last executing test programs: 13m19.275932636s ago: executing program 32 (id=498): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e21, 0x401de1a3, @private1, 0x10001}, {0xa, 0x4e21, 0x101, @private2, 0x1}, 0x0, {[0x4, 0x5, 0x200, 0x1, 0x1, 0x3, 0x10000, 0x2]}}, 0x5c) r0 = add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000840), 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000024c0)=""/209, 0xd1, 0x8) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_int(r1, 0x0, 0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x2, 0x9}, 0x112260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) link(0x0, 0x0) io_uring_setup(0xf08, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x94}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000051}, 0x20040004) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "6779885857dbf75a4b833acedfc4701122b95cd95a7cc9ea6d9566bc728ba7a56a421dc4e812a9e2faae8a00ce721eb13ca48bea2e85ad13b3348c86b49b3417", 0x18}, 0x48, 0xfffffffffffffff9) shutdown(r2, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e20, 0x0, @loopback, 0x7}}, 0x0, 0x0, 0x47, 0x0, "09be2271b78506e6dd938d324c415acd403a4480fd1afa34432bcdfa64d957e93efafd27ad06a6f589bb643f167cf0fcd370239aaa93f6ded3c5032c96ead0cdc68474d402ab73e482db7ec1e0a57489"}, 0xd8) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fchdir(r3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018}, './file0\x00'}) 12m55.411672794s ago: executing program 33 (id=757): r0 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000280)='./file1\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0xfd, 0x727, &(0x7f0000000a00)="$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") (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x80000}, 0x50) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x16, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000fcffffff000000000946000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000002850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syncfs(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 12m15.935666878s ago: executing program 34 (id=1173): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x2}, 0x1004, 0x0, 0x10000, 0x3, 0x2, 0x80004001, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) symlinkat(&(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00') r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x40045431, 0x0) socket$packet(0x11, 0x2, 0x300) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x500, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWSET={0x14, 0x12, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x20}}], {0x14}}, 0x3c}}, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x10448) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r6, 0x0) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f0000000000)=0x5, 0x4) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r7, 0x0) syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(r7, 0xc17a) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) mbind(&(0x7f000057f000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x2, 0x3) mmap(&(0x7f00003c1000/0x4000)=nil, 0x4000, 0x100000c, 0x13, r7, 0xa49d3000) mremap(&(0x7f000008f000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000486000/0x1000)=nil) 5m27.177835002s ago: executing program 35 (id=3754): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x200, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x208, 0x2, @perf_bp={0x0}, 0xc224, 0x2, 0x8, 0x0, 0x8000, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x10) io_uring_setup(0x56ac, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0x77}) (fail_nth: 4) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000940)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x7ffffff7) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7786}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x7b}}]}, 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0xfffffffffffffd5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) futex(0x0, 0x0, 0x0, &(0x7f0000000240)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x2, 0x0, &(0x7f0000048000)=0x1, 0x0) 4m58.717704719s ago: executing program 36 (id=3944): r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) lseek(0xffffffffffffffff, 0x1000000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{0x0}], 0x1) io_uring_setup(0x7, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_dev$evdev(&(0x7f0000000140), 0x3, 0x4600) writev(r1, &(0x7f0000001700)=[{&(0x7f0000000240)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad69e59ea10000000106040000000000f93132", 0x39}, {&(0x7f0000000600)="b25872b05c3d8d1294f59cec9f0ec50bf8ab393685e534744d834ea630d26ef4d56181656eb35783dcac5f92e249f33c170cb32f9829a3a2282d92a20003802ac76ce5d781a24021cccefa34cf07b84811de751bf3f184375e813ef40dd7f30f01b01d7a72b4c01de2ac6563a767fc1ba5dfa065bafc25b82e578343963141d08b0ce238f5bdd3b5d45a05a56cc9eb1c3ffc4a3955f59a57544041660ae36e7bdcb8017d04eaf61eed43875c74206b2f58759f94a73727406f7e68b6fb00", 0xbe}, {&(0x7f00000006c0)="9535cd5ed3b2c931c907f68f1aba29ab8965a899518d18d88d83ebecbb25f3af04c879c3f8a856f47d4c44a602ba5b705968e0674701a102cb80d13cc08850f62f525a046af83820116071e639882ad911ff598ade7b9a929c43ac8d01b5220bc090af8da527158f4ba1d5b4b230a40399668bd42b3da51fec9cbd4f99997741f955426692915a4b725434c5aba804dd6307a2c10153c82f582b1c0dfc3c8fea47483f7b2f0122a6a1f85fc2b3783c54f02b3566084ad1d0e288147e3e0c2d9ad0709f1582e1a49faa2ec75261699797828f7536f6e48cd59aebffb25a91888c731eb318b21166e5523abc1c90258219fecb27f84ed622265625ed6e069c3c5c20e598c54c45f1fc046dfdb6de1e26e0a2dfdb86a4ae289f3eaadcfa462176af02241281ac515c92771d1979e654dcd2bd3622101703b2f2608a260d11a31913d37fd508bcb29f57e65bbe5cc4f2c793abcc56ee3c2c0f1aa3cf13c958e9e4686723934e27cb1ba957a73b58c7383b084034de32db4c58e8fe40773635179e585a1c433834bd20ee1228b3ca03c831a1e59c94aef835915ecc9d1ba1ba822aa71d85d370bb3522cfe8a03cfa821730806f7ea6c0ba230efa9ab1fa0fe02deaf0150000000000000040fe2ef41fa3c729c0899ff799c677d6e17abad434995f556a3764d03b9b5155c1b72bfbfd93e77e26ca73e45a191c4a53ce16751e0e293f03f4ea143bd5329647c25445e3a630e49448260744b4fbec3eb4d1dee0c33f624845ac23ce4c9c4379e59606b73d0a3d76255a9a60a2a170a76922a45df0f8e59e10b704a6cab7aa3055488102735f89de11caba8f260da7dc01f25b96c2325dc8782b2aa0055dd921995f2d8481946ece0fbde5dc3fa3a82c4294f67ebbe83fd0baf8d7db3141d63442e679f19188f8c03b848b39d5c0eb6fe36574535cbf61f33fa0fea63055a3bf3d835529d55c3ba67710b2ec56c7bf12952e3db0a523f0111e0c4ce8d0b35a9b6f66ad4084308457a1e2381f728bddd58a4ec88e97e5c07f02ef3188f411ea2b153f657c3977c35c0cf9662304cba981dec427388c7d2ec66646a2e57dc0be43b390c9ed5a621a6a395bf35e0da5151f5b41925210410154345da8e8e954a61a05063348775ac2f2be7ba2085b22372f7898f0983fca7e5b293d0dabc688f4aa6486b3c9df0af7b1c50905dbc8f10dcf1ec34f1e3fcf806e76d7160080221214d9b7d07abca2d43ca4fecfd8c8a59c84fe93a54ffa319792e091693738d21ac546bc7b4b5a8ea576f3ca0fda8d24a2605a50f81d0aa45b779643403dd92ca7472d4029671aef6a2d492ddc2bb64bf972d207dc3f0e3dc35f39c6377d07ff1f674eedf676ebad6324ef50e79940b8b29b13a69bc5dedd8ba09ad916f63f609d0688555191c038ca5c14b1e8671a52de8846b6eae8a7e09548307db59b46d4b34abdd9463f680decad6d2701c6f4775b6f3dc370f6d84a7828771b285f504672144e5060361a39018af32bf66e60c03621d4d93bcca8cdc4f9578eb73e59b1e4ee5a7495847fbdf149ce0e9727c711dcc2c1d9a4c1f21e0eeb9bda44db0e5f38cf2464a6f64e2364c8947e1bcbfb6c61c6e6b89893ba1feb1ae9c8cd1b750c1f821b044be35937a7bcec7bf10cd8a97984e8ea196c443f2cb62ef770d9913754f7a9db536b7d94836c4151d2674a8109a83989d6eb9977b8e35874cee288906d92d1008b5dd37c0bd31c1fa27621b02b61fc456cb15e2b7e1d1dc72c19da16ecf4828c982d4dd79ec7252513ecb72bd0806cfda8ad50212b0afd125718bdbd121c0c9ce0bf44e3860c58e2690b6305e74978fb89ec62581e0ab9b910d17a4e13cbd5eb03f5275ca1190bb03a9aea2e1bfd6216def71cdab9047925b4ea804beb4b61395674446b29d1f3bdb2bc090332c2b382ad2201ad83578f70f314e786548f538ac7ff240d8847478e385181237f9411b7b6b7374f7798263d670520a28666cd190110ee7c12a9968cd0293eac3b971a0c9d8aadd793d1f9f926b894cd53de0b9bb3f8763bf0f2c033d239ca9f0773baf9f9923bfd03f944585153895d95e3600903938e6eb35de1274c968725146b26774f868f6b0eec648656db493c76711e7791c64004a271e82ca1b93e7c7747457aaaa3d1a94e340a6563ec195e72fdc19564c29dbb4f7538d93d0e64b630e423e8dbeefc0842c0d28f60710b836d36366f727599c67d0e5ba053508a2cea267271b1e1d3b2fd3cf321a77afb8735a452b3a79f30e737cdb6618dce3d5ed432024b22fe54d9b35a4ea858f890bd4df09bfac2152fee5bf07f9137e88c43f59252c3819f4a9c35006270ee8997f338cde471edd0f039da6bc31cabc7c556c35b4008e6a9ddb27669384eca2adb229b960caf901c489e2161df9120eeca718f14b7af5ca61684278ccc040fe099036f2cd761ef48b5a0c698785f234dbfea247c9cf89cbdb379889d25af43c1a3a6a72f70715aa9be3727fb6756922e84c3c05f5c37e3d5066dbad069590633f19274202298e6273755169085ddccae6d2206ab879880fd3a559ea7e906bbc69ed24902e4af46af6a08db5edf7506822236e4697ba221d0a117e39ad587ba2d6776216cb30a9efeb971792262060e5ea6cb08a1a1fa61f8c05cf135e00d7a4a8c4f7ae0cee20a66e1dbe60b3db8b4bcfe7706c6ec24e6246d4ef814aa8f62b1379f0ecb7d55b9a9fcecb640b19d0ad8b8b3f09ae3c3690aabaa3d539178072b13b0a22495977c2a1507846926ea0ad42d0de44e19b9d292cacbf6b0d2d3a608741e00e39f7faf81b39fcb6f1b05569004189780e38e1826982d38ecd5df6543ef4651f1969d088b39c5231e29f6d8826edf3ec23b0dfb0781510821f48e0f27fcd7a1cbfb0f305a11f75f7a043b92d1d3f9062f1a1c2a22243a4e5ae8d631560b030667b58a2b0f6ceeb380cf369d43ecb33e6f7a3435d51a79f440e435504fbe99a879f903e10d6961d44389cbc77741f8aadfbd66e75dae70a807a68488c6f227bc18c9c93605bdfeb40fd22a0e1e1cdf01bd349ec9a9d0076e239cb89b9d2abf3f6bad3d355e9a80eaeb5d54b5fde0ecdd21c5803d2f378d5bfa28aa6258170660ed57424e8b6399f1e377f3b51e47458ae7e2a470b795d104c961d3127fe39a927bfe8049dbcf018025bc754109bb324b6ab053a6201ff91de89f2edf098eee843de57cf2d15f09607299fc0980a72a99b3a291f97c47e63db02f5c6df421b3a40a764b72cc2a44a6a2b3e8b3157dd9988cec597b58b547de38832b7f131c2bd54325dd900965e0c2ead2c6ba0b24f0412f80a25f5248df88f58bd83013f840e994e2aee1d4def40c41745b967764d4127ff8053bc5e370ce8f14f224ceaa338b1effe0ffcd84e6c5be972c625574604ac3c45061b703f75452b7bb31cae5bbb14abf194d10583b104a817b2ea21f4df624d529e0562e3b98ce8533dc6f2b4863fe8e788bdb2ef0ffd51c8bb070b6bdd2698ff83daf8323f6e31858013069d39505c8b0877b1e76acead49e8cc73be1129942eba52f003d50793a6604a4baf2d25a362ea860c91be5d42950cbeae246a175d8c9405cdb0ab49dc62a7411acbadb3bd8372875a75dedc21a554777c84fc189598f05446a3a86b0bffc5ef40f9c5386bb5a1ef2f8996f8bd82ad968e6aaa79f30d6a421436cc3096ba930fe0dfbd7a8a61f4f14369220164068dd82a4ac14b5cf0895662028561ebcdcdc5f45156369eaa69e61acb34bf3146b1ff4672d0a182eb79f7e2c914e1afd29f0a82014187f0393ab7f64502a79db8dc76fe607d386f2ce0dd16eefba394d83e672b5048b66b17ef1dee79f27b7374ab8037f219a4caa1e68d627216475d5394cd6f8a55aa451a39873d69b32c5fdfbae3733c80d27761e0f6a91c9a3925a58838d9948a3703cb6867b4dc0d677493fb0eb28adcdef64e591981498da735de0ed25150d7e8ba9e3f04334f9b82654a3f5ccee2b917c49bb5636a2bde048efbe47ab264f952cd52a125bcbc009a26bd445de1acc119590778d6a5da9ec16acf723f75186d986a8bfc4295e29e9b6dacab39070a6f7e0284d49e9c7d8241a93884e1a32d40881a9f1bc3a719673c8eae6218201f9fd167f678037ed990dc64cc9b3fe2deb59892c4be374c1526edf236209b393f3dbd28b2784edafe4f28acb236c4f6572e0039aea0ff765519e9b0e2b77f3b4296021dd1652045de0a4637c1aba86929314bf1b5551f3f5270263435a1f119490d1bdf9c504e2379aec947d00f2038aeb833ef15bd9c1b551e2f1a2b29393d81ac4d1125c047da023eab7ce787b48b9aee0aa5f902df596a211664e8cd1ecfb32992ffc60a1c2acc3f1f6d6d8c7ebb0078393adb28fec3b6a6e67c30e34f395fbee21f3100c25f40dabaed26c119557543316394a6a5fc493d89576761309cb7ad7a5718b06669f37f22a12b6d5672e37d16cf1d50724249f104d903ae53cdc4c2950f872407ec3ca26790c48db311e557fb9709e5978d15c25e5f125329aa9d48a8a5fd16c27e1855bda88546017ae6a9b81f1da3bba7fd0fa33f3a8a511fc7a27af0c2f51301fbc705a78eb8bbd0817934bc87b77ffb8a8d4b8ce9b0f21b49cac4276bad37d854341008d33024026ac10d451a54568326214c7224470d90a5e72760dff2d47b16f8b3074882549986380764f043aeb1cc7da2201867bfa6a54fb8bc8c7665417fb17e7a09b62ca9256d7ead294d3775ede89eff08510fbb4bd2efab1bc1c20b5dffcc8bf469bcd3c396b2bd87a8c5ae5ca84f5ee82573a42244497fbcbe37ff79f063676649c28164a06808861ce3b5f575d47cd0882c493c0b41a28480ca9e205e7000bd7e50b8b7279fe7a0bcd0b3ecd6c924d5227f5fd30ea0f31fd08b621be72d1dd151c8320825b324a24facb50cb3b35a43be4d1bda64bc4ce3bc30293a4ea8dbb42c3d8e505fbd1a1c869c2c693845a40996d8db6062d13b248b36598c56f208282993c0c0e26d98e5a2f95cff422646297e79634017f9bfcd592f54c25ece0eb8e94d64bea610c601df69298500a995cec7bd972f8855e8da20898cbc12a563cbb0c0d8d7e1316e019bb5b7b19", 0xe2f}], 0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x106200, 0x10004, 0x20da, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f00000005c0)='fd', 0x0, r2) write$tun(r2, &(0x7f0000000380)=ANY=[], 0xfdef) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x2) r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r5, r5) setpgid(0x0, r5) fchdir(r4) umount2(&(0x7f00000002c0)='./file0\x00', 