributes in process `syz.7.27481'. [ 1511.669275][T11939] netlink: 8 bytes leftover after parsing attributes in process `syz.7.27481'. [ 1511.678310][T11939] netlink: 24 bytes leftover after parsing attributes in process `syz.7.27481'. [ 1511.688060][T11939] netlink: 24 bytes leftover after parsing attributes in process `syz.7.27481'. [ 1511.759254][T11948] FAULT_INJECTION: forcing a failure. [ 1511.759254][T11948] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.772220][T11948] CPU: 0 UID: 0 PID: 11948 Comm: syz.7.27483 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1511.772292][T11948] Tainted: [W]=WARN [ 1511.772301][T11948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1511.772315][T11948] Call Trace: [ 1511.772322][T11948] [ 1511.772331][T11948] __dump_stack+0x1d/0x30 [ 1511.772392][T11948] dump_stack_lvl+0x95/0xd0 [ 1511.772417][T11948] dump_stack+0x15/0x1b [ 1511.772519][T11948] should_fail_ex+0x263/0x280 [ 1511.772555][T11948] should_failslab+0x8c/0xb0 [ 1511.772582][T11948] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 1511.772768][T11948] ? alloc_vmap_area+0x243/0xe50 [ 1511.772795][T11948] alloc_vmap_area+0x243/0xe50 [ 1511.772870][T11948] ? should_fail_ex+0xd9/0x280 [ 1511.772942][T11948] ? __kmalloc_cache_node_noprof+0x2a2/0x4a0 [ 1511.772977][T11948] __get_vm_area_node+0x173/0x1d0 [ 1511.773010][T11948] __vmalloc_node_range_noprof+0x291/0x12b0 [ 1511.773044][T11948] ? bpf_prog_alloc_no_stats+0x47/0x380 [ 1511.773144][T11948] ? do_dentry_open+0x7df/0xa60 [ 1511.773174][T11948] ? __rcu_read_unlock+0x4e/0x70 [ 1511.773256][T11948] ? avc_has_perm_noaudit+0xab/0x130 [ 1511.773296][T11948] ? bpf_prog_alloc_no_stats+0x47/0x380 [ 1511.773400][T11948] __vmalloc_noprof+0xa4/0xf0 [ 1511.773442][T11948] ? bpf_prog_alloc_no_stats+0x47/0x380 [ 1511.773516][T11948] bpf_prog_alloc_no_stats+0x47/0x380 [ 1511.773543][T11948] ? bpf_prog_alloc+0x2a/0x150 [ 1511.773567][T11948] bpf_prog_alloc+0x3c/0x150 [ 1511.773619][T11948] bpf_prog_load+0x506/0x1140 [ 1511.773717][T11948] ? security_bpf+0x2b/0x90 [ 1511.773743][T11948] __sys_bpf+0x469/0x7b0 [ 1511.773780][T11948] __x64_sys_bpf+0x41/0x50 [ 1511.773812][T11948] x64_sys_call+0x28e1/0x3000 [ 1511.773840][T11948] do_syscall_64+0xc0/0x2a0 [ 1511.774021][T11948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1511.774047][T11948] RIP: 0033:0x7f6272c5aeb9 [ 1511.774113][T11948] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1511.774134][T11948] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1511.774158][T11948] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1511.774174][T11948] RDX: 0000000000000094 RSI: 0000200000000480 RDI: 0000000000000005 [ 1511.774190][T11948] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1511.774234][T11948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1511.774249][T11948] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1511.774274][T11948] [ 1511.774284][T11948] syz.7.27483: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 1512.042608][T11948] CPU: 0 UID: 0 PID: 11948 Comm: syz.7.27483 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1512.042643][T11948] Tainted: [W]=WARN [ 1512.042652][T11948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1512.042666][T11948] Call Trace: [ 1512.042675][T11948] [ 1512.042735][T11948] __dump_stack+0x1d/0x30 [ 1512.042765][T11948] dump_stack_lvl+0x95/0xd0 [ 1512.042787][T11948] dump_stack+0x15/0x1b [ 1512.042806][T11948] warn_alloc+0x145/0x1c0 [ 1512.042843][T11948] __vmalloc_node_range_noprof+0x2b6/0x12b0 [ 1512.042905][T11948] ? do_dentry_open+0x7df/0xa60 [ 1512.042985][T11948] ? __rcu_read_unlock+0x4e/0x70 [ 1512.043013][T11948] ? avc_has_perm_noaudit+0xab/0x130 [ 1512.043060][T11948] ? bpf_prog_alloc_no_stats+0x47/0x380 [ 1512.043088][T11948] __vmalloc_noprof+0xa4/0xf0 [ 1512.043116][T11948] ? bpf_prog_alloc_no_stats+0x47/0x380 [ 1512.043223][T11948] bpf_prog_alloc_no_stats+0x47/0x380 [ 1512.043247][T11948] ? bpf_prog_alloc+0x2a/0x150 [ 1512.043276][T11948] bpf_prog_alloc+0x3c/0x150 [ 1512.043358][T11948] bpf_prog_load+0x506/0x1140 [ 1512.043398][T11948] ? security_bpf+0x2b/0x90 [ 1512.043424][T11948] __sys_bpf+0x469/0x7b0 [ 1512.043464][T11948] __x64_sys_bpf+0x41/0x50 [ 1512.043502][T11948] x64_sys_call+0x28e1/0x3000 [ 1512.043529][T11948] do_syscall_64+0xc0/0x2a0 [ 1512.043565][T11948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1512.043606][T11948] RIP: 0033:0x7f6272c5aeb9 [ 1512.043625][T11948] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1512.043651][T11948] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1512.043673][T11948] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1512.043689][T11948] RDX: 0000000000000094 RSI: 0000200000000480 RDI: 0000000000000005 [ 1512.043705][T11948] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1512.043782][T11948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1512.043796][T11948] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1512.043820][T11948] [ 1512.086971][T11956] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1512.088565][T11948] Mem-Info: [ 1512.263757][T11948] active_anon:37308 inactive_anon:0 isolated_anon:0 [ 1512.263757][T11948] active_file:26488 inactive_file:3817 isolated_file:0 [ 1512.263757][T11948] unevictable:16435 dirty:336 writeback:0 [ 1512.263757][T11948] slab_reclaimable:4428 slab_unreclaimable:26885 [ 1512.263757][T11948] mapped:40037 shmem:17316 pagetables:2012 [ 1512.263757][T11948] sec_pagetables:0 bounce:0 [ 1512.263757][T11948] kernel_misc_reclaimable:0 [ 1512.263757][T11948] free:1750223 free_pcp:10370 free_cma:0 [ 1512.309279][T11948] Node 0 active_anon:149232kB inactive_anon:0kB active_file:105952kB inactive_file:15268kB unevictable:65740kB isolated(anon):0kB isolated(file):0kB mapped:160148kB dirty:1344kB writeback:0kB shmem:69264kB kernel_stack:5696kB pagetables:8048kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 1512.337252][T11948] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1512.366875][T11948] lowmem_reserve[]: 0 2879 7858 7858 [ 1512.372194][T11948] Node 0 DMA32 free:2944852kB boost:0kB min:4128kB low:7056kB high:9984kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948380kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:3528kB free_cma:0kB [ 1512.403734][T11948] lowmem_reserve[]: 0 0 4978 4978 [ 1512.408948][T11948] Node 0 Normal free:4040680kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:149232kB inactive_anon:0kB active_file:105952kB inactive_file:15268kB unevictable:65740kB writepending:1344kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:37952kB local_pcp:23612kB free_cma:0kB [ 1512.442713][T11948] lowmem_reserve[]: 0 0 0 0 [ 1512.447298][T11948] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1512.460198][T11948] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 3*16kB (M) 2*32kB (M) 3*64kB (M) 4*128kB (M) 4*256kB (M) 2*512kB (M) 3*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2944852kB [ 1512.476437][T11948] Node 0 Normal: 4048*4kB (UM) 3597*8kB (UME) 1512*16kB (UME) 2108*32kB (UME) 1518*64kB (UME) 1085*128kB (UME) 840*256kB (UME) 702*512kB (UME) 515*1024kB (UME) 425*2048kB (UME) 414*4096kB (UM) = 4040616kB [ 1512.496640][T11948] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1512.506074][T11948] 64067 total pagecache pages [ 1512.510876][T11948] 40 pages in swap cache [ 1512.515143][T11948] Free swap = 63024kB [ 1512.519195][T11948] Total swap = 124996kB [ 1512.523333][T11948] 2097051 pages RAM [ 1512.527147][T11948] 0 pages HighMem/MovableOnly [ 1512.531862][T11948] 81556 pages reserved [ 1512.583545][T11958] netlink: 'syz.5.27486': attribute type 1 has an invalid length. [ 1512.586707][T11960] 8021q: VLANs not supported on nlmon0 [ 1512.635736][T11976] FAULT_INJECTION: forcing a failure. [ 1512.635736][T11976] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.648763][T11976] CPU: 0 UID: 0 PID: 11976 Comm: syz.5.27490 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1512.648807][T11976] Tainted: [W]=WARN [ 1512.648816][T11976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1512.648860][T11976] Call Trace: [ 1512.648867][T11976] [ 1512.648875][T11976] __dump_stack+0x1d/0x30 [ 1512.648899][T11976] dump_stack_lvl+0x95/0xd0 [ 1512.648920][T11976] dump_stack+0x15/0x1b [ 1512.648939][T11976] should_fail_ex+0x263/0x280 [ 1512.649002][T11976] ? __pfx_proc_alloc_inode+0x10/0x10 [ 1512.649095][T11976] should_failslab+0x8c/0xb0 [ 1512.649201][T11976] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 1512.649228][T11976] ? proc_alloc_inode+0x34/0x90 [ 1512.649262][T11976] ? __pfx_proc_alloc_inode+0x10/0x10 [ 1512.649362][T11976] proc_alloc_inode+0x34/0x90 [ 1512.649393][T11976] alloc_inode+0x40/0x170 [ 1512.649417][T11976] new_inode+0x1d/0xe0 [ 1512.649441][T11976] proc_pid_make_inode+0x1f/0xd0 [ 1512.649478][T11976] proc_fd_instantiate+0x36/0x190 [ 1512.649501][T11976] proc_fill_cache+0x1e5/0x260 [ 1512.649522][T11976] ? __pfx_proc_fd_instantiate+0x10/0x10 [ 1512.649548][T11976] proc_readfd_common+0x29a/0x3d0 [ 1512.649570][T11976] ? __pfx_proc_fd_instantiate+0x10/0x10 [ 1512.649679][T11976] proc_fd_iterate+0x24/0x30 [ 1512.649700][T11976] iterate_dir+0x114/0x330 [ 1512.649736][T11976] __se_sys_getdents+0xd2/0x220 [ 1512.649832][T11976] ? __pfx_filldir+0x10/0x10 [ 1512.649898][T11976] __x64_sys_getdents+0x43/0x50 [ 1512.649989][T11976] x64_sys_call+0xe03/0x3000 [ 1512.650016][T11976] do_syscall_64+0xc0/0x2a0 [ 1512.650049][T11976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1512.650147][T11976] RIP: 0033:0x7fad9114aeb9 [ 1512.650166][T11976] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1512.650185][T11976] RSP: 002b:00007fad8fba7028 EFLAGS: 00000246 ORIG_RAX: 000000000000004e [ 1512.650205][T11976] RAX: ffffffffffffffda RBX: 00007fad913c5fa0 RCX: 00007fad9114aeb9 [ 1512.650291][T11976] RDX: 0000000000001000 RSI: 0000200000000240 RDI: 0000000000000007 [ 1512.650306][T11976] RBP: 00007fad8fba7090 R08: 0000000000000000 R09: 0000000000000000 [ 1512.650322][T11976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1512.650336][T11976] R13: 00007fad913c6038 R14: 00007fad913c5fa0 R15: 00007ffd9d623338 [ 1512.650362][T11976] [ 1512.974815][T27993] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1513.081906][T11996] ref_ctr_offset mismatch. inode: 0x35f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x20 [ 1513.309221][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 1513.309236][ T29] audit: type=1400 audit(2000001998.583:148304): avc: denied { append } for pid=12021 comm="syz.6.27509" name="ptp0" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1513.358392][T12030] FAULT_INJECTION: forcing a failure. [ 1513.358392][T12030] name failslab, interval 1, probability 0, space 0, times 0 [ 1513.371779][T12030] CPU: 1 UID: 0 PID: 12030 Comm: syz.5.27513 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1513.371813][T12030] Tainted: [W]=WARN [ 1513.371821][T12030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1513.371835][T12030] Call Trace: [ 1513.371842][T12030] [ 1513.371852][T12030] __dump_stack+0x1d/0x30 [ 1513.371881][T12030] dump_stack_lvl+0x95/0xd0 [ 1513.371931][T12030] dump_stack+0x15/0x1b [ 1513.372017][T12030] should_fail_ex+0x263/0x280 [ 1513.372047][T12030] should_failslab+0x8c/0xb0 [ 1513.372130][T12030] kmem_cache_alloc_noprof+0x68/0x490 [ 1513.372153][T12030] ? skb_clone+0x151/0x1f0 [ 1513.372254][T12030] skb_clone+0x151/0x1f0 [ 1513.372343][T12030] __netlink_deliver_tap+0x2c9/0x500 [ 1513.372380][T12030] netlink_unicast+0x66b/0x690 [ 1513.372417][T12030] netlink_sendmsg+0x5c8/0x6f0 [ 1513.372503][T12030] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1513.372530][T12030] ____sys_sendmsg+0x5af/0x600 [ 1513.372553][T12030] ___sys_sendmsg+0x195/0x1e0 [ 1513.372613][T12030] __x64_sys_sendmsg+0xd4/0x160 [ 1513.372642][T12030] x64_sys_call+0x17ba/0x3000 [ 1513.372668][T12030] do_syscall_64+0xc0/0x2a0 [ 1513.372697][T12030] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1513.372718][T12030] RIP: 