0x9) r6 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x2) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000280)=0x7f) sched_getscheduler(r5) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000004c0)=""/143, &(0x7f0000000580)=0x8f) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="500000005f9083e255d0f7a28e3f998b7fbad777d0ad5e17bda4ba9023e3ef63ad390f5052490c82d028fdc72c3818eb72c08df9e3ed91d0816594369be2ad0d8cec5723bcd8e00fe718fa12fa07824d664fee3d7081138c5d8f5adb", @ANYRES16=r7, @ANYBLOB="010026bd7000fedbdf2546000000080001007063690011000200303030303a30303a31302e300000000008008e00010000000c008f0009000000000000000c0090000400000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x20000091) 4m8.505914497s ago: executing program 37 (id=4278): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800010004000000fcdbdf25021800000003ff090000000008000100ac14141f"], 0x24}, 0x16}, 0x40000) 4m4.257296236s ago: executing program 38 (id=4311): r0 = socket(0xa, 0x3, 0xff) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb4c, 0x9, 0x6, 0x2000, 0x3}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)='H\x00', 0x2}], 0x1) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x40001, 0x0) r3 = dup(r2) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40603d10, &(0x7f0000000240)={0x1, 0x9}) 3m31.412824496s ago: executing program 39 (id=4498): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) (async) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) (async) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000380)='g', 0x1, 0x8812, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000e00)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000002c0)=""/131, 0x83}], 0x1}, 0x2}], 0x1, 0x10122, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) (async) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 3m11.924373109s ago: executing program 40 (id=4613): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x15e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000840], 0x0, 0x0, &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x9, 0x1d, 0x7, 'netpci0\x00', 'gre0\x00', 'netdevsim0\x00', 'ipvlan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}]}]}, 0x1d6) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket(0x2, 0x80805, 0x0) close(0x3) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x7a, &(0x7f0000000340)={r6, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r4, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30, 0x180}], 0x1, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB=' \x00'], 0x0) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000003c0)={r8, 0x0, 0x20}, 0xc) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0xfffffffffffffffb}, {0x3, 0x0, 0x200000000000000, 0xffffffffffffffff}, 0x800}}, 0xb8}, 0x1, 0x0, 0x0, 0x840}, 0x2c000010) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="b8000000190001000000000000000000e0000002000000000000000000000000000000347c400647dac9e8000000000000000000000000000a00000029000000b1da2b239ce813b30dabe5cfd67f565b04cbe712bd10971426ded1059fc4b4704c6b1f52b6b7fdcbd91335baa553bfbe4a9427fc6b588f8efd7d2c9123740386845f6a33b29de9aac7e46de5ceaf9c27f6f7b0cb5d4110f83019755d0e9e519f93972b4bacd4742ad31a5116fe39c7e94b73dc89465ea4ef834579", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000900000000000000fdffffffffffffff00000000000000000200000000000000ffffffffffffffff0000000000000000000000000000000002000000000000000000000000000000ffffffffffffffff0700"/112], 0xb8}}, 0x10) r10 = accept$packet(r4, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001200)=0x14) getpeername$packet(r10, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001280)=0x14) syz_read_part_table(0x1056, &(0x7f0000000000)="$eJzsz82JAkEUBODqnd35WS+GoKHMWa+eTMIcjEVBEzMKUZRxxABEhO87dDd0UY8XPqoMV5V0yaXs/59/vyVV8xqvHo/FeVOnZDavt/1P0g5NfTdG17djWXLo65TpX9PeJ+S0GzsmWR3fuRsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfItrAAAA//82awlP") socket$nl_netfilter(0x10, 0x3, 0xc) 2m46.123293433s ago: executing program 41 (id=4786): syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x240e2, &(0x7f0000000000)={[{@dioread_lock}, {@noquota}, {@errors_remount}, {@grpquota}]}, 0x1, 0x579, &(0x7f0000000680)="$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") r0 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x112) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={&(0x7f0000000040)="0c37bf5a9e23c4d2cb267070137476f78869627a6517913f70fac572665fd9033e1a666b2551f335c00b84a034df44a6efc12bea3830c20c44d91d90e2e3", &(0x7f0000000140)=""/80, &(0x7f00000001c0)="7519a915d10a069717c1be3648ef18dec1dbe9b1c4ec9492cf3235d6", &(0x7f0000000240)="f2991d3bf8e8b8196a1333be54c788a2ceb1eb5772a0a09671d0d9459ef2", 0x8, r0, 0x55267dc9c8d08910}, 0x38) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffffffffffffff, 0x70bd2b, 0x25dfdbf8, {0x0, 0x0, 0x0, 0x0, 0x35a9c, 0x4522f}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x20040044) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r0, 0x4, {0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x6, 0x20, 0x4, "fc1273a91a8c6e29cef0029134992ee2ad2f77864bf45d5e988cc6cde206418b89cd94db9a0629d4937281bd38befe4d233e3869bdff8b9c8ae0b36ce306ec0f", "978b5d89a0a96dbfdcf348aa287f0fd0eeec6bca45e235cce4222629e22568a1ba3e57155505fbdf7ca5a2a65b634508f8b21baf0f5b56f5fc6ca091a4dbb9d3", "cf8d0baf185798962426cd8f6038ac1345e854bf51229c77b69342648f7d8568", [0x4, 0x7]}}) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000009c0), r2) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r3, @ANYBLOB="01002bbd7000fedbdf2507e1ffff130002001fe800000000000000000000000000011400030020010000000000000000000000000001080004"], 0x44}, 0x1, 0x0, 0x0, 0xc0d4}, 0x0) getdents(r0, 0x0, 0x0) 2m32.961795453s ago: executing program 42 (id=4886): unshare(0x8040600) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$rds(0x15, 0x5, 0x0) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000500), 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000540)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:semanage_trans_lock_t:s0', 0x20, 0x7, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x90) r1 = mq_open(&(0x7f0000000080)='eth0\x00#~\x02\x00\x00\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfd\x05\x00\x00\x00\x00\x00\x80\x00\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94uu_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18A\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x05\x00\x00\x000\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xce\x00\x00\x00\xe8\vq+\xbb\xc7\xaf\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x120, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(r1, &(0x7f000001a600)=""/102385, 0x18ff1, 0x0, 0x0) 2m17.773770895s ago: executing program 43 (id=5028): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x4, 0x1}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x8001}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0xb}}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x6c}, 0x28) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x129c81, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r2 = socket(0x400000000010, 0x3, 0x0) (async) r3 = socket$can_j1939(0x1d, 0x2, 0x7) r4 = dup(r3) getsockname$packet(r4, 0x0, &(0x7f0000000140)) (async) r5 = socket$unix(0x1, 0x5, 0x0) (async) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r8, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) r9 = socket(0x400000000010, 0x3, 0x0) (async) r10 = socket$unix(0x1, 0x1, 0x0) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x40, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r11, {0x0, 0x3}, {}, {0xfff3, 0x1f}}, [@TCA_CHAIN={0x0, 0xb, 0x5}]}, 0xffffffffffffff16}, 0x1, 0x0, 0x0, 0x50}, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r12, {0xc, 0xc}, {0x0, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) (async) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0xf7) 1m53.36255816s ago: executing program 44 (id=5240): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x49920d862a92153b, 0x70bd27, 0x0, {0x0, 0x0, 0x0, 0x0, 0x30b01, 0x8000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8000, 0x20295}}}}}}, @IFLA_ADDRESS={0xa, 0x1, @random}]}, 0x54}}, 0x8000) openat$null(0xffffffffffffff9c, &(0x7f0000001540), 0x2a2000, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$rds(r1, &(0x7f00000002c0)={0x2, 0x4e22, @broadcast}, 0x10) r2 = io_uring_setup(0x1c79, &(0x7f0000000040)={0x0, 0xc8a0, 0xc000, 0x8, 0x23}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x17, 0x3, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) 1m48.588611438s ago: executing program 9 (id=5262): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000880)={[{@errors_remount}, {@init_itable_val={'init_itable', 0x3d, 0x4}}, {@mblk_io_submit}, {@minixdf}, {@jqfmt_vfsv0}, {@usrjquota, 0x2e}], [], 0x2e}, 0x84, 0x459, &(0x7f0000001680)="$eJzs3MtvG8UfAPDvrpP219cvoZRHH4ChICIeSZMW6IELCKRekJDgUI4hTatSt0FNkGhV0YJQOaL+BcARxF/ACS4IOIG4wh0hVagXCgdktPZu4yS2sWPn0frzkTaeWY89893dscczdgIYWOXsTxKxMyJ+iYiRenZpgXL95uaNSzN/3bg0k0S1+tofSa3cnzcuzRRFi8ftyDNjaUT6YRL7m9Q7f+HimelKZfZ8np9YOPv2xPyFi0+fPjt9avbU7Lmpo0ePHJ587tmpZ/oS566srfvemzuw99gb116ZOX7tze+/zNq7M7+/MY660Z7rLEd56bFs8FjPz7657GpIJ0Mb2BC6UoqI7HQN1/r/SJRi8eSNxMsfbGjjgDVVrVarW1fsLeW3Q4uFgDtQonvDgCre8bPPv8W2boOPTeD6C/VhThb3zXyr3zMUaV5meNnn234qR8TxK39/km3RdB4CAKC/vs7GP081G/+lcW9Duf/na0OjEXFXROyOiLsjYk9E3BNRK3tfRNzfZf3lZfmV45+ftq0qsA5l47/n87WtpeO/YvQXo6U8t6sW/3By8nRl9lB+TMZieGuWn2xTxzcv/fxxq/sax3/ZltVfjAXzdvw+tGyC7sT0wnQvMTe6/n7EvqFm8Se31q6y270Rsa+7p64dwOyYnX7i8wOtCv13/G30YZ2p+lnE4/XzfyWWxV9I2q9PTvwvKrOHJoqrYqUffrz6aqv6e4q/D7Lzv73p9X8r/tGkcb12vvs6rv76UcvPNKu9/rckr9fSW/J9704vLJyfjNiSXFm5f2rxsUW+KJ/FP3awef/fHfHPp/nj9kdEdhE/EBEPRsRDedsfjohHIuJgm/i/e/HRt1Yf/9rK4j/R1fnvPlE68+1Xrerv7PwfqaXG8j2dvP512sBejh0AAADcLtLad+CTdPxWOk3Hx+vf4d8T29PK3PzCkyfn3jl3ov5d+dEYTouZrpGG+dDJfG64yE8tyx+uzRtXq9Xqtlp+fGauslZr6kBndrTo/5nfShvdOmDNdbWO1uoXbcBtye81YXDp/zC49H8YXPo/DK5m/f9yxM0NaAqwzrz/w+DS/2Fw6f8wuPR/GEi9/K6/XWL3sbV65jstUWpb5osu/pfB+iYi3RTNWF0i3RzNqCe2RkSnhS/HejVso1+ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+uPfAAAA//9nS+Je") (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x8e40, 0x0) close(r1) (async) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x5, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) (async) r4 = socket$packet(0x11, 0x3, 0x300) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) (async) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0x4ee4e6a52ff5644d, 0x70bd2c, 0x7fffe, {0x0, 0x0, 0x0, r7, {}, {0xb, 0xb}, {0xf, 0xb}}, [@qdisc_kind_options=@q_plug={{0x9}, {0xc, 0x2, {0x1, 0x2}}}]}, 0x3c}}, 0x200000c0) (async) sendto$packet(r4, &(0x7f0000000240)="bad33075218151db00316f3a277f", 0xe, 0x22008001, &(0x7f0000000080)={0x11, 0x88a8, r3, 0x1, 0xda, 0x6, @multicast}, 0x14) open(&(0x7f0000000180)='./file1\x00', 0x64042, 0x0) 1m48.393525044s ago: executing program 9 (id=5264): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f00000002c0), 0xff, 0x255, &(0x7f00000017c0)="$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") mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000001c0)=0x10002, 0x4) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0xffffffdf, 0x80}, {0xfffffffb, 0x3}]}, 0x14, 0x2) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 1m47.298161792s ago: executing program 9 (id=5271): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) memfd_create(0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0x18ff2}], 0x1, 0x10000000, 0x0) 1m46.139232403s ago: executing program 9 (id=5277): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x4, 0x0, @empty, @mcast2}}}}, 0x0) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 1m44.842834228s ago: executing program 9 (id=5283): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x77f, &(0x7f0000000600)="$eJzs3c9rHFUcAPDvbJKmTauJIPjjFBA0ULoxNbYKHioeRLBQ0LPtstmGmk22ZDelCQEtIngRVDwIeunZH/Xm1R9X/S88iKVqWqx4kMhsZtpts5smbZKt7ucD07w3b7bvfffNvHm7M8wG0LNG038KEY9FxAdJxHC2PomIgWaqP+LY2nbXV5bL6ZLE6uprvyfNba6tLJej5TWp/Vnm0Yj4/t2Ig4X19dYXl2ZK1Wplfi3bFxFnx+uLS4fOzJamK9OVuSMTk5OHjz579Mj2xfrnT0sHLn/48lNfHfv7nUcuvf9DEsfiQFbWGsd2GY3R7D0ZSN/CW7y03ZV1WdLtBnBXCtnB1x/pGDAcfc0UAPB/9lZErAIAPSZx/geAHpN/D3BtZbmcL939RmJ3XXkxIvauxZ9f31wr6c+u2e1tXgcdupbccmUkiYiRbah/NCI+++aNL9Ildug6JEA7b1+IiFMjo+vH/2TdPQtb9fQGZXuyv6O3rTf+we75Np3/PNdu/le4Mf+JNvOfwTbH7t244/G/bxsq2UA6/3uh5d626y3xZ0b6stwDzTnfQHL6TLWSjm0PRsRYDAym+YkN6hi7+s/VTmWt878/Pnrz87T+9O/NLQq/9g/e+pqpUqN0LzG3unIh4vH+dvEnN/o/6TD/PbHJOl55/r1PO5Wl8afx5sv6+CO7O2lnrF6MeLJt/9+8oy1NjTdmO9yfON7cHcbznaKNr3/+ZKhT/a39ny5p/flngd2Q9v/QxvGPJK33a9bXjv2t+PHi8Hedyu4cf/v9f0/yejOdzyPOlxqN+YmIPcmr69cfvvnaPJ9vn8Y/9kT743+j/T/9THhqk/H3X/7tyw3j39/d/p/aUv+3S6SDdIeimVL10vWZvk71b67/J5upsWzNZsa/Ti29PXEv7x0AAAAAAAAAAAAAAAAAAAAAAAAAbFYhIg5EUijeSBcKxeLab3g/HEOFaq3eOHi6tjA3Fc3fyh6JgUL+qMvhluehTmTPw8/zh2/LPxMRD0XEx4P7kvw5ilNdjh0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcvs7/P5/6pfBbrcOANgxe7vdAABg1zn/A0Dvcf4HgN7j/A8Avcf5HwB6j/M/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO+zE8ePpsvrXynI5zU+dW1yYqZ07NFWpzxRnF8rFcm3+bHG6VpuuVorl2uyd/r9qrXZ2MuYWzo83KvXGeH1x6eRsbWGucfLMbGm6crIysCtRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDW1BeXZkrVamVe4i4Sq/dHM7qf6Mt2p/ulPbuaSO6PZmxzossDEwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB/xL8BAAD//7KsH7I=") r1 = syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000020000402505a1a440000000010109023b000101000000090400001202060000052406000005240000000d240f0170ef8be0149b263d00090582020002000000090503020002000000"], &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=ANY=[@ANYBLOB="180000005e000101000000000000000008004100", @ANYRES32=0x0, @ANYBLOB="a8ef6d4979de41efc3decd670c4376ed5fa8b0f59d83b98413185ad91af9d52796d6da87475cfe3954026f66bd3baba155ad5ed40dbea62a7cf385725edb9b97d5c7a6857c55d447c8735b830371c1a309fd3643d450c2e7bb11a50bc54a3b80a4cb3709638cb7281edf990f823c72d52bdbe18014f9723085896d1bed17166d0c09819ff60649e73f4eaaec80488848538c437b52e7fd14c1ba1ca8b0115fce7d053578da39a40b"], 0x18}], 0x1}, 0x0) syz_usb_control_io$cdc_ecm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x3, 0x3}, 0x20004, 0x101, 0x10000, 0x5, 0x2, 0x90000001, 0x0, 0x0, 0x0, 0x0, 0x8000000c3}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f00000000c0)={0x1d, r4}, 0x10) sendmsg$can_bcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1, 0xd77, 0x580f02, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x1, 0x0, 0x0, "6191440132bb112240fcbcc3fa9d0431575f8614db538ce09c50eecf6ac579e8e83b944b666113f3afed71231e6653a1e899f17b33515bb07c9a1ed652a2159b"}}, 0x80}}, 0x4004044) socket$packet(0x11, 0x3, 0x300) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r5, &(0x7f0000000400)=[{&(0x7f0000000480)=""/96, 0x60}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f00000002c0)=""/242, 0xf2}], 0x3, 0x6, 0x800ff) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x28, 0x9, 0x0, 0x0, 0x0, 0x7, 0x34328, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0x6, 0x3, 0x100008, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x2, 0xffffffffffffffff, 0xa) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r7, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x6, 0x510, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5bd7, 0x2}, 0x200, 0x1ff, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r7, 0x2) sendmsg$nl_route(r6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x6}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002fbf79ebabb550346252cf442b80b03b87d0962e51f40ff3b48c816b1014f7871443cfa9fbe649d2099d167af107e78d2f8ab746999be150d0c00ce228fdb2ec881af08cc9d49e4abe13c48", @ANYRES64], 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0x1, 0xa0002f5}) process_vm_readv(0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000006c0)=""/209, 0xd1}], 0x2, 0x0, 0x0, 0x0) 1m44.606589537s ago: executing program 9 (id=5287): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x58, 0x10, 0x1, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x2b24d, 0x17a30}, [@IFLA_OPERSTATE={0x5, 0x10, 0x2}, @IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}, @IFLA_IFALIASn={0x4}, @IFLA_ADDRESS={0xa, 0x1, @random="7a2f9711ec2b"}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x2}, @IFLA_AF_SPEC={0x4}]}, 0x58}, 0x1, 0xc3, 0x0, 0xc1}, 0x20048010) 1m44.572259558s ago: executing program 45 (id=5287): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x58, 0x10, 0x1, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x2b24d, 0x17a30}, [@IFLA_OPERSTATE={0x5, 0x10, 0x2}, @IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}, @IFLA_IFALIASn={0x4}, @IFLA_ADDRESS={0xa, 0x1, @random="7a2f9711ec2b"}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x2}, @IFLA_AF_SPEC={0x4}]}, 0x58}, 0x1, 0xc3, 0x0, 0xc1}, 0x20048010) 1m21.137889049s ago: executing program 4 (id=5461): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x80000001, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0xf800000000000000) 1m20.23752452s ago: executing program 4 (id=5471): r0 = socket(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x7}}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r4, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000100)={0xc, 0x4, 0x3, 0x7, r8}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000002100)={r8, 0x80, &(0x7f0000000480)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @private=0xa010100}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x3, @remote}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e24, @remote}]}, &(0x7f0000002140)=0x10) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) io_setup(0x6, &(0x7f0000001380)=0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/3\x00') io_submit(r9, 0x1, &(0x7f00000000c0)=[&(0x7f0000000100)={0x1000000, 0x0, 0x0, 0x5, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, r10}]) recvmmsg$unix(r10, &(0x7f0000002000)=[{{&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000940)=[{&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000580)=""/195, 0xc3}, {&(0x7f0000000680)=""/203, 0xcb}, {&(0x7f0000000780)=""/245, 0xf5}, {&(0x7f0000000880)=""/36, 0x24}, {&(0x7f00000008c0)=""/99, 0x63}], 0x6, &(0x7f00000009c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000a40)=""/142, 0x8e}, {&(0x7f0000000b00)=""/221, 0xdd}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000000d00)=""/78, 0x4e}, {&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/231, 0xe7}], 0x3, &(0x7f0000001ec0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0x3, 0x0, &(0x7f00000020c0)={0x0, 0x3938700}) r11 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r11, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x2}}, 0x10) r12 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(r12, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000884}, 0x4) r13 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x3, 0x0, 0x7fff7ffc}]}) close_range(r13, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001200970228bd700000000000070000", @ANYRES32=0x0, @ANYBLOB="b354"], 0x20}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 1m19.918113002s ago: executing program 4 (id=5474): symlink(&(0x7f0000000280)='./file1/file0\x00', &(0x7f00000002c0)='./file0\x00') symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') chdir(&(0x7f0000000040)='./file0/../file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000000)={'vlan1\x00', @random="fab200000708"}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) quotactl_fd$Q_GETNEXTQUOTA(0xffffffffffffffff, 0xffffffff80000900, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, 0x0, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r3, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(r3) r4 = perf_event_open(&(0x7f0000000500)={0xdaa1c69b15a81161, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x90, 0x74099, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x6, 0xffffffffffffffff, 0x8) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/timers\x00', 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000cc0)=@newtaction={0x84, 0x30, 0x12f, 0x0, 0x0, {0x0, 0x0, 0x1be}, [{0x70, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x5c, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x4, 0x0, 0x0, 0x60}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x3f}}}}]}]}, 0x84}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000400)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4008000) r8 = perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x44, 0x5, 0x7, 0x0, 0x400, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x8aac, 0xffffffff}, 0x1022, 0x2, 0xff, 0x6, 0x6, 0x4, 0x9, 0x0, 0x926, 0x0, 0x6e99}, r5, 0x6, r4, 0x3) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x1, 0xf44bb, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xc, 0x2}, 0x204, 0x8, 0x43a1bd76, 0x7, 0xc, 0x6, 0x2, 0x0, 0x0, 0x0, 0x7e5}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) file_setattr(0xffffffffffffffff, 0x0, 0x0, 0x18, 0x100) ioctl$PERF_EVENT_IOC_RESET(r8, 0x2403, 0x0) getxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='truste'], 0x0, 0x0) 1m19.662644941s ago: executing program 4 (id=5475): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) r1 = eventfd(0x0) io_submit(r0, 0x2, &(0x7f0000000140)=[&(0x7f0000000080)={0x1000000, 0x0, 0x0, 0x0, 0x8, r1, &(0x7f0000000280)="b970cb2b79989428", 0x8, 0x1000, 0x0, 0xbd4c3b8bc89fc43d, r1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0x5, 0x0, 0x2, r1}]) mprotect(&(0x7f0000497000/0x1000)=nil, 0x1000, 0x100000b) socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x41000004, 0x0) shmget(0x2, 0x1000, 0x400, &(0x7f0000ffd000/0x1000)=nil) timer_create(0x1, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 1m19.341753882s ago: executing program 4 (id=5478): r0 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r2 = fsmount(r0, 0x1, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000080)=0xc) sendmsg$netlink(r4, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)=ANY=[@ANYBLOB="040000002c00000018000000003b120bb1dda5a9", @ANYRES32=r5, @ANYBLOB="07000280976b64000500018038000000"], 0x28}], 0x1}, 0xcc000) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x1, 0xbffffffd, 0x100, {{@in6=@loopback, @in=@rand_addr=0x64010100, 0x1, 0x314, 0x4e21, 0x9, 0x0, 0x0, 0x0, 0x2f, 0x0, r5}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@remote, {0x0, 0x9, 0x6, 0xffff, 0x8251c, 0x7, 0xffffeffffffffff8}, {0x6, 0x0, 0x1f, 0x7}, {0x2, 0xfffffffc}, 0x70bd2e, 0x3502, 0xa, 0x1, 0xfc, 0x2a}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) read$rfkill(r7, 0x0, 0x0) close(r7) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03080000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021440000000c0a09030000000000000000070000000900020073797a31000000000900010073797a300000000018000380140000800800034000000002050006405200000014000000110001"], 0xc8}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000b80)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x17}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x850}, 0x50) fchdir(r2) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269bb, 0x8031, 0xffffffffffffffff, 0x0) r9 = socket$unix(0x1, 0x2, 0x0) bind$unix(r9, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r10 = socket$unix(0x1, 0x2, 0x0) bind$unix(r10, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x1c) r11 = socket$unix(0x1, 0x2, 0x0) bind$unix(r11, &(0x7f0000003000)=@abs={0x1, 0x0, 0x4e20}, 0x6e) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206006, 0x0) 1m19.230393916s ago: executing program 4 (id=5480): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@fadd={0x58, 0x114, 0x6, {{0x403, 0xd36}, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x3, 0x23, 0x7c0}}, @cswp={0x58, 0x114, 0x7, {{0x4, 0x2}, 0x0, 0x0, 0x6, 0x4, 0x100, 0x2, 0x14, 0x4}}], 0xb0, 0x20004084}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x18, 0x14, 0x9535393fea6295b5}, 0x18}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="780000001000830404000000fedbdf2500007400", @ANYRES32=r4, @ANYBLOB="0008000007500500580012800b0001006272696467650000480002800500190002000000050017"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x9}, 0x0) 1m5.763727887s ago: executing program 7 (id=5566): socket$xdp(0x2c, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e210e227f000001925aa80020007b00090080007f000006e809000000ff0000f03ac71002000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 1m5.725223378s ago: executing program 7 (id=5567): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002b40)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) 1m5.599212083s ago: executing program 7 (id=5570): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x5536, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x6, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x3, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x3}, 0x2, 0x100, 0x800000, 0x6, 0x2, 0xd1, 0x2, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) syz_emit_ethernet(0x22, 0x0, &(0x7f0000000480)={0x0, 0x3, [0x7ee, 0xda, 0x365, 0x261]}) poll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x84}], 0x1, 0x3ff) syz_emit_ethernet(0xae, &(0x7f0000001840)=ANY=[@ANYBLOB], 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_netdev_private(r1, 0x8914, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002b40)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) openat(0xffffffffffffff9c, 0x0, 0x4040, 