0033:0x7fad9114aeb9 [ 1513.372798][T12030] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1513.372818][T12030] RSP: 002b:00007fad8fba7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1513.372837][T12030] RAX: ffffffffffffffda RBX: 00007fad913c5fa0 RCX: 00007fad9114aeb9 [ 1513.372851][T12030] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000003 [ 1513.372866][T12030] RBP: 00007fad8fba7090 R08: 0000000000000000 R09: 0000000000000000 [ 1513.372901][T12030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1513.372916][T12030] R13: 00007fad913c6038 R14: 00007fad913c5fa0 R15: 00007ffd9d623338 [ 1513.372940][T12030] [ 1513.644702][T12042] netlink: 24 bytes leftover after parsing attributes in process `syz.9.27517'. [ 1513.674775][T12045] netlink: 12 bytes leftover after parsing attributes in process `syz.5.27520'. [ 1513.676399][T12065] FAULT_INJECTION: forcing a failure. [ 1513.676399][T12065] name failslab, interval 1, probability 0, space 0, times 0 [ 1513.696659][T12065] CPU: 0 UID: 0 PID: 12065 Comm: syz.6.27521 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1513.696693][T12065] Tainted: [W]=WARN [ 1513.696699][T12065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1513.696740][T12065] Call Trace: [ 1513.696746][T12065] [ 1513.696755][T12065] __dump_stack+0x1d/0x30 [ 1513.696828][T12065] dump_stack_lvl+0x95/0xd0 [ 1513.696849][T12065] dump_stack+0x15/0x1b [ 1513.696868][T12065] should_fail_ex+0x263/0x280 [ 1513.696906][T12065] should_failslab+0x8c/0xb0 [ 1513.696929][T12065] kmem_cache_alloc_noprof+0x68/0x490 [ 1513.696954][T12065] ? getname_flags+0x7f/0x3b0 [ 1513.697049][T12065] getname_flags+0x7f/0x3b0 [ 1513.697078][T12065] user_path_at+0x28/0x130 [ 1513.697135][T12065] __se_sys_mount+0x25b/0x2e0 [ 1513.697148][T12065] ? fput+0x8f/0xc0 [ 1513.697197][T12065] __x64_sys_mount+0x67/0x80 [ 1513.697210][T12065] x64_sys_call+0x2cca/0x3000 [ 1513.697225][T12065] do_syscall_64+0xc0/0x2a0 [ 1513.697244][T12065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1513.697326][T12065] RIP: 0033:0x7f4a8c5eaeb9 [ 1513.697337][T12065] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1513.697376][T12065] RSP: 002b:00007f4a8b047028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1513.697389][T12065] RAX: ffffffffffffffda RBX: 00007f4a8c865fa0 RCX: 00007f4a8c5eaeb9 [ 1513.697398][T12065] RDX: 0000200000000140 RSI: 0000200000000100 RDI: 0000000000000000 [ 1513.697407][T12065] RBP: 00007f4a8b047090 R08: 00002000000003c0 R09: 0000000000000000 [ 1513.697481][T12065] R10: 0000000002000040 R11: 0000000000000246 R12: 0000000000000001 [ 1513.697489][T12065] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1513.697503][T12065] [ 1513.875976][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1513.884357][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1513.888760][T12068] netlink: 'syz.5.27522': attribute type 13 has an invalid length. [ 1513.952840][T12068] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.960076][T12068] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.987894][ T29] audit: type=1326 audit(2000001999.210:148305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.012454][ T29] audit: type=1326 audit(2000001999.210:148306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.036929][ T29] audit: type=1326 audit(2000001999.210:148307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.060778][ T29] audit: type=1326 audit(2000001999.210:148308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.084958][ T29] audit: type=1326 audit(2000001999.210:148309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.109445][ T29] audit: type=1326 audit(2000001999.210:148310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.134002][ T29] audit: type=1326 audit(2000001999.210:148311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.158689][ T29] audit: type=1326 audit(2000001999.210:148312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.187601][ T29] audit: type=1326 audit(2000001999.284:148313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.6.27523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a8c5eaeb9 code=0x7ffc0000 [ 1514.266346][T12068] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1514.277256][T12068] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1514.363963][T29169] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1514.377562][T29169] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1514.388075][T29169] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1514.397446][T29169] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1514.431889][T12105] netlink: 4 bytes leftover after parsing attributes in process `syz.9.27530'. [ 1514.486439][T12111] FAULT_INJECTION: forcing a failure. [ 1514.486439][T12111] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.499804][T12111] CPU: 1 UID: 0 PID: 12111 Comm: syz.6.27533 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1514.499834][T12111] Tainted: [W]=WARN [ 1514.499841][T12111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1514.499855][T12111] Call Trace: [ 1514.499861][T12111] [ 1514.499869][T12111] __dump_stack+0x1d/0x30 [ 1514.499891][T12111] dump_stack_lvl+0x95/0xd0 [ 1514.499965][T12111] dump_stack+0x15/0x1b [ 1514.499984][T12111] should_fail_ex+0x263/0x280 [ 1514.500050][T12111] should_failslab+0x8c/0xb0 [ 1514.500072][T12111] __kmalloc_node_noprof+0xbd/0x590 [ 1514.500146][T12111] ? mempool_init_node+0xbd/0x250 [ 1514.500176][T12111] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1514.500253][T12111] mempool_init_node+0xbd/0x250 [ 1514.500283][T12111] ? __pfx_mempool_free_slab+0x10/0x10 [ 1514.500325][T12111] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1514.500360][T12111] mempool_init_noprof+0x3a/0x50 [ 1514.500391][T12111] bioset_init+0x37b/0x480 [ 1514.500416][T12111] ? __pfx_no_op+0x10/0x10 [ 1514.500488][T12111] ? percpu_ref_init+0x1dd/0x250 [ 1514.500516][T12111] mddev_init+0xfc/0x420 [ 1514.500553][T12111] ? __pfx_md_probe+0x10/0x10 [ 1514.500577][T12111] md_alloc+0x99/0xa10 [ 1514.500603][T12111] ? vsscanf+0x11c7/0x1270 [ 1514.500623][T12111] ? __pfx_md_probe+0x10/0x10 [ 1514.500647][T12111] md_alloc_and_put+0x18/0x170 [ 1514.500671][T12111] md_probe+0x68/0x80 [ 1514.500694][T12111] blk_request_module+0x1bd/0x1e0 [ 1514.500783][T12111] blkdev_get_no_open+0x4b/0x100 [ 1514.500812][T12111] bdev_file_open_by_dev+0xa5/0x250 [ 1514.500925][T12111] swsusp_check+0x3f/0x290 [ 1514.500944][T12111] software_resume+0x41/0x2f0 [ 1514.501041][T12111] resume_store+0x2d9/0x3d0 [ 1514.501070][T12111] ? __pfx_resume_store+0x10/0x10 [ 1514.501097][T12111] kobj_attr_store+0x4a/0x70 [ 1514.501250][T12111] ? __pfx_kobj_attr_store+0x10/0x10 [ 1514.501269][T12111] sysfs_kf_write+0xfe/0x120 [ 1514.501288][T12111] ? __pfx_sysfs_kf_write+0x10/0x10 [ 1514.501306][T12111] kernfs_fop_write_iter+0x1eb/0x300 [ 1514.501398][T12111] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 1514.501426][T12111] vfs_write+0x5a6/0x9f0 [ 1514.501450][T12111] ksys_write+0xdc/0x1a0 [ 1514.501470][T12111] __x64_sys_write+0x40/0x50 [ 1514.501488][T12111] x64_sys_call+0x2847/0x3000 [ 1514.501547][T12111] do_syscall_64+0xc0/0x2a0 [ 1514.501575][T12111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1514.501596][T12111] RIP: 0033:0x7f4a8c5eaeb9 [ 1514.501612][T12111] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1514.501646][T12111] RSP: 002b:00007f4a8b047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1514.501665][T12111] RAX: ffffffffffffffda RBX: 00007f4a8c865fa0 RCX: 00007f4a8c5eaeb9 [ 1514.501678][T12111] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000003 [ 1514.501690][T12111] RBP: 00007f4a8b047090 R08: 0000000000000000 R09: 0000000000000000 [ 1514.501702][T12111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1514.501778][T12111] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1514.501860][T12111] [ 1514.506987][T12107] FAULT_INJECTION: forcing a failure. [ 1514.506987][T12107] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.514933][T12111] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1514.517531][T12107] CPU: 0 UID: 0 PID: 12107 Comm: syz.9.27531 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1514.517566][T12107] Tainted: [W]=WARN [ 1514.517574][T12107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1514.517593][T12107] Call Trace: [ 1514.517601][T12107] [ 1514.517611][T12107] __dump_stack+0x1d/0x30 [ 1514.517636][T12107] dump_stack_lvl+0x95/0xd0 [ 1514.517661][T12107] dump_stack+0x15/0x1b [ 1514.517682][T12107] should_fail_ex+0x263/0x280 [ 1514.517724][T12107] should_failslab+0x8c/0xb0 [ 1514.517748][T12107] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 1514.517777][T12107] ? __alloc_skb+0x2f0/0x4b0 [ 1514.517887][T12107] __alloc_skb+0x2f0/0x4b0 [ 1514.517920][T12107] ? __alloc_skb+0x219/0x4b0 [ 1514.517951][T12107] audit_log_start+0x3aa/0x730 [ 1514.518040][T12107] ? kstrtouint+0x76/0xc0 [ 1514.518102][T12107] audit_seccomp+0x47/0x100 [ 1514.518128][T12107] ? __seccomp_filter+0x8db/0x1350 [ 1514.518172][T12107] __seccomp_filter+0x8ec/0x1350 [ 1514.518264][T12107] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1514.518294][T12107] ? vfs_write+0x86e/0x9f0 [ 1514.518323][T12107] __secure_computing+0x81/0x150 [ 1514.518375][T12107] syscall_trace_enter+0xce/0x1e0 [ 1514.518518][T12107] do_syscall_64+0x9a/0x2a0 [ 1514.518552][T12107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1514.518677][T12107] RIP: 0033:0x7ff7a5acaeb9 [ 1514.518695][T12107] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1514.518714][T12107] RSP: 002b:00007ff7a4527028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1514.518736][T12107] RAX: ffffffffffffffda RBX: 00007ff7a5d45fa0 RCX: 00007ff7a5acaeb9 [ 1514.518751][T12107] RDX: 0000000000000800 RSI: 0000200000000200 RDI: 000000000000000c [ 1514.518809][T12107] RBP: 00007ff7a4527090 R08: 0000000000000000 R09: 0000000000000000 [ 1514.518823][T12107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1514.518837][T12107] R13: 00007ff7a5d46038 R14: 00007ff7a5d45fa0 R15: 00007ffea0db5c58 [ 1514.518860][T12107] [ 1515.311073][T12131] pim6reg: entered allmulticast mode [ 1515.321680][T12139] FAULT_INJECTION: forcing a failure. [ 1515.321680][T12139] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.324386][T12131] pim6reg: left allmulticast mode [ 1515.334364][T12139] CPU: 0 UID: 0 PID: 12139 Comm: syz.6.27541 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1515.334433][T12139] Tainted: [W]=WARN [ 1515.334440][T12139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1515.334454][T12139] Call Trace: [ 1515.334462][T12139] [ 1515.334472][T12139] __dump_stack+0x1d/0x30 [ 1515.334500][T12139] dump_stack_lvl+0x95/0xd0 [ 1515.334578][T12139] dump_stack+0x15/0x1b [ 1515.334600][T12139] should_fail_ex+0x263/0x280 [ 1515.334637][T12139] should_failslab+0x8c/0xb0 [ 1515.334708][T12139] kmem_cache_alloc_noprof+0x68/0x490 [ 1515.334751][T12139] ? audit_log_start+0x34c/0x730 [ 1515.334809][T12139] audit_log_start+0x34c/0x730 [ 1515.334890][T12139] audit_seccomp+0x47/0x100 [ 1515.334985][T12139] ? __seccomp_filter+0x8db/0x1350 [ 1515.335035][T12139] __seccomp_filter+0x8ec/0x1350 [ 1515.335059][T12139] ? __pfx_key_default_cmp+0x10/0x10 [ 1515.335101][T12139] ? __se_sys_request_key+0x26c/0x2a0 [ 1515.335131][T12139] ? __se_sys_request_key+0x26c/0x2a0 [ 1515.335159][T12139] ? kfree+0x10a/0x3b0 [ 1515.335186][T12139] __secure_computing+0x81/0x150 [ 1515.335321][T12139] syscall_trace_enter+0xce/0x1e0 [ 1515.335428][T12139] do_syscall_64+0x9a/0x2a0 [ 1515.335462][T12139] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1515.335486][T12139] RIP: 0033:0x7f4a8c5ab78e [ 1515.335505][T12139] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1515.335523][T12139] RSP: 002b:00007f4a8b046fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1515.335616][T12139] RAX: ffffffffffffffda RBX: 00007f4a8b0476c0 RCX: 00007f4a8c5ab78e [ 1515.335632][T12139] RDX: 000000000000000f RSI: 00007f4a8b0470a0 RDI: 0000000000000003 [ 1515.335646][T12139] RBP: 00007f4a8b047090 R08: 0000000000000000 R09: 0000000000000000 [ 1515.335661][T12139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1515.335675][T12139] R13: 00007f4a8c866038 R14: 00007f4a8c865fa0 R15: 00007ffddf78c608 [ 1515.335700][T12139] [ 1515.392769][T12144] block device autoloading is deprecated and will be removed. [ 1515.407191][T12147] udevd[12147]: inotify_add_watch(7, /dev/loop10, 10) failed: No such file or directory [ 1515.661684][T12166] FAULT_INJECTION: forcing a failure. [ 1515.661684][T12166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1515.674841][T12166] CPU: 0 UID: 0 PID: 12166 Comm: syz.9.27549 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1515.674881][T12166] Tainted: [W]=WARN [ 1515.674889][T12166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1515.674916][T12166] Call Trace: [ 1515.674924][T12166] [ 1515.674933][T12166] __dump_stack+0x1d/0x30 [ 1515.674980][T12166] dump_stack_lvl+0x95/0xd0 [ 1515.675005][T12166] dump_stack+0x15/0x1b [ 1515.675028][T12166] should_fail_ex+0x263/0x280 [ 1515.675073][T12166] should_fail+0xb/0x20 [ 1515.675105][T12166] should_fail_usercopy+0x1a/0x20 [ 1515.675140][T12166] _copy_from_iter+0xcf/0xea0 [ 1515.675194][T12166] ? __alloc_skb+0x397/0x4b0 [ 1515.675231][T12166] ? __alloc_skb+0x219/0x4b0 [ 1515.675264][T12166] netlink_sendmsg+0x4ae/0x6f0 [ 1515.675341][T12166] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1515.675359][T12166] ____sys_sendmsg+0x5af/0x600 [ 1515.675382][T12166] ___sys_sendmsg+0x195/0x1e0 [ 1515.675474][T12166] __x64_sys_sendmsg+0xd4/0x160 [ 1515.675490][T12166] x64_sys_call+0x17ba/0x3000 [ 1515.675505][T12166] do_syscall_64+0xc0/0x2a0 [ 1515.675560][T12166] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1515.675612][T12166] RIP: 0033:0x7ff7a5acaeb9 [ 1515.675623][T12166] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1515.675634][T12166] RSP: 002b:00007ff7a4527028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1515.675684][T12166] RAX: ffffffffffffffda RBX: 00007ff7a5d45fa0 RCX: 00007ff7a5acaeb9 [ 1515.675697][T12166] RDX: 0000000000000802 RSI: 00002000000003c0 RDI: 0000000000000040 [ 1515.675705][T12166] RBP: 00007ff7a4527090 R08: 0000000000000000 R09: 0000000000000000 [ 1515.675714][T12166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1515.675722][T12166] R13: 00007ff7a5d46038 R14: 00007ff7a5d45fa0 R15: 00007ffea0db5c58 [ 1515.675736][T12166] [ 1515.690935][T13589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1515.768315][T12184] netlink: 8 bytes leftover after parsing attributes in process `syz.7.27552'. [ 1515.899329][T12156] chnl_net:caif_netlink_parms(): no params data found [ 1516.034903][T12156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1516.042022][T12156] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.049480][T12156] bridge_slave_0: entered allmulticast mode [ 1516.056904][T12156] bridge_slave_0: entered promiscuous mode [ 1516.064848][T12156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1516.071979][T12156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1516.079734][T13589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1516.088688][T12156] bridge_slave_1: entered allmulticast mode [ 1516.096086][T12156] bridge_slave_1: entered promiscuous mode [ 1516.164679][T12156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1516.176288][T27993] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1516.186556][T12156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1516.211613][T12156] team0: Port device team_slave_0 added [ 1516.219568][T12156] team0: Port device team_slave_1 added [ 1516.249409][T12156] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1516.257216][T12156] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1516.283846][T12156] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1516.311865][T12156] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1516.318841][T12156] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1516.345463][T12156] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1516.427770][T12156] hsr_slave_0: entered promiscuous mode [ 1516.433912][T12156] hsr_slave_1: entered promiscuous mode [ 1516.453886][T12156] debugfs: 'hsr0' already exists in 'hsr' [ 1516.460399][T12156] Cannot create hsr debugfs directory [ 1516.576176][T13589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1516.662435][T18271] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1516.711655][T12521] syzkaller0: entered promiscuous mode [ 1516.717394][T12521] syzkaller0: entered allmulticast mode [ 1516.865075][T12556] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1517.164266][T18271] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1517.176448][T12156] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1517.230814][T12625] netlink: 'syz.6.27593': attribute type 19 has an invalid length. [ 1517.238815][T12625] __nla_validate_parse: 4 callbacks suppressed [ 1517.245107][T12625] netlink: 4 bytes leftover after parsing attributes in process `syz.6.27593'. [ 1517.260505][T12156] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1517.280090][T12156] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1517.304800][T12156] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1517.333849][T29170] netdevsim netdevsim6 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1517.343209][T29170] netdevsim netdevsim6 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1517.354230][T12625] netlink: 'syz.6.27593': attribute type 19 has an invalid length. [ 1517.362924][T12625] netlink: 4 bytes leftover after parsing attributes in process `syz.6.27593'. [ 1517.499614][T29170] netdevsim netdevsim6 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1517.532172][T29170] netdevsim netdevsim6 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1517.582450][T12156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1517.597887][T12156] 8021q: adding