0x0) setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000080)={0x1, 0x4, 0x41, 0x2003206, @vifc_lcl_addr=@multicast2, @private=0xa010104}, 0x10) ioctl$SIOCGETVIFCNT(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 1m3.643470291s ago: executing program 46 (id=5480): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@fadd={0x58, 0x114, 0x6, {{0x403, 0xd36}, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x3, 0x23, 0x7c0}}, @cswp={0x58, 0x114, 0x7, {{0x4, 0x2}, 0x0, 0x0, 0x6, 0x4, 0x100, 0x2, 0x14, 0x4}}], 0xb0, 0x20004084}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x18, 0x14, 0x9535393fea6295b5}, 0x18}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="780000001000830404000000fedbdf2500007400", @ANYRES32=r4, @ANYBLOB="0008000007500500580012800b0001006272696467650000480002800500190002000000050017"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x9}, 0x0) 1m3.41641467s ago: executing program 7 (id=5576): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x4, 0x0, @empty, @mcast2}}}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$eJzs3U9qU0EcB/Bf0rSJ3SSgK+nigRs3hqY3CFJBDAiRLOoqwbYgTSikENCF7c67uPIO3sBjeAGzKETSF03SxuK/+jT5fCDMD+Z9YSaLzCxm8tpbvaP945PDvdufolRKohBx9v48IiIfa5F68CFt1yMiFxsx6ywAgP9Ns9mpZz0Gbla/X++M927FKz2td5kMCAAAAAAAAAAAgN/W3ipeOf8fw4jKzPn/3KTNO/8PAEvB+f/l1+/XO5uT/ds85/8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA7AxHo/Lomk/W4wMA/jzrPwCsHus/AKye4dxanwvrPwAsv2d7z5/UG43dZpKUInpvB61BK23T/vphvIxuHMR2lOM8xvuDibR+9Lixu51cqES7dzrJnw5aa/P5WpSjsjhfS/PJfH49NmfzO1GOO4vzOwvzG3H/XkT+60SrUY6PL+I4urEf4+w0/6aWJA+fNi7lixfPAQAAAAAAAAAAAAAAAAAAwN9QTb5ZeH+/Wv1ef5r/if8HuHS/vhB3C9nOHQAAAAAAAAAAAAAAAAAAAP4VJ69eH3W63YP+wuLz5C7/dc8opsWtH/pWf60oRETmE1SsTJHxDxMAAAAAAAAAAAAAAAAAAKyg6aXfrEcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANmZvv//5oqs5wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACshi8BAAD//2dk6nI=") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 1m2.601206958s ago: executing program 7 (id=5583): socket$kcm(0x21, 0x2, 0xa) mbind(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x2, &(0x7f0000000180)=0x3ff, 0xc, 0x0) mbind(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000080)=0x1, 0x8, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x8591, 0xa88, 0x4, 0x5, 0x0, 0x40, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x2040400) openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xd, @loopback, 0xc}], 0x1c) socket$netlink(0x10, 0x3, 0x8000000004) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x30000, 0x110) sync_file_range(r2, 0x8, 0x30, 0x5) 1m0.966166415s ago: executing program 7 (id=5592): syz_io_uring_setup(0x26b6, &(0x7f0000000200)={0x0, 0xf906, 0x80, 0x0, 0x308}, 0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/rt6_stats\x00') dup(r0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = socket(0x1e, 0x5, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) listen(r1, 0x0) accept(r1, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) r2 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRES8=r2], 0x20) 1m0.965543195s ago: executing program 47 (id=5592): syz_io_uring_setup(0x26b6, &(0x7f0000000200)={0x0, 0xf906, 0x80, 0x0, 0x308}, 0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/rt6_stats\x00') dup(r0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = socket(0x1e, 0x5, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) listen(r1, 0x0) accept(r1, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) r2 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRES8=r2], 0x20) 41.760644208s ago: executing program 5 (id=5723): socket$kcm(0x21, 0x2, 0xa) mbind(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x2, &(0x7f0000000180)=0x3ff, 0xc, 0x0) mbind(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000080)=0x1, 0x8, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x8591, 0xa88, 0x4, 0x5, 0x0, 0x40, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) setreuid(0x0, 0xee00) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x30000, 0x110) sync_file_range(r0, 0x8, 0x30, 0x5) 41.717330259s ago: executing program 5 (id=5725): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff0207600d698cff9e14f008004de7f9c764360000000100", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 41.465957768s ago: executing program 5 (id=5728): syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', 0x8d0, &(0x7f0000000080)=ANY=[@ANYBLOB="7379735f696d6d757461626c652c00a99176bffea999ec4947785a4b3392b470a878b010acc5fde3f7c39533b111d92aa1e3cd9504b4aec083a038cd1b944d504716e6b8463de9dc9743fbe9e0ef9396a932024b904283205650ea735ae7adac50b5efe5244d737dc9515a51775b2fafbc85c9c1c8f62872a466192aae714a90990e0b07aa2b92e463ad98"], 0x1, 0x25f, &(0x7f0000000840)="$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") r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x2000775) (async) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x189800, 0x9b) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x40047211, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x759, &(0x7f00000002c0)={[], [], 0x2c}, 0xa, 0x53d, &(0x7f00000011c0)="$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") 41.165533309s ago: executing program 5 (id=5730): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x4, 0x0, @empty, @mcast2}}}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 39.840077755s ago: executing program 5 (id=5736): socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7}, 0x0, 0x400020, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x800000000fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000b40)={0x0, 0x0, 0x2, 0x81, 0x81}) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) r5 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) listen(r5, 0x9) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, &(0x7f00000000c0)="ab", 0xfffd, 0xc1, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) readv(r4, &(0x7f0000000900)=[{&(0x7f0000000780)=""/172, 0xac}], 0x1) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000140011f225bd7000fddbcf250284", @ANYRES32], 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x40) 39.41384953s ago: executing program 5 (id=5742): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x4, 0x0, @empty, @mcast2}}}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 39.39435612s ago: executing program 48 (id=5742): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x4, 0x0, @empty, @mcast2}}}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 35.550985035s ago: executing program 3 (id=5777): socket$kcm(0x21, 0x2, 0xa) mbind(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x2, &(0x7f0000000180)=0x3ff, 0xc, 0x0) mbind(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000080)=0x1, 0x8, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x8591, 0xa88, 0x4, 0x5, 0x0, 0x40, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x2040400) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x30000, 0x110) sync_file_range(r0, 0x8, 0x30, 0x5) 35.41808729s ago: executing program 3 (id=5781): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000008c0)={'bridge_slave_1\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="01072b0000000000000005"], 0x14}, 0x1, 0x0, 0x0, 0x20004074}, 0x0) 35.224067427s ago: executing program 3 (id=5783): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) gettid() semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0xffff, @loopback}}, 0x1e) creat(0x0, 0x81) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) eventfd2(0xffffffff, 0x80800) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x1, 0x8008, 0x0, 0x12, 0x19, 0x11, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8, 0x4]}) mknod$loop(&(0x7f0000000680)='./file0\x00', 0x80, 0x0) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x801, @loopback}}, 0x1e) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0xfe) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) inotify_init() rename(0x0, &(0x7f0000003440)='./file1\x00') iopl(0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000680), 0x101402, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='na\f ', 0x4}], 0x1) 34.901126998s ago: executing program 3 (id=5787): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x4, 0x0, @empty, @mcast2}}}}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 32.333005038s ago: executing program 3 (id=5800): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095"], &(0x7f00000005c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r0, 0x18000000000002a0, 0xe, 0xa00, &(0x7f0000000040)="76ea0900bce100000000009ba56a", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 31.866218034s ago: executing program 3 (id=5806): socket$kcm(0x21, 0x2, 0xa) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x8591, 0xa88, 0x4, 0x5, 0x0, 0x40, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) setreuid(0x0, 0xee00) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x30000, 0x110) sync_file_range(r0, 0x8, 0x30, 0x5) 31.852878685s ago: executing program 49 (id=5806): socket$kcm(0x21, 0x2, 0xa) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x8591, 0xa88, 0x4, 0x5, 0x0, 0x40, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) setreuid(0x0, 0xee00) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x30000, 0x110) sync_file_range(r0, 0x8, 0x30, 0x5) 5.811633317s ago: executing program 8 (id=6059): tgkill(0x0, 0x0, 0x13) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x8080, &(0x7f0000000040)=ANY=[@ANYBLOB="636865636b3d7374726963742c757466383d312c757466383d302c757466383d312c6e66732c6572726f72733d72656d6f756e742d726f2c73686f72746e616d653d77696e6e742c00043518f9aad8a4f2c1cdb3e993cf0444d9d2d40bb509d4da042c2c85e3650de97db42c38cafa7a9d7503c3c985486cf7fdb62fb1fc80515e9bef7e9e56fb346de370b3eb3ecbc59d343c36bf04efc3d68033308b0014b0c677ae5ef2932cc05f566112668fa4f6844dcf823618a2993da771384e8fc12467a56b33e3b00030dbfd82ea2f8ddbeb1d04bac86815ebe0b9d084d60edf56b15e74589892dce80700000000000000b738dddfd38d20b443570197dc795020ecf541601ef9a5618869febf769dd50261849a47e170ba166b97e76a0261d0dc1fb3e2646595f1c8b49057d94f10f7b5e35ead0a38", @ANYRES8], 0x3, 0x232, &(0x7f00000002c0)="$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") r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0xff, 0x2, 0x9}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) sendfile(r0, r1, 0x0, 0xffffffff000) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000b00)=""/225, 0xe1}], 0x1}, 0xffffffff}], 0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./bus\x00', 0x389c93, 0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0xffffffffffffffff, 0x3e, 0x15, 0x2}, 0x20) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x101042, 0xa) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./bus\x00', r2, &(0x7f00000004c0)='./file0\x00', 0x2) 5.463001789s ago: executing program 8 (id=6064): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$eJzs3U9qU0EcB/Bf0rSJ3SSgK+nigRs3hqY3CFJBDAiRLOoqwbYgTSikENCF7c67uPIO3sBjeAGzKETSF03SxuK/+jT5fCDMD+Z9YSaLzCxm8tpbvaP945PDvdufolRKohBx9v48IiIfa5F68CFt1yMiFxsx6ywAgP9Ns9mpZz0Gbla/X++M927FKz2td5kMCAAAAAAAAAAAgN/W3ipeOf8fw4jKzPn/3KTNO/8PAEvB+f/l1+/XO5uT/ds85/8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA7AxHo/Lomk/W4wMA/jzrPwCsHus/AKye4dxanwvrPwAsv2d7z5/UG43dZpKUInpvB61BK23T/vphvIxuHMR2lOM8xvuDibR+9Lixu51cqES7dzrJnw5aa/P5WpSjsjhfS/PJfH49NmfzO1GOO4vzOwvzG3H/XkT+60SrUY6PL+I4urEf4+w0/6aWJA+fNi7lixfPAQAAAAAAAAAAAAAAAAAAwN9QTb5ZeH+/Wv1ef5r/if8HuHS/vhB3C9nOHQAAAAAAAAAAAAAAAAAAAP4VJ69eH3W63YP+wuLz5C7/dc8opsWtH/pWf60oRETmE1SsTJHxDxMAAAAAAAAAAAAAAAAAAKyg6aXfrEcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANmZvv//5oqs5wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACshi8BAAD//2dk6nI=") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 3.585541785s ago: executing program 0 (id=6082): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) gettid() semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0xffff, @loopback}}, 0x1e) creat(0x0, 0x81) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) eventfd2(0xffffffff, 0x80800) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x1, 0x8008, 0x0, 0x12, 0x19, 0x11, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8, 0x4]}) mknod$loop(&(0x7f0000000680)='./file0\x00', 0x80, 0x0) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x801, @loopback}}, 0x1e) inotify_init() rename(0x0, &(0x7f0000003440)='./file1\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000680), 0x101402, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='na\f ', 0x4}], 0x1) 3.584981415s ago: executing program 0 (id=6083): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = mq_open(&(0x7f0000000040)='\a\x00\x00@/\x1cL\x18kc\x98\x1f\xbeC\xf4*1\x17\xd2\x00', 