VLAN 0 to HW filter on device team0 [ 1517.614665][ T4533] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1517.616302][T29170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1517.629846][T29170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1517.657140][T12674] netlink: 132 bytes leftover after parsing attributes in process `syz.7.27602'. [ 1517.681552][T29170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.688716][T29170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1517.821837][T12686] netlink: 16 bytes leftover after parsing attributes in process `syz.5.27604'. [ 1517.935132][T12700] netlink: 132 bytes leftover after parsing attributes in process `syz.6.27607'. [ 1517.937715][T12733] netlink: 32 bytes leftover after parsing attributes in process `syz.5.27609'. [ 1517.983290][T12156] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1518.181855][T12156] veth0_vlan: entered promiscuous mode [ 1518.211541][T12156] veth1_vlan: entered promiscuous mode [ 1518.271684][T12156] veth0_macvtap: entered promiscuous mode [ 1518.297062][T12156] veth1_macvtap: entered promiscuous mode [ 1518.333993][T12156] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1518.364751][T12156] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1518.403542][T29165] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1518.572859][T29165] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1518.598763][T29165] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1518.642760][T29165] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1518.652431][T18271] net_ratelimit: 2 callbacks suppressed [ 1518.652513][T18271] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1518.666568][ T29] kauditd_printk_skb: 324 callbacks suppressed [ 1518.666583][ T29] audit: type=1326 audit(2000002003.578:148634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1518.750640][ T29] audit: type=1326 audit(2000002003.597:148635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1518.774521][ T29] audit: type=1326 audit(2000002003.597:148636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1518.798323][ T29] audit: type=1326 audit(2000002003.597:148637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1518.934115][ T29] audit: type=1326 audit(2000002003.774:148638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1518.957999][ T29] audit: type=1326 audit(2000002003.774:148639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1518.981753][ T29] audit: type=1326 audit(2000002003.774:148640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1519.005542][ T29] audit: type=1326 audit(2000002003.774:148641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1519.029299][ T29] audit: type=1326 audit(2000002003.784:148642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1519.053059][ T29] audit: type=1326 audit(2000002003.784:148643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12779 comm="syz.3.27545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042c62aeb9 code=0x7ffc0000 [ 1519.149738][T12800] syzkaller0: entered promiscuous mode [ 1519.155344][T12800] syzkaller0: entered allmulticast mode [ 1519.386277][T18271] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 1519.407745][T18271] hid-generic 0000:0000:0000.0030: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1519.421552][T12823] netlink: 4 bytes leftover after parsing attributes in process `syz.5.27623'. [ 1519.459842][T12843] fido_id[12843]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1519.758346][T12874] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 1520.513856][T12950] netlink: 132 bytes leftover after parsing attributes in process `syz.7.27648'. [ 1520.555725][T12954] vlan2: entered promiscuous mode [ 1520.560806][T12954] bridge0: entered promiscuous mode [ 1520.654535][T12968] netlink: 40 bytes leftover after parsing attributes in process `syz.7.27651'. [ 1520.658511][T12963] netlink: 8 bytes leftover after parsing attributes in process `syz.3.27652'. [ 1520.674090][T12969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12969 comm=syz.3.27652 [ 1520.676915][T12963] vlan3: entered allmulticast mode [ 1520.989689][T12983] netlink: 'syz.9.27658': attribute type 13 has an invalid length. [ 1520.998429][T12983] gretap0: refused to change device tx_queue_len [ 1521.004824][T12983] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 1521.141234][T12988] ref_ctr_offset mismatch. inode: 0xaaf offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x20 [ 1521.279582][T12996] pim6reg: entered allmulticast mode [ 1521.359880][T13004] pim6reg: left allmulticast mode [ 1522.110323][T13075] FAULT_INJECTION: forcing a failure. [ 1522.110323][T13075] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.123030][T13075] CPU: 0 UID: 0 PID: 13075 Comm: syz.7.27684 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1522.123136][T13075] Tainted: [W]=WARN [ 1522.123142][T13075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1522.123154][T13075] Call Trace: [ 1522.123161][T13075] [ 1522.123170][T13075] __dump_stack+0x1d/0x30 [ 1522.123226][T13075] dump_stack_lvl+0x95/0xd0 [ 1522.123246][T13075] dump_stack+0x15/0x1b [ 1522.123265][T13075] should_fail_ex+0x263/0x280 [ 1522.123293][T13075] should_failslab+0x8c/0xb0 [ 1522.123315][T13075] kmem_cache_alloc_noprof+0x68/0x490 [ 1522.123380][T13075] ? _sctp_make_chunk+0xbf/0x210 [ 1522.123412][T13075] _sctp_make_chunk+0xbf/0x210 [ 1522.123441][T13075] sctp_make_abort_user+0x4c/0x3a0 [ 1522.123485][T13075] sctp_sendmsg_check_sflags+0x17e/0x1e0 [ 1522.123507][T13075] sctp_sendmsg+0x7a7/0x1d60 [ 1522.123569][T13075] ? selinux_socket_sendmsg+0x192/0x1c0 [ 1522.123592][T13075] ? __pfx_sctp_sendmsg+0x10/0x10 [ 1522.123610][T13075] inet_sendmsg+0xc5/0xd0 [ 1522.123665][T13075] ____sys_sendmsg+0x53a/0x600 [ 1522.123689][T13075] ___sys_sendmsg+0x195/0x1e0 [ 1522.123726][T13075] __sys_sendmmsg+0x185/0x320 [ 1522.123757][T13075] __x64_sys_sendmmsg+0x57/0x70 [ 1522.123776][T13075] x64_sys_call+0x1e28/0x3000 [ 1522.123873][T13075] do_syscall_64+0xc0/0x2a0 [ 1522.123903][T13075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1522.123955][T13075] RIP: 0033:0x7f6272c5aeb9 [ 1522.123971][T13075] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1522.123987][T13075] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1522.124007][T13075] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1522.124025][T13075] RDX: 0000000000000001 RSI: 00002000000032c0 RDI: 0000000000000004 [ 1522.124038][T13075] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1522.124050][T13075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1522.124062][T13075] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1522.124083][T13075] [ 1522.409919][T13093] tipc: Started in network mode [ 1522.414933][T13093] tipc: Node identity , cluster identity 4711 [ 1522.421012][T13093] tipc: Failed to set node id, please configure manually [ 1522.428060][T13093] tipc: Enabling of bearer rejected, failed to enable media [ 1522.528636][T13118] netlink: 'syz.5.27699': attribute type 16 has an invalid length. [ 1522.565589][T13130] FAULT_INJECTION: forcing a failure. [ 1522.565589][T13130] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.578406][T13130] CPU: 1 UID: 0 PID: 13130 Comm: syz.3.27700 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1522.578501][T13130] Tainted: [W]=WARN [ 1522.578505][T13130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1522.578513][T13130] Call Trace: [ 1522.578517][T13130] [ 1522.578523][T13130] __dump_stack+0x1d/0x30 [ 1522.578546][T13130] dump_stack_lvl+0x95/0xd0 [ 1522.578676][T13130] dump_stack+0x15/0x1b [ 1522.578688][T13130] should_fail_ex+0x263/0x280 [ 1522.578707][T13130] should_failslab+0x8c/0xb0 [ 1522.578722][T13130] kmem_cache_alloc_noprof+0x68/0x490 [ 1522.578782][T13130] ? skb_clone+0x151/0x1f0 [ 1522.578796][T13130] skb_clone+0x151/0x1f0 [ 1522.578808][T13130] __netlink_deliver_tap+0x2c9/0x500 [ 1522.578831][T13130] netlink_unicast+0x66b/0x690 [ 1522.578938][T13130] netlink_sendmsg+0x5c8/0x6f0 [ 1522.578952][T13130] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1522.578977][T13130] ____sys_sendmsg+0x5af/0x600 [ 1522.579028][T13130] ___sys_sendmsg+0x195/0x1e0 [ 1522.579050][T13130] __x64_sys_sendmsg+0xd4/0x160 [ 1522.579065][T13130] x64_sys_call+0x17ba/0x3000 [ 1522.579080][T13130] do_syscall_64+0xc0/0x2a0 [ 1522.579156][T13130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1522.579270][T13130] RIP: 0033:0x7f042c62aeb9 [ 1522.579356][T13130] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1522.579368][T13130] RSP: 002b:00007f042b087028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1522.579381][T13130] RAX: ffffffffffffffda RBX: 00007f042c8a5fa0 RCX: 00007f042c62aeb9 [ 1522.579406][T13130] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000004 [ 1522.579414][T13130] RBP: 00007f042b087090 R08: 0000000000000000 R09: 0000000000000000 [ 1522.579423][T13130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1522.579430][T13130] R13: 00007f042c8a6038 R14: 00007f042c8a5fa0 R15: 00007ffe946d71f8 [ 1522.579515][T13130] [ 1522.868287][T13157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1522.880209][T13157] bridge_slave_0 (unregistering): left promiscuous mode [ 1522.887371][T13157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1522.910076][T13159] FAULT_INJECTION: forcing a failure. [ 1522.910076][T13159] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1522.926137][T13159] CPU: 1 UID: 0 PID: 13159 Comm: syz.7.27710 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1522.926183][T13159] Tainted: [W]=WARN [ 1522.926188][T13159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1522.926196][T13159] Call Trace: [ 1522.926200][T13159] [ 1522.926205][T13159] __dump_stack+0x1d/0x30 [ 1522.926221][T13159] dump_stack_lvl+0x95/0xd0 [ 1522.926262][T13159] dump_stack+0x15/0x1b [ 1522.926282][T13159] should_fail_ex+0x263/0x280 [ 1522.926347][T13159] should_fail_alloc_page+0xf2/0x100 [ 1522.926374][T13159] __alloc_frozen_pages_noprof+0x108/0x350 [ 1522.926407][T13159] alloc_pages_mpol+0xb3/0x260 [ 1522.926450][T13159] ? count_memcg_events+0x91/0x200 [ 1522.926477][T13159] vma_alloc_folio_noprof+0x1a9/0x300 [ 1522.926533][T13159] handle_mm_fault+0x111f/0x3030 [ 1522.926568][T13159] ? mt_find+0x291/0x3b0 [ 1522.926665][T13159] do_user_addr_fault+0x3fd/0x1050 [ 1522.926699][T13159] exc_page_fault+0x62/0xa0 [ 1522.926724][T13159] asm_exc_page_fault+0x26/0x30 [ 1522.926787][T13159] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 1522.926865][T13159] Code: cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 1522.926885][T13159] RSP: 0018:ffffc90005ad7d38 EFLAGS: 00050206 [ 1522.926924][T13159] RAX: ffff88811b634c90 RBX: 0000000000001000 RCX: 0000000000000f40 [ 1522.926938][T13159] RDX: 0000000000000000 RSI: ffff8881454470c0 RDI: 0000200000016000 [ 1522.926951][T13159] RBP: ffff888145447000 R08: 00000000000003f4 R09: 0000000000000000 [ 1522.926968][T13159] R10: 0001888145447000 R11: 0001888145447fff R12: 0000200000016f40 [ 1522.926984][T13159] R13: 00007ffffffff000 R14: 0000200000015f40 R15: ffff888145447000 [ 1522.927009][T13159] _copy_to_user+0x7c/0xa0 [ 1522.927099][T13159] pagemap_read+0x3ac/0x610 [ 1522.927127][T13159] ? __pfx_pagemap_read+0x10/0x10 [ 1522.927247][T13159] vfs_read+0x1ab/0x7f0 [ 1522.927266][T13159] ? __rcu_read_unlock+0x4e/0x70 [ 1522.927322][T13159] ? __fget_files+0x184/0x1c0 [ 1522.927347][T13159] ? mutex_unlock+0x4e/0x90 [ 1522.927386][T13159] __x64_sys_pread64+0xfd/0x150 [ 1522.927451][T13159] x64_sys_call+0x281b/0x3000 [ 1522.927481][T13159] do_syscall_64+0xc0/0x2a0 [ 1522.927523][T13159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1522.927581][T13159] RIP: 0033:0x7f6272c5aeb9 [ 1522.927596][T13159] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1522.927613][T13159] RSP: 002b:00007f62716b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1522.927697][T13159] RAX: ffffffffffffffda RBX: 00007f6272ed5fa0 RCX: 