0xc0, 0xbc, 0x0) lseek(r1, 0x0, 0x3) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'veth1\x00', {0x2, 0x0, @empty}}) r2 = socket$inet6(0xa, 0x2, 0x88) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) close(r2) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r3, &(0x7f0000000200)={0x2, @none={0x0, 0xfffd}}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0x40305828, &(0x7f0000000240)={0x17c04, 0xffffffffffffffff, 0x100, 0x100000002}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000340)='%pK \x00'}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f00000006c0)={r6, r7}, 0xc) socket$inet6_icmp(0xa, 0x2, 0x3a) r8 = socket$phonet(0x23, 0x2, 0x1) sendmmsg(r8, &(0x7f0000000640)=[{{&(0x7f00000002c0)=@ieee802154={0x24, @none={0x0, 0x1}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f00000003c0)=[{0x68, 0x109, 0x2, "a0a9a2af0da1dc22d977385ca425f04268d2ed68834ffa3fa09bac323c69c10e89d8a7462fefcdc4ca04bcce4726ad91fb3e1759a92d121a74b3ad6924a091536d7eed7c21d6c5ba01b3f871e5a98315b0b042"}, {0x110, 0x114, 0x9, "37a070562d917ae1ef9394b93e9fdfc76cf3c095b71b4a8e798c0d9e3b9e7aceab351779f02c5553f64101b6d4f708da70f4f8f21dc9c3c77e0b933f1b66b2707acd140ac5a8df0fa7a703dba04b4ae393b637576106d3c35538529844f98e4e39039ca44aff303576905603ab26787e7d831efa2e740eb68d283f1f6bcbbdaa8432df39ca734e1f362473fabc2b8341a2fdb833ff98c3e9ed7945cb2a675e0de324d7e3d2667eec94e228ed66871846fc1326b5582300711b2b0e4972e337a26ca51de4561035e74cbd1f7165c698c6df2f778538cafdcd1c71cad28c278cb15d5aac0276353062d555392b51e22c66d30136fea6274d4c97"}, {0x70, 0x10e, 0x5, "12bc906485a0bcb0cbf4d3fd1921e30261a2ebc62f17a58e7a2d00cd99ef6c9616393a12ac301dcbd38d4eae43ce8af8e781b3aea85036a2dd006c4eb4f000f4a4cca316317316b01d2cc5dcf2ea3cfb1e7844d576ca41a99815"}, {0x60, 0x1, 0x8, "24f54c3423ab86565d4355589fc4e547766210c8e4e7e80ba5e6b4d5c26b50a4b2b0694da78443e607928c9a8ea24eb497e391333d65464ee6220dca0422849a8e7b20090d1ce31782e5"}], 0x248}}], 0x1, 0x8010) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r9, 0x25, &(0x7f00000000c0)={0x0, 0x0, 0x2000000000000}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r10, 0x26, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x3}) fcntl$lock(r10, 0x5, &(0x7f0000000140)={0x1, 0x1, 0x80000009, 0xa63}) r11 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'gre0\x00', 0x0}) sendmsg$nl_route(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x421, 0x70b925, 0x0, {0x0, 0x0, 0x0, r12, 0x0, 0x10000}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gre={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e20}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x8}]}}}]}, 0x40}}, 0x0) sendmsg$kcm(r6, &(0x7f0000000ac0)={&(0x7f0000000700)=@llc={0x1a, 0x336, 0x9, 0x0, 0x0, 0x9, @local}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)="64ab45d38cfac9ca521dd4cff288f3c6485fc1f99044674535846e3cb24a2104e367e024d7dd3f26efe763f2666b77f64106990dbf87ab060138467dd87a8b49a38e0081750fce56c4672cb56dadbd046b4f7580f12064a3b1659893bdedd5e2ee41d5cc2ead9881a1093007f37706ff30267d90335bbdce3cf3d38bfd4fd322894feffee1ea069ac135f32bf38afe3ca8a5ee78ca61c9d44178a7a51f91a2590bd607655156d6f0fe9c30ef4cf42d01660975c6274005c4ebb7e7a36ebd949aec30445f7bcc7d88b14aad55ea46746ee4bd1c8533bdbb57cc0afbae46ab1c890727598299c46697d415e720fce59b12", 0xf0}, {&(0x7f0000000880)="849ab4609b3848692cd8e952302167", 0xf}, {&(0x7f00000008c0)="4a9ff34fdd7871427c22efc4be045fb791257bc9778e1ed84a8b6a54eb7f091cccdce5f4a7fafb3c84b7eac1dab6bc1d1ac14cc5f6f67e225214aa2b3a164ad1221c9030cbe1a788d571d7a0ad521f92b080861b4b7af58b430abeffe499a104146d3860b40361e6d220cc6f12889ae31560303746068d9d50c6276a36435564cf92aec1ebe56b3321a5ee922f4f304c1d5a7656cd056526a145c161b77d7b7e4435aca8d9eae7546fabf0cd32913ce9287303a64ef3f961129356ffa2317f0e352546238342ec1404c0678d4ccad68139f1e1316b2c457c60a46de0b9f1fbf43c37b2f57bd9cfdd9eff", 0xea}, {&(0x7f00000009c0)="383462e2", 0x4}], 0x4, &(0x7f0000000a40)=[{0x78, 0x104, 0x7, "69a25019a3e3cc87b677143ca0ba68a8ef4441d3914ff9af9591a8cf702bb7ad52b7480d15ae9ef6adf055b7b6b7c421e13d4e0ec4a4ebc6a96a5a4bcbb22d10d51846028fa07b2d162d3db3e6f56ea4b81514937ca12275188d22c5d683e680de195c"}], 0x78}, 0x4000084) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000380)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x28, 0x0, 0x0, 0x6ebf}, {0x6}]}, 0x10) writev(r4, &(0x7f0000000140)=[{&(0x7f00000001c0)="832489a524", 0x5}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000000f0400000000005f"], 0x0, 0x28}, 0x28) close_range(r4, r5, 0x2) 3.520761537s ago: executing program 0 (id=6086): move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x277) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020400) syz_emit_ethernet(0xaf, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa8100000086dd60f7d8ff00753c0020010000000000000000000000000000ff0200000000000000000000000000010004c910"], 0x0) poll(0x0, 0x0, 0x9) syz_clone3(&(0x7f0000000300)={0x101080, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x40}, &(0x7f0000000580)=""/219, 0xdb, &(0x7f00000006c0)=""/251, &(0x7f0000000240)=[r0], 0x1}, 0x58) prlimit64(r3, 0x6, &(0x7f0000000280)={0x6, 0xb}, &(0x7f00000003c0)) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000680)=""/9, 0x9}], 0x1, 0x20033, 0x51b) r5 = socket(0xa, 0x5, 0x0) sendmsg$inet_sctp(r5, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @loopback, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, 0x0, 0x0, 0x4855}, 0x24000052) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(0x0, r7) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, 0x0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf252000000008000300", @ANYRES32=0x0, @ANYBLOB='\x00'/13], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) 3.333958174s ago: executing program 2 (id=6087): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, 0x0, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="180300000000000000000000000000808510000006000000180000000000000000000000000000006600020000000000180000000000000000000000000000009500000000000000870300000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000002, 0x4, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x6f, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0x10, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca2, 0x1, 0x0, 0xff, 0x7, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x7, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0x9, 0x9, 0xb6, 0x24, 0xcb, 0x5, 0x7f, 0x5, 0x311, 0x66d1, 0xfffffffc, 0x9, 0xb6eb, 0xc74, 0x77, 0x2, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x3, 0x4680, 0x9a7f, 0xe665, 0x3c6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0xfffffe00, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x0, 0xa, 0x1b, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x8, 0x2003, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0xf, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x8, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10000, 0x1, 0x9, 0x9, 0xc6, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x40000009, 0x68, 0x7, 0x1ff, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x9, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0xe, 0x981, 0x80000000, 0x7fff, 0x7, 0x4, 0x7, 0xc4c, 0x45e3, 0x5, 0x7, 0x3, 0x5, 0x40, 0x0, 0x1, 0x8002, 0xffffffff, 0x4, 0x200000ce, 0xf, 0x390, 0x1, 0xa, 0x3, 0x4, 0x9, 0x9, 0x37c, 0xd, 0x8, 0x1, 0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x4, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x6, 0xd, 0x34ea, 0xfffc, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x9, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x4, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0x9, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x7c, 0x9, 0x40000000, 0x4, 0x10000004, 0x0, 0xd, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x2c95, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x0, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x400006, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0x0, 0xffffffff, 0x0, 0x81, 0x0, 0xae, 0x8, 0x1, 0xfffffeff, 0x6, 0x5, 0x7fff, 0x103, 0xb, 0x8000006, 0x709, 0x2, 0x49, 0x10, 0x7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0x4, 0x9, 0x8, 0x1, 0x2, 0x5, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xffff0000, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0xc, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x0, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0x4, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0xc2, 0x2, 0x4, 0x0, 0x80000000, 0xd, 0x2, 0x1, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0x1c, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x408, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x9, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x8000000, 0x0, 0xfff, 0x8101, 0x4, 0x0, 0x9, 0xc, 0x3, 0xffe, 0x101, 0xffef, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x1, 0x4000d, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x3, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x0, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x1000, 0x7, 0x62f2f805, 0x8, 0x3, 0xffffffff, 0x2, 0x7f, 0xf90, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6709, 0x10001, 0x0, 0x7f, 0x8, 0x6, 0x0, 0xa95a, 0x0, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0xff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x5, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x0, 0xf, 0x3, 0xe, 0x8, 0x7, 0x3, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x7, 0x0, 0x0, 0x35, 0x8, 0x5, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x83fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x1, 0x6, 0x9, 0x0, 0x8, 0x5, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x28f, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x1, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x10000004, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9af, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0x7, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0x1, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x0, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x9, 0x80, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x7, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x4, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0xffffffff, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x400, 0x51, 0x7, 0xefb, 0x200000b8, 0xfffffff7, 0x5, 0xfffffff7, 0x7, 0x7, 0x7, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x1, 0x0, 0x6, 0x7, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0x9, 0x6, 0x6, 0x6, 0xfff, 0x0, 0xa7b, 0x62cc, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x42, 0x3, 0x4, 0x5, 0x5, 0x675, 0x5, 0x8, 0x5, 0x3, 0x8, 0x0, 0x80000001, 0x54, 0x400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x5, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x7, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x4, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x5, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0xf, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x0, 0x101, 0x200, 0x8, 0x7ff, 0xffffffff, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0x0, 0x7f, 0x8, 0x6, 0xe, 0x3, 0x80000001, 0x0, 0xf, 0x5, 0x7, 0xde, 0x6, 0x89, 0xfffffffd, 0x100, 0x1, 0x9, 0x6, 0x3fe, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x1, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x4b0, 0x8]}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20081, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xff2e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000d40)=ANY=[@ANYBLOB="6000000010000104a0518fd50000000000000000", @ANYRES32=0x0, @ANYBLOB="096b0200000000002c00128009000100626f6e64000000001c00028006001900ff0300000800090001000000080007000000000014003500626f6e6430"], 0x60}, 0x1, 0x0, 0x0, 0x20044054}, 0x4000054) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$igmp(0x2, 0x3, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002b40)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) 3.333803914s ago: executing program 1 (id=6088): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000a80)=ANY=[@ANYBLOB="140000001000410000000000000000000500000a7c000000060a010400000000000000000a0000010900010073797a31"], 0xa4}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000040) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB="70000000020701030000070000000000050000030c00034000000000000000062c00078008000140"], 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000040)='./file4\x00', 0xa18c14, &(0x7f0000001040)=ANY=[@ANYBLOB="00085aeb3fcbabe8bda694c0"], 0x88, 0x29b, &(0x7f0000000180)="$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") r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffc0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 