00007f6272c5aeb9 [ 1522.927712][T13159] RDX: 0000000000019000 RSI: 0000200000001240 RDI: 0000000000000005 [ 1522.927727][T13159] RBP: 00007f62716b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1522.927739][T13159] R10: 0000001000000300 R11: 0000000000000246 R12: 0000000000000002 [ 1522.927811][T13159] R13: 00007f6272ed6038 R14: 00007f6272ed5fa0 R15: 00007ffe611649a8 [ 1522.927869][T13159] [ 1523.252799][T13175] xt_hashlimit: size too large, truncated to 1048576 [ 1523.261975][T13171] __nla_validate_parse: 9 callbacks suppressed [ 1523.262064][T13171] netlink: 120 bytes leftover after parsing attributes in process `syz.9.27711'. [ 1523.379857][T13194] 9pnet_fd: Insufficient options for proto=fd [ 1523.389359][T13194] 9p: Bad value for 'rfdno' [ 1523.436873][T13207] netlink: 8 bytes leftover after parsing attributes in process `syz.6.27722'. [ 1523.508367][T13223] syzkaller0: entered promiscuous mode [ 1523.513881][T13223] syzkaller0: entered allmulticast mode [ 1523.536278][T13223] 0: reclassify loop, rule prio 0, protocol 800 [ 1523.901625][T13297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.27750'. [ 1523.916184][T13297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.27750'. [ 1523.926037][T13297] FAULT_INJECTION: forcing a failure. [ 1523.926037][T13297] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.938711][T13297] CPU: 1 UID: 0 PID: 13297 Comm: syz.3.27750 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1523.938750][T13297] Tainted: [W]=WARN [ 1523.938758][T13297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1523.938771][T13297] Call Trace: [ 1523.938778][T13297] [ 1523.938787][T13297] __dump_stack+0x1d/0x30 [ 1523.938814][T13297] dump_stack_lvl+0x95/0xd0 [ 1523.938899][T13297] dump_stack+0x15/0x1b [ 1523.938918][T13297] should_fail_ex+0x263/0x280 [ 1523.939043][T13297] should_failslab+0x8c/0xb0 [ 1523.939102][T13297] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 1523.939133][T13297] ? __alloc_skb+0x2f0/0x4b0 [ 1523.939193][T13297] __alloc_skb+0x2f0/0x4b0 [ 1523.939223][T13297] ? __alloc_skb+0x219/0x4b0 [ 1523.939306][T13297] fdb_notify+0x6e/0x120 [ 1523.939337][T13297] fdb_delete+0x5e1/0x730 [ 1523.939368][T13297] fdb_delete_local+0x230/0x2f0 [ 1523.939440][T13297] br_fdb_delete_by_port+0x168/0x220 [ 1523.939480][T13297] br_dev_delete+0x8e/0xe0 [ 1523.939498][T13297] ? __pfx_br_dev_delete+0x10/0x10 [ 1523.939517][T13297] rtnl_dellink+0x425/0x630 [ 1523.939597][T13297] ? selinux_capable+0x31/0x40 [ 1523.939620][T13297] ? security_capable+0x7b/0x90 [ 1523.939649][T13297] ? ns_capable+0x7c/0xb0 [ 1523.939673][T13297] ? __pfx_rtnl_dellink+0x10/0x10 [ 1523.939720][T13297] rtnetlink_rcv_msg+0x64b/0x720 [ 1523.939751][T13297] netlink_rcv_skb+0x123/0x220 [ 1523.939784][T13297] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1523.939818][T13297] rtnetlink_rcv+0x1c/0x30 [ 1523.939896][T13297] netlink_unicast+0x5c0/0x690 [ 1523.939951][T13297] netlink_sendmsg+0x5c8/0x6f0 [ 1523.940021][T13297] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1523.940100][T13297] ____sys_sendmsg+0x5af/0x600 [ 1523.940127][T13297] ___sys_sendmsg+0x195/0x1e0 [ 1523.940163][T13297] __x64_sys_sendmsg+0xd4/0x160 [ 1523.940262][T13297] x64_sys_call+0x17ba/0x3000 [ 1523.940303][T13297] do_syscall_64+0xc0/0x2a0 [ 1523.940336][T13297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1523.940394][T13297] RIP: 0033:0x7f042c62aeb9 [ 1523.940412][T13297] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1523.940441][T13297] RSP: 002b:00007f042b087028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1523.940464][T13297] RAX: ffffffffffffffda RBX: 00007f042c8a5fa0 RCX: 00007f042c62aeb9 [ 1523.940570][T13297] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000006 [ 1523.940586][T13297] RBP: 00007f042b087090 R08: 0000000000000000 R09: 0000000000000000 [ 1523.940601][T13297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1523.940615][T13297] R13: 00007f042c8a6038 R14: 00007f042c8a5fa0 R15: 00007ffe946d71f8 [ 1523.940640][T13297] [ 1523.947920][T13301] netlink: 12 bytes leftover after parsing attributes in process `syz.9.27751'. [ 1524.308529][T13313] ================================================================== [ 1524.316643][T13313] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 1524.323944][T13313] [ 1524.326255][T13313] write to 0xffff88810d283e00 of 8 bytes by task 13311 on cpu 0: [ 1524.333956][T13313] mas_wmb_replace+0x20d/0x1610 [ 1524.338811][T13313] mas_wr_store_entry+0x16b6/0x2e70 [ 1524.344005][T13313] mas_store_prealloc+0x72e/0xa60 [ 1524.349022][T13313] vma_complete+0x3f7/0x820 [ 1524.353527][T13313] __split_vma+0x5e3/0x660 [ 1524.357932][T13313] vma_modify+0xbcb/0xd30 [ 1524.362250][T13313] vma_modify_flags+0x182/0x210 [ 1524.367087][T13313] mprotect_fixup+0x30e/0x5e0 [ 1524.371756][T13313] do_mprotect_pkey+0x67b/0x920 [ 1524.376599][T13313] __x64_sys_mprotect+0x48/0x60 [ 1524.381528][T13313] x64_sys_call+0x2c3b/0x3000 [ 1524.386201][T13313] do_syscall_64+0xc0/0x2a0 [ 1524.390699][T13313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1524.396582][T13313] [ 1524.398893][T13313] read to 0xffff88810d283e00 of 8 bytes by task 13313 on cpu 1: [ 1524.406511][T13313] mas_state_walk+0x485/0x650 [ 1524.411181][T13313] mas_walk+0x60/0x150 [ 1524.415249][T13313] lock_vma_under_rcu+0xc9/0x210 [ 1524.420184][T13313] do_user_addr_fault+0x232/0x1050 [ 1524.425290][T13313] exc_page_fault+0x62/0xa0 [ 1524.429786][T13313] asm_exc_page_fault+0x26/0x30 [ 1524.434628][T13313] [ 1524.436934][T13313] value changed: 0xffff8881318b43c1 -> 0xffff88810d283e00 [ 1524.444025][T13313] [ 1524.446351][T13313] Reported by Kernel Concurrency Sanitizer on: [ 1524.452487][T13313] CPU: 1 UID: 0 PID: 13313 Comm: syz.9.27755 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1524.463935][T13313] Tainted: [W]=WARN [ 1524.467721][T13313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1524.477774][T13313] ==================================================================