3.183918489s ago: executing program 6 (id=6089): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x404, &(0x7f0000000240)={[{@init_itable_val={'init_itable', 0x3d, 0xc}}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@grpquota}, {@quota}]}, 0x3, 0x442, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000380)=ANY=[@ANYBLOB="d96fe6cb6b53bab6eb66"]) 3.086047162s ago: executing program 1 (id=6090): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='truste'], 0x0, 0x0) 3.023021084s ago: executing program 2 (id=6091): r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x520, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0xa98, 0x3}, 0x0, 0x1224, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002200)={0x194, 0x0, 0x2, 0x301, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_NAT={0x104, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x7c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x2a}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}]}, @CTA_EXPECT_NAT={0x7c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @private1}}}]}, @CTA_EXPECT_NAT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) dup(0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0xffaf) r3 = socket(0x1e, 0x5, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r4, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) listen(r3, 0x0) accept$inet(r3, 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x321}, {&(0x7f0000000280)=""/85, 0x21}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000580)=""/106, 0x659}, {&(0x7f0000000980)=""/73, 0xd}, {&(0x7f0000000200)=""/77, 0x69}, {&(0x7f00000007c0)=""/141, 0xc4}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x2000, &(0x7f0000003700)={0x77359400}) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="04b1078a689676c730ec07ea11daf00a92e56fc3c87df05c1a1f319eeeb9e63771002ae6d233f238f9a8c67be83635cef819427c12b9089886b00f19b677e2c72f99b09bb64d9bf03367637780875eb022e781d6feeb02f268134814a8f854ddfe3ee8959e23b13cc405e7f5fda0226b1d05180cc804646b36c1d1a9bf93f71671421c8f1dea49082308a4bceca0a56dae8b34a01d0ae5cec8dcd65d1c20cd358d6fac934f3c06022c9b414b602034c933ae59e1", 0xb4}], 0x1, 0x0, 0x1, 0x1b892cb48121821) 3.017344685s ago: executing program 6 (id=6092): setxattr$incfs_metadata(0x0, 0x0, 0x0, 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) setpriority(0x1, 0xff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = memfd_create(&(0x7f00000006c0)='/dev/loop#\x00\xee\b\xce\xde\xe9\x8d\xd2\xd59\xe8\xda\b\xd6\xb2\x15\xf6F\xb8\xb4{r.\xd2\xea\xec\xdbXe&J \xe9\x16\x82\xe8=\x83\x88sN\x83N`\xf9\xec\xe1\xb16\xfb*\xf5\xd5\\\xa7\xebe\xbe\x9d\xd7\xf5\xb9<\xb2\xc4\xf9:\xef\xc0g\xc3\xb5\x7f\xc0\xcck.5=\xcc\x10Y\xad^*\x10\x00\x00\x00\x00\x00\x00\x00\x0e%\x84\x95bXy\x81;o\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9{b\xab\x91\x88\xba\xa5J\xfd\xd2\x96R\x06\xeeP\x0f\xb0\xad_\x0e\xf6\xe7k\xbf\x93)\x02yX\x91\xc0\x8c\xeb\xd9\xda=\\\xa0\xdeke\xb6\xef\x10\xd2\xbd9\x87<[BKq\t*t\x9e\xf9\xa6\xb5\xda\tb\xcc%?\x14Y\x9b\x18nx\x19\x11\xb7\x9d~\xc5{O\xd0S\xbdi\xf8\"P>4\x05E|h?\x0f\xf5\xf8\x8c\xce\xebXN\xb7\xc0F\xbao\xf7\xab\xedO\x96\xa1(\n\x1e\xf9\xbe/.\xe2^\xb0\xb6{\x1fdX\x100v\xab\xce\x05\x00i\x85\xf63\x05\b\xd8\xeb\xdf\x00\x00]N\xe1\x9di&\r\xd2pw\x85\vQ \x82v\x8a7\xb6\xf8\x1c\x8c\xf0\xaf\xfa\x17\xbeD\a\vM\x87\xc0Q\x94\xd4\xd3\xc7I@Z\t\xa9\xf0\x9d4c\xb1^\xeeF\x96\xa1{OV\xe0\x1e#\xb3w\xc7\x87\xdd\'c\xcf.\x04\x8b\x9e\xef-b\xbe\x17T\xee\xe1\xf7\'+s\x15\xeb\xb1D\x86\x93\x1e\xf9\xf1L\x0f\x9b7/\xd9D\x91\xc47hI\xbc\x13.@R\x8b\xe2x\x97:A\xf1\xb6\xe2\xc8\xb2\x9bD\xb2P\xdc\xd4\xb1\xa50\x9f\x83~)\x9b7-\x80&r\xbc\xf6\xcf\xcc\xe0\x04\x93>\xb8\x88\xc0\xad\x97\xd3.\x04\xc4n\x83Sb\x83\xf6L\xb7$\xb4\xeb\x91\x88\xcfn\xccwN\x9c\x8a\xb7\xfd\x83G\x18[\x00\xee\xfe\x9e\xab\xc4\xb3\x1d-q]\vep\xee\x18\xa9\x86\xa5\x1a\xd5\x92\n,\x14\x96~\x0fW\xbb\x8a:\xf5\xa3\x9b\x004\xd8\xf8_\x0e\xee\xbe>\xd7\x90\x95\xcb^\xe2a\xf4\xe5Z5\x92~@ \x00\x9b\xca\xea\xa8\xc0,\xcc\xe9s\xca\xd3\"\x14\xf3\x11\xe5\x0e\x93\x9aY\xb6\xa2|\xe8\xfe0\x9e\xc2\x99b\xd7\xd9\xa6\x15oO\xe2\xfe\xd0F\xcc\xeb\x1a\x84\x06E\xec\xf5\x9e\xea\xccB\xdd\xd84f\xb2O\r\x12\x1a\x1d\xb8\x92Q)=\xaa?\x13T\x82\xdf-E\xa4>c\xcd\xf57\xde\x17_\xfa\x9dd]-\xdd3.\x91\xd9/r\xc6>\xe4]\x8b', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000001800)='\x00', 0x1}, {&(0x7f0000000580)="d18a9a05", 0x4}, {&(0x7f0000000440)="a703648b07", 0x5}], 0x3, 0x2) splice(r4, 0x0, r3, 0x0, 0x25a5, 0x4) r6 = getpgrp(0x0) r7 = syz_pidfd_open(r6, 0x0) fremovexattr(r7, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00') socket(0x2, 0x80805, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @local, 0x9}]}, &(0x7f00000002c0)=0x10) 3.017121545s ago: executing program 1 (id=6093): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @local, 0x1}, 0x1c) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f000000000000) 2.930134887s ago: executing program 1 (id=6094): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7}, 0x0, 0x400020, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x800000000fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000b40)={0x0, 0x0, 0x2, 0x81, 0x81}) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) r7 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) listen(r7, 0x9) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r8, &(0x7f00000000c0)="ab", 0xfffd, 0xc1, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000140011f225bd7000fddbcf250284", @ANYRES32], 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x40) io_setup(0x6, &(0x7f00000001c0)) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/76, &(0x7f0000000280)=0x4c) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}, 0x1, 0x0, 0x0, 0xf753f68d4481fbf}, 0x0) 2.609680249s ago: executing program 0 (id=6095): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r5 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r5, &(0x7f0000000080)={0x1d, r4, 0x0, {0x1, 0xf0, 0x3}}, 0x18) sendmsg$can_j1939(r5, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff5653f, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000bc0)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xffff}, {0xffff, 0xffff}, {0x0, 0xd}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [], 0x0, [0x1, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x8000, 0x0, 0x0, 0x3dc, 0x0, 0xfffd], [0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x44, r10, 0x1, 0x70bd27, 0x1, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xb6}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x48c1}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r10, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40051}, 0x4000) 2.259290741s ago: executing program 8 (id=6096): syz_open_procfs(0x0, &(0x7f0000000ec0)='mountstats\x00') socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file1/file0\x00', 0x104) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0xc402, 0x80) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000001, 0x12, r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000003bc0)={0x2, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700001795737f61fe19840a0a6f2a544d6d5b09ff9e73971711eb81ac55330a9156938817111e77f0c3568bb8ed99a53affefdc026a7fe5e530f6b4"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100004}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RVERSION(r1, &(0x7f0000000c40)=ANY=[], 0x13) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x5], &(0x7f0000000180)=[0x2], 0x0, 0x1, 0x1}}, 0x40) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x10f4, 0x1a, 0x12, r0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) writev(r5, &(0x7f0000001300)=[{&(0x7f00000001c0)='4', 0x1}, {0x0, 0x180}], 0x2) write$UHID_CREATE2(r4, &(0x7f0000000140)=ANY=[@ANYRES8=r4], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000001, 0x12, r4, 0x0) r6 = memfd_create(&(0x7f0000000580)='\xfd\x0fm3#/\t\x00\x00\x00\x00\x00\x00\x00\xc2\f\x03\x19\x9c\x8e\xcb\x90\x00\x00\xaegQ\x0e\x94\\y\x0fU2@\'\x8a\x80\x00$\x12\xfc\xe4.)\x9b\xf2@\xf0\xe0\xdb\x1f\xe6\xb4gc\x13\xda\xf9\xcd7el\xb7\xe6\b\x00\x00\x00\x00\xef\xff\x00vob/~\xc2\x00\b\x00\x00\x00\x00\x00\x00 \xff\xf1\xdem\x9c;%\xb5\"\xe4\xf1x2\x8a\x19p\x04\\\xaa-\x93\xd1\xc4 )\xbfK\xf7E\xf3\x05\xa0\xd0\xe6%\x97\x15\xf0\xab\x86\x90k\x10\xcer\x14\xe0a\xaf\xab\xfe\xd9V\x19\xa5d\x16\x8e]:3\xff\t\xe6\xf7\xb3\xbf\xa3\b[?\xb5\x14t\xd3\x8e\xc0\xe8\xefd\x88\xddz\xa25)\x17\xef\xfb4\xff\xdb\t\x8e\xeb\x1d\\\xf9\x14\xc7\v\xa8\x89\xdb A\xbaBAj\xfe\x18\xc3-+\xd6\xb0K\xee\x1b+\xc7lA\x84\xa6\xfe\x8bU<&\x1a\xe7m\x86\xb7\x04\x00\x00\x00\x00\x00\x00\x00\a.$K\x833\x82\x7f\x1b\'nj\x06\b\xd7\xe8] \x87A[y\xdc\x14\f\xcet\x00\x1f\x0f\xef\xca\xcfz\x7f\an0\xebB\xb8}&\xdd\xc9\xa7\x1dp\t\x9a\xceb \x81\xaaq{H\x88\xdf\xf8\x80\\\x1c8\xfe\xc4\xe3\xb0\x90\xcb\x8b1r\x94\x9f\x00\xce\xc8\xc3\x84\xb0\xc9\b\x00\x81Ks\xba\xbbC6\xd6\x13\xb5\xe086EzD\x18\xd5\x16\x88E\xc6\xf0A9\xf1u\xb3\x85\x02\x12\\Sp\xf4\x9a\xe8\x96^\xe6\xa8K\x12\b}\xff\xcb{\xc6\xf6\xb4\x8b\xb6\xa8Y\xf2\x91\xeeR\v#\xb5)\xb0\x99\x9b-p\xe3\x17\x04\xb0\xdc\x0fk\x11\xe1\x9a\a\x16\xb7\x9b\x88\xfa\x1e`\x84$\xfc\xd7\xf5^X\xd8[}\x032\xd0\x84\xdby\x94Vp\xa5\xcd(\xab\xb6\x95sR\xab\xfc\x8c\'\x9c\x16Q\xad\xbc\xb04%\xb7\xe5\x14\xb1`\x87#X\\W`;\'_4\xc5\xc9\x921<\xd9\xad\x9f\x12@!\xfaI\x88\xab\xef\x86\xe9\a>\xdd7\xb7\x8e\x9c0-o\xc9\xec_|\x02\xc8Ru\x95\xa8#U\xd6J\x87\xf6X\xb6{\x11$\x00\xc8\x14\xcb\xd1nK\xd8\xb9\x0e\x9bA\xed\xbcs\x1fS\r\x12O\x83\x15\xcb(\xdb\xb1S\x1f%\x04\x9a\xa0l\xa3}\xe7r\x02\x00\x00\x00\x8aeh;F[\xe2\x1c\xe26 \x19k&.\x7f\x1d~\xdaI\xd4\x99\a+\xdf]\xbc\xa6\xc3\x0f\x99W\x9c-t\v\xc7J\xfd\x91\x853\xd1j;\x19W\x96V\x8az+\xf9\x82#\xfaS\xa3YN:\xe8\xda\xbc\xb2h\x8f\xe0\xc6d\x96\xccy\xb3\xc2\x98\x1c\xca\xde\"\xaeW\x89\x83\xc2sB\xe7\b\x9b9~}\xc2\xb3\x1d\xcc?\xd1\x89\xef\xca\x00\x00\x00\x00\x00\x00\x00\x00\x00J[\xc4\x04\xc1\xa6\x10\xc2\x9d\x11\t|\xc0\t\xd9(\x80\x14\x16\xaa\x88\x8a\xd6\xa2\x01\x10W]Z\x8d\xf7\xd1P\xf9d\x01|\xa3\x03hS\x81\x95\x8f\xe1J\xd3#-fcCz\xff\x80\xe2M\xa3-r\xf6\x1a\xd75\xdc\xe1\xe4\xc3\x9dU t}\x02\x9a{C|S\xf4\x98\x05\xb9\x15}\xfa\"\xdc\xc2r\xf9\a\xadnD\xb6\x06\xd3\'\x10\x9f|\x17\xd6\x89O\f\x98@\x85\xa5m\x9d\\&\x17o\x11Z=l\xfb\x93\x8exZ\xa2K\xa1\xb3\xce\x1e\x96{%\xa8\xc7\x93\xdb\x80v+o\xb8\xe8\x1b\x06\xfbwb\x11\xb7\x9fu\xf3\xd3\x7f\x04k\xa0B\xa5\xc9\xb1\xec\xb1\xf6\x11\xc1O\xecG\xe6q5\x97u\x0fl\x90\x9b\x9f\xaf\xfb\xdf\x12^\xc9\x92|\x11\"\xd7\xb5\xf0\xdc\\\f\xec\xfd\xa1\xfdVZ*\xeb\xde\x14\xe0\x8b\x1c\x820b\x89\xbd\xd7\x0e\x9b\xf2\xe9A\xfb\x89\xc6\x84\x14b\xd4\x7f\xdf.\x05\x00S\xf5\x19\xb4fE\x87\xd4E\xc8>\x8f\x05Bg\x15\xe1\x8c\x94ERT\xac\xb4\x00\x00\x00\x00\x00\x00\x00\xc4\x0f\xc1\x9e\xf6#f\x03\xb0\xe4\xb6\xf5\x04z+Pa\xbc\x12a7z\xad6\xf7\xeb\xa7\x88\"\xcf\xf6\xcfP\x12\a;h\x95\x90\x83\x06\xdf\xbd}.\xa6$2D\xf1T\xc9\x8aG\x12\xe51$\xe7ZeBiu\nL\xb1N\xd5\xea2\x84\xd7\xf7\x9ff\x88\x0f\xc9\nV\x96\xf2I\xee\xa3g\x02czw[\xb7\x16\xa1\xe3\\K\xe6LC\xe3\"\xec\r\xd6\xd6\xb6\xf8Du\x84k\x8e\xe4\xdaO\xb30\xdd\xaf\x96\x18wIzO\bY\xcd\xea\x9b\xef\b\xacD\xf2k\xc6\x91\xc2\x8b\'\b\xb5\x10\xdd\x92\x9c6\xda\n\x9bN\xba\xc1\x86^\x98\xf1I%=lo\x8eY.\x10\x88\xb5\xa2pFh\xbf\xeb\x8c\x92sl\x87XhJ`\xda\xf9\xd7\x81f\xcf\x96%\x97ue.J\x06#\x0f\xa5\x05Y\x13\xbfL\xab\a\xe2\xfa\xe5\xa2s\x04h*s\xbe\x89\x9d\x1f\x98\x1do\x036\x1f\xdc\x85\x90\vW\x8e\xcc\x19\xe2VjJ\x10T\x88%p\x97\xb5\b\xb4}\x16\x8d\x94\xd9\xa9I>\f\xf7\x7f\xd5+\'\xc3l\x93\x97*^Th\xdd\x8fZ\xe2GXm\xe5(\xee\xbfE\xcb\x14\x10h\xc1\x16\xb5\xcf\x91\x9c\'\x8f\xba\x06>', 0x6) fcntl$addseals(r6, 0x409, 0xe) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x2000003, 0x13, r6, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r7, 0x541c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x20000000000009, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0xe, 0x7, 0xb, 0x3, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3fffffffff, r5, 0xa) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000021c0)='./file1\x00', 0x10000, &(0x7f00000022c0)={[{@grpid}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3}}, {@norecovery}, {@errors_remount}, {@nobarrier}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x586, &(0x7f0000000a40)="$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") setxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000200), &(0x7f0000000000)=ANY=[], 0x700, 0x0) 2.194299633s ago: executing program 8 (id=6097): unshare(0x20060400) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_usb_connect$cdc_ncm(0x1, 0x8c, &(0x7f0000000b00)=ANY=[@ANYBLOB="12014101020000202505a1a440000102030109027a0002010650450904000001020d0000052406000105240004000d240f010200000005000d000d06241a08001308241c0c0003090007240afff2fd0107240a0703080008241c060000000109058103200008541b0904010000020d00000904010102020d0000090582020800020efa09050302400004000f0e5e19ef925b7bed01221a458cb3a508b64f3c15324fa66995a2cf87a21ca5f04be76e52f3144856d436461213951a8f462e1a9dd6b37f8f23490e126082895eb2694b1d7a047ea0af8f2eeda3c20d602f705c4323685630cc3f3c9c0e998bed36b0d657d3b77802aa50b354a41ea3d7829635cd10"], 0x0) 2.144463505s ago: executing program 2 (id=6098): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1], 0x14}, 0x1, 0x0, 0x0, 0x20004074}, 0x0) 2.134313725s ago: executing program 1 (id=6099): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ppoll(&(0x7f0000000740)=[{r0, 0x104}], 0x1, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000480), 0x1, 0x2) poll(&(0x7f0000000a00)=[{r0}], 0x2e, 0x5) r1 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, 0x0) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) readv(r2, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f00000000c0)=""/121, 0x79}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000540)=""/213, 0xd5}, {&(0x7f0000000340)=""/123, 0x7b}, {&(0x7f00000003c0)=""/244, 0xf4}], 0x6) 2.125796096s ago: executing program 2 (id=6100): r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x400, 0x60}, 0x18) openat2(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x84041, 0x41, 0x2c}, 0x18) quotactl$Q_SETINFO(0xffffffff80000602, &(0x7f0000000140)=@rnullb, 0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x2}) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r3, 0x0, 0x0, 0x1000000300) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x101, r3}, 0x38) syz_open_procfs(0xffffffffffffffff, &(0x7f00000024c0)='net/udplite\x00') bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r4 = inotify_init1(0x80000) inotify_add_watch(r4, &(0x7f0000000080)='.\x00', 0x2000775) lsetxattr$security_selinux(&(0x7f00000012c0)='.\x00', &(0x7f0000001280), &(0x7f0000001240)='system_u:object_r:fsadm_exec_t:s0\x00', 0x15, 0x0) 2.057418528s ago: executing program 6 (id=6101): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c000000150001000000000001000000fe80000000000000000000000000002bfe8000000000000000000000000000bb4e23ffff000000000000000016000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="af2b6e0900000000000000000000000000000000279777e7f07f84fa271a074dee1f546eccd250877a33d143"], 0x5c}}, 0x40c1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r2 = socket(0xa, 0x3, 0x87) sendto(r2, &(0x7f00000003c0)="e1118ce4769b", 0xfdef, 0x800, &(0x7f0000000600)=@l2tp6={0xa, 0x0, 0x7, @local, 0x5}, 0x80) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x45e, &(0x7f0000000b40)={[{@data_err_ignore}, {@min_batch_time={'min_batch_time', 0x3d, 0x80000000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}, {@lazytime}, {@errors_remount}, {@nodiscard}]}, 0x3, 0x44a, &(0x7f00000006c0)="$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") mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x4, @void}, 0x10) 1.745701689s ago: executing program 6 (id=6102): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x404, &(0x7f0000000240)={[{@init_itable_val={'init_itable', 0x3d, 0xc}}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@grpquota}, {@quota}]}, 0x3, 0x442, &(0x7f00000005c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000380)=ANY=[@ANYBLOB="d96fe6cb6b53bab6eb"]) 1.700990161s ago: executing program 6 (id=6103): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, &(0x7f0000000240)=""/32, &(0x7f0000000000)=0x20) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x6, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000b3b20000000000000000000085100000010000e094000000000000008500004089165b5a68533d947fb800ad"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0xa}, 0x94) r2 = socket$inet6_udp(0xa, 0x2, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) r4 = dup2(r3, r3) ioctl$BLKTRACESTOP(r4, 0x1263, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000840)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x140, 0x178, 0xc, 0x140, 0x178, 0x210, 0x258, 0x258, 0x210, 0x258, 0x3, 0x0, {[{{@ipv6={@loopback={0x1f0}, @remote, [0x0, 0x0, 0x0, 0xff], [], 'syzkaller0\x00', 'netpci0\x00', {}, {}, 0x3a}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x80000001, 0xce4, 0x4, 0x8, 0x0, 0x5, 0xc0de}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@mcast1, @private1, [], [0x0, 0xffffff00], 'wg2\x00', 'hsr0\x00', {}, {}, 0x0, 0x7}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x10009, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x8, 0x100}, 0x204, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x2, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000c, 0x0, 0x10004, 0x8, 0x2, 0x80000001, 0xa0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdffffffffffffffe, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x60, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x400, 0xc48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) r5 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, &(0x7f0000000600), 0xfd, 0x57e, &(0x7f00000011c0)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x441, 0x104) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000140)={0x5, 0x0, 0x3, 0xffffffffffff6d0a, 0x1, 0x2}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r7 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0x1f5}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00'], 0x50) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) io_uring_enter(r7, 0x2219, 0x7721, 0x16, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r8) syz_io_uring_setup(0x2be, &(0x7f0000000040)={0x0, 0x5294, 0x40, 0x3, 0x2a1}, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000000)) 1.589366334s ago: executing program 8 (id=6104): tgkill(0x0, 0x0, 0x13) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x8080, &(0x7f0000000040)=ANY=[@ANYBLOB="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", @ANYRES8], 0x3, 0x232, &(0x7f00000002c0)="$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") r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0xff, 0x2, 0x9}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) sendfile(r0, r1, 0x0, 0xffffffff000) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000b00)=""/225, 0xe1}], 0x1}, 0xffffffff}], 0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./bus\x00', 0x389c93, 0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) chdir(&(0x7f0000000140)='./bus\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x101042, 0xa) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./bus\x00', r2, &(0x7f00000004c0)='./file0\x00', 0x2) 1.126178351s ago: executing program 2 (id=6105): move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x277) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020400) syz_emit_ethernet(0xaf, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa8100000086dd60f7d8ff00753c0020010000000000000000000000000000ff0200000000000000000000000000010004c910"], 0x0) poll(0x0, 0x0, 0x9) syz_clone3(&(0x7f0000000300)={0x101080, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x40}, &(0x7f0000000580)=""/219, 0xdb, &(0x7f00000006c0)=""/251, &(0x7f0000000240)=[r0], 0x1}, 0x58) prlimit64(r3, 0x6, &(0x7f0000000280)={0x6, 0xb}, &(0x7f00000003c0)) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000680)=""/9, 0x9}], 0x1, 0x20033, 0x51b) r5 = socket(0xa, 0x5, 0x0) sendmsg$inet_sctp(r5, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @loopback, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, 0x0, 0x0, 0x4855}, 0x24000052) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(0x0, r7) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, 0x0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf252000000008000300", @ANYRES32=0x0, @ANYBLOB='\x00'/13], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) 1.084771382s ago: executing program 1 (id=6106): setxattr$incfs_metadata(0x0, 0x0, 0x0, 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) setpriority(0x1, 0xff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) r5 = memfd_create(&(0x7f00000006c0)='/dev/loop#\x00\xee\b\xce\xde\xe9\x8d\xd2\xd59\xe8\xda\b\xd6\xb2\x15\xf6F\xb8\xb4{r.\xd2\xea\xec\xdbXe&J \xe9\x16\x82\xe8=\x83\x88sN\x83N`\xf9\xec\xe1\xb16\xfb*\xf5\xd5\\\xa7\xebe\xbe\x9d\xd7\xf5\xb9<\xb2\xc4\xf9:\xef\xc0g\xc3\xb5\x7f\xc0\xcck.5=\xcc\x10Y\xad^*\x10\x00\x00\x00\x00\x00\x00\x00\x0e%\x84\x95bXy\x81;o\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9{b\xab\x91\x88\xba\xa5J\xfd\xd2\x96R\x06\xeeP\x0f\xb0\xad_\x0e\xf6\xe7k\xbf\x93)\x02yX\x91\xc0\x8c\xeb\xd9\xda=\\\xa0\xdeke\xb6\xef\x10\xd2\xbd9\x87<[BKq\t*t\x9e\xf9\xa6\xb5\xda\tb\xcc%?\x14Y\x9b\x18nx\x19\x11\xb7\x9d~\xc5{O\xd0S\xbdi\xf8\"P>4\x05E|h?\x0f\xf5\xf8\x8c\xce\xebXN\xb7\xc0F\xbao\xf7\xab\xedO\x96\xa1(\n\x1e\xf9\xbe/.\xe2^\xb0\xb6{\x1fdX\x100v\xab\xce\x05\x00i\x85\xf63\x05\b\xd8\xeb\xdf\x00\x00]N\xe1\x9di&\r\xd2pw\x85\vQ \x82v\x8a7\xb6\xf8\x1c\x8c\xf0\xaf\xfa\x17\xbeD\a\vM\x87\xc0Q\x94\xd4\xd3\xc7I@Z\t\xa9\xf0\x9d4c\xb1^\xeeF\x96\xa1{OV\xe0\x1e#\xb3w\xc7\x87\xdd\'c\xcf.\x04\x8b\x9e\xef-b\xbe\x17T\xee\xe1\xf7\'+s\x15\xeb\xb1D\x86\x93\x1e\xf9\xf1L\x0f\x9b7/\xd9D\x91\xc47hI\xbc\x13.@R\x8b\xe2x\x97:A\xf1\xb6\xe2\xc8\xb2\x9bD\xb2P\xdc\xd4\xb1\xa50\x9f\x83~)\x9b7-\x80&r\xbc\xf6\xcf\xcc\xe0\x04\x93>\xb8\x88\xc0\xad\x97\xd3.\x04\xc4n\x83Sb\x83\xf6L\xb7$\xb4\xeb\x91\x88\xcfn\xccwN\x9c\x8a\xb7\xfd\x83G\x18[\x00\xee\xfe\x9e\xab\xc4\xb3\x1d-q]\vep\xee\x18\xa9\x86\xa5\x1a\xd5\x92\n,\x14\x96~\x0fW\xbb\x8a:\xf5\xa3\x9b\x004\xd8\xf8_\x0e\xee\xbe>\xd7\x90\x95\xcb^\xe2a\xf4\xe5Z5\x92~@ \x00\x9b\xca\xea\xa8\xc0,\xcc\xe9s\xca\xd3\"\x14\xf3\x11\xe5\x0e\x93\x9aY\xb6\xa2|\xe8\xfe0\x9e\xc2\x99b\xd7\xd9\xa6\x15oO\xe2\xfe\xd0F\xcc\xeb\x1a\x84\x06E\xec\xf5\x9e\xea\xccB\xdd\xd84f\xb2O\r\x12\x1a\x1d\xb8\x92Q)=\xaa?\x13T\x82\xdf-E\xa4>c\xcd\xf57\xde\x17_\xfa\x9dd]-\xdd3.\x91\xd9/r\xc6>\xe4]\x8b', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000680)=[{&(0x7f0000001800)='\x00', 0x1}, {&(0x7f0000000580)="d18a9a05", 0x4}, {&(0x7f0000000440)="a703648b07", 0x5}], 0x3, 0x2) splice(r6, 0x0, r5, 0x0, 0x25a5, 0x4) r8 = getpgrp(0x0) r9 = syz_pidfd_open(r8, 0x0) fremovexattr(r9, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00') socket(0x2, 0x80805, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @local, 0x9}]}, &(0x7f00000002c0)=0x10) 972.563066ms ago: executing program 0 (id=6107): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_emit_ethernet(0x47, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x11, 0x11, 0x0, @remote, @local, {[], {0x0, 0x4e22, 0x11, 0x0, @opaque="0300000070e185af60"}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000040)='./file0\x00', 0x2000800, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESOCT, @ANYRES64=0x0], 0x1, 0x296, &(0x7f0000000740)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x0, 0x8000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@allocspi={0x174, 0x16, 0x401, 0xfffffffd, 0xfffffffe, {{{@in=@multicast2, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x20000000, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0x0, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@proto={0x5, 0x19, 0x33}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in=@multicast1, 0x0, 0x2}}, @algo_auth={0x48, 0x1, {{'xxhash64-generic\x00'}}}]}, 0x174}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x28649dd88ba2cf0f}, 0x94) 889.561809ms ago: executing program 8 (id=6108): openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000c3000/0x2000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4044000) r0 = io_uring_setup(0x2410, &(0x7f00000010c0)={0x0, 0xc8a1, 0x2, 0x8, 0xc1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x17, 0x3, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r0, 0x2219, 0x7721, 0x37, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000001380)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000080000000d"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000001240)=ANY=[@ANYBLOB="0000e600cd3caf5f8498a352767c3d6450aa740968592d3c297b7b0165c68fc8409ca69f817f1417842e57618a55670e75498fb6cdbdef68d08c299437e3e53f806ac2357365ba2073e08fcef35d3e309e89bf3c31d5b9a2ec4f4001ebd22007301cde87b0c456d4b814f00a06f5b6bf535f4400f9d6a84f2d0156f58405b8f831724f639b18b2414b66c550cb76beaffec2896a97af2f30ed4a60b3e4b24f2c8904a566d11136ab9c1435a7f1f7c70e5b709b4b206bab352c330dab5cb35150b35cc6c81e37be11594f3baaaa25cc3f114d206b011bc16df23f0398e8d26a", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000000000008500000021000000b7000000000000009500000000000000"], 0x0}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket(0x2, 0x80805, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0xffffff9a) getsockopt$bt_hci(r2, 0x84, 0x80, &(0x7f0000000000)=""/4089, &(0x7f0000001080)=0xff9) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MRT_ADD_MFC(r2, 0x0, 0xcc, &(0x7f0000001000)={@multicast2, @empty, 0x1, "ca0ff2909a56b94085a1f3f5e4188b735d6a15f08c1488fb40d89a97f6c4cabe", 0x6, 0x5, 0x7fff, 0xfffffff2}, 0x3c) connect$unix(r4, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x6) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) recvmmsg(r6, &(0x7f0000007700), 0x318, 0xfc0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 528.945502ms ago: executing program 6 (id=6109): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7}, 0x0, 0x400020, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x800000000fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000b40)={0x0, 0x0, 0x2, 0x81, 0x81}) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) r7 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) listen(r7, 0x9) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r8, &(0x7f00000000c0)="ab", 0xfffd, 0xc1, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000140011f225bd7000fddbcf250284", @ANYRES32], 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x40) io_setup(0x6, &(0x7f00000001c0)) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/76, &(0x7f0000000280)=0x4c) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}, 0x1, 0x0, 0x0, 0xf753f68d4481fbf}, 0x0) 2.27244ms ago: executing program 2 (id=6110): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1], 0x14}, 0x1, 0x0, 0x0, 0x20004074}, 0x0) 0s ago: executing program 0 (id=6111): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x21081e, &(0x7f0000000000)={[{@grpquota}, {@journal_ioprio}, {@nodioread_nolock}]}, 0x1, 0x501, &(0x7f0000000ac0)="$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") mknod$loop(&(0x7f0000001b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0xa, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x6}, 0x204, 0x4, 0x43a1bd76, 0x9, 0x7, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f00000001c0)={0x1d, r4, 0x2, {0x1, 0x0, 0x2}}, 0x18) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x28}}, 0x44001) syz_genetlink_get_family_id$ethtool(&(0x7f0000000740), r3) r5 = creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1e0) write$cgroup_type(r5, &(0x7f0000000040), 0x9) renameat2(0xffffffffffffff9c, &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2) getsockopt$packet_buf(r5, 0x107, 0x3, &(0x7f00000001c0)=""/177, &(0x7f0000000280)=0xb1) kernel console output (not intermixed with test programs): ort for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 823.232823][T26245] EXT4-fs (loop2): Remounting filesystem read-only [ 823.242027][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 823.242050][ C0] EXT4-fs (loop2): initial error at time 1777366324: ext4_map_blocks:786: inode 11: block 10 [ 823.242092][ C0] EXT4-fs (loop2): last error at time 1777366324: ext4_map_blocks:786: inode 11: block 10 [ 823.314141][T26200] dummy0 speed is unknown, defaulting to 1000 [ 823.317267][T26245] EXT4-fs warning (device loop2): ext4_evict_inode:268: couldn't mark inode dirty (err -30) [ 823.348963][T26245] EXT4-fs (loop2): 1 orphan inode deleted [ 823.365585][T26245] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 823.482264][T24449] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 823.538510][T26098] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 823.564408][T26098] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 823.630433][T26098] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 823.642444][T26098] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 823.668497][T26200] chnl_net:caif_netlink_parms(): no params data found [ 823.826063][T26292] loop3: detected capacity change from 0 to 512 [ 823.833207][T26292] EXT4-fs: inline encryption not supported [ 823.877652][T26292] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 823.890990][T26292] ext4 filesystem being mounted at /144/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 823.903255][ T941] bridge_slave_1: left allmulticast mode [ 823.909349][ T941] bridge_slave_1: left promiscuous mode [ 823.915645][ T941] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.011931][T26308] netlink: 24 bytes leftover after parsing attributes in process `syz.8.5606'. [ 824.080146][T26313] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5608'. [ 824.514831][ T941] bridge_slave_0: left allmulticast mode [ 824.520602][ T941] bridge_slave_0: left promiscuous mode [ 824.526799][ T941] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.639157][T26200] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.646492][T26200] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.653802][T26200] bridge_slave_0: entered allmulticast mode [ 824.660337][T26200] bridge_slave_0: entered promiscuous mode [ 824.666903][T26313] FAULT_INJECTION: forcing a failure. [ 824.666903][T26313] name failslab, interval 1, probability 0, space 0, times 0 [ 824.667279][T26200] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.687281][T26200] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.694518][T26313] CPU: 0 UID: 0 PID: 26313 Comm: syz.3.5608 Tainted: G W syzkaller #0 PREEMPT(full) [ 824.694590][T26313] Tainted: [W]=WARN [ 824.694632][T26313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 824.694645][T26313] Call Trace: [ 824.694653][T26313] [ 824.694661][T26313] __dump_stack+0x1d/0x30 [ 824.694687][T26313] dump_stack_lvl+0x95/0xd0 [ 824.694711][T26313] dump_stack+0x15/0x1b [ 824.694784][T26313] should_fail_ex+0x263/0x280 [ 824.694805][T26200] bridge_slave_1: entered allmulticast mode [ 824.694892][T26313] should_failslab+0x8c/0xb0 [ 824.694917][T26313] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 824.694942][T26313] ? __alloc_skb+0x2d6/0x690 [ 824.695033][T26313] __alloc_skb+0x2d6/0x690 [ 824.695060][T26313] ? __alloc_skb+0x200/0x690 [ 824.695088][T26313] netlink_ack+0xfd/0x500 [ 824.695120][T26313] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 824.695171][T26313] ? __pfx_nl802154_set_llsec_params+0x10/0x10 [ 824.695278][T26313] ? __pfx_nl802154_post_doit+0x10/0x10 [ 824.695303][T26313] netlink_rcv_skb+0x192/0x220 [ 824.695335][T26313] ? __pfx_genl_rcv_msg+0x10/0x10 [ 824.695401][T26313] genl_rcv+0x28/0x40 [ 824.695490][T26313] netlink_unicast+0x5c0/0x690 [ 824.695523][T26313] netlink_sendmsg+0x5c8/0x6f0 [ 824.695545][T26313] ? __pfx_netlink_sendmsg+0x10/0x10 [ 824.695566][T26313] ____sys_sendmsg+0x563/0x5b0 [ 824.695666][T26313] ___sys_sendmsg+0x195/0x1e0 [ 824.695788][T26313] __x64_sys_sendmsg+0xd4/0x160 [ 824.695824][T26313] x64_sys_call+0x194c/0x3020 [ 824.695912][T26313] do_syscall_64+0x12c/0x370 [ 824.695940][T26313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.695973][T26313] RIP: 0033:0x7f815868c819 [ 824.695991][T26313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 824.696051][T26313] RSP: 002b:00007f81570c6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 824.696073][T26313] RAX: ffffffffffffffda RBX: 00007f8158906090 RCX: 00007f815868c819 [ 824.696088][T26313] RDX: 0000000004000000 RSI: 00002000000005c0 RDI: 0000000000000006 [ 824.696103][T26313] RBP: 00007f81570c6090 R08: 0000000000000000 R09: 0000000000000000 [ 824.696117][T26313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 824.696131][T26313] R13: 00007f8158906128 R14: 00007f8158906090 R15: 00007fffd592cad8 [ 824.696174][T26313] [ 824.931088][T26200] bridge_slave_1: entered promiscuous mode [ 824.932375][T22003] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 825.018902][T26200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 825.035940][T26098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 825.050567][ T941] hsr_slave_0: left promiscuous mode [ 825.060053][ T941] hsr_slave_1: left promiscuous mode [ 825.102811][ T941] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 825.120658][ T941] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 825.330748][ T941] team0 (unregistering): Port device team_slave_1 removed [ 826.321952][ T941] team0 (unregistering): Port device team_slave_0 removed [ 826.888882][T26200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 826.929056][T26098] 8021q: adding VLAN 0 to HW filter on device team0 [ 826.967787][T22161] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.975397][T22161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 827.126657][T26200] team0: Port device team_slave_0 added [ 827.139865][T26200] team0: Port device team_slave_1 added [ 827.172831][ T1648] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.180001][ T1648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 827.189298][T26397] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5620'. [ 827.211645][ T28] kauditd_printk_skb: 102 callbacks suppressed [ 827.211664][ T28] audit: type=1400 audit(1777366328.023:7247): avc: denied { bind } for pid=26395 comm="syz.3.5620" lport=11 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 827.295882][T26397] loop3: detected capacity change from 0 to 4096 [ 827.312176][T26098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 827.326355][ T28] audit: type=1400 audit(1777366328.053:7248): avc: denied { name_bind } for pid=26395 comm="syz.3.5620" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 827.354312][T26397] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 827.369889][T26200] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 827.379190][T26200] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 827.407628][T26397] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 827.419346][ T28] audit: type=1400 audit(1777366328.053:7249): avc: denied { node_bind } for pid=26395 comm="syz.3.5620" saddr=172.20.20.170 src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 827.451783][T26200] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 827.464896][ T28] audit: type=1400 audit(1777366328.262:7250): avc: denied { create } for pid=26395 comm="syz.3.5620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 827.486223][T26200] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 827.493171][T26200] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 827.523448][ T28] audit: type=1400 audit(1777366328.272:7251): avc: denied { create } for pid=26395 comm="syz.3.5620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 827.543784][T26200] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 827.795449][T26200] hsr_slave_0: entered promiscuous mode [ 827.801712][T26200] hsr_slave_1: entered promiscuous mode [ 827.802719][T26416] loop2: detected capacity change from 0 to 512 [ 827.807728][T26200] debugfs: 'hsr0' already exists in 'hsr' [ 827.819730][T26200] Cannot create hsr debugfs directory [ 827.840241][T26416] msdos: Unknown parameter 'ÿÿÿÿÿÿÿÿ' [ 827.875291][T26417] FAULT_INJECTION: forcing a failure. [ 827.875291][T26417] name failslab, interval 1, probability 0, space 0, times 0 [ 827.929929][T26417] CPU: 0 UID: 0 PID: 26417 Comm: syz.3.5621 Tainted: G W syzkaller #0 PREEMPT(full) [ 827.929971][T26417] Tainted: [W]=WARN [ 827.929979][T26417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 827.929993][T26417] Call Trace: [ 827.930011][T26417] [ 827.930082][T26417] __dump_stack+0x1d/0x30 [ 827.930110][T26417] dump_stack_lvl+0x95/0xd0 [ 827.930132][T26417] dump_stack+0x15/0x1b [ 827.930155][T26417] should_fail_ex+0x263/0x280 [ 827.930190][T26417] should_failslab+0x8c/0xb0 [ 827.930297][T26417] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 827.930325][T26417] ? __alloc_skb+0x2d6/0x690 [ 827.930360][T26417] __alloc_skb+0x2d6/0x690 [ 827.930405][T26417] ? __alloc_skb+0x200/0x690 [ 827.930438][T26417] netlink_alloc_large_skb+0xbf/0xf0 [ 827.930525][T26417] netlink_sendmsg+0x40c/0x6f0 [ 827.930546][T26417] ? __pfx_netlink_sendmsg+0x10/0x10 [ 827.930567][T26417] ____sys_sendmsg+0x563/0x5b0 [ 827.930610][T26417] ___sys_sendmsg+0x195/0x1e0 [ 827.930664][T26417] __x64_sys_sendmsg+0xd4/0x160 [ 827.930723][T26417] x64_sys_call+0x194c/0x3020 [ 827.930755][T26417] do_syscall_64+0x12c/0x370 [ 827.930788][T26417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 827.930815][T26417] RIP: 0033:0x7f815868c819 [ 827.930898][T26417] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 827.930916][T26417] RSP: 002b:00007f81570a5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 827.930938][T26417] RAX: ffffffffffffffda RBX: 00007f8158906180 RCX: 00007f815868c819 [ 827.930952][T26417] RDX: 0000000010000000 RSI: 0000200000000080 RDI: 0000000000000006 [ 827.930968][T26417] RBP: 00007f81570a5090 R08: 0000000000000000 R09: 0000000000000000 [ 827.930982][T26417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.931058][T26417] R13: 00007f8158906218 R14: 00007f8158906180 R15: 00007fffd592cad8 [ 827.931077][T26417] [ 827.934278][ T28] audit: type=1400 audit(1777366328.742:7252): avc: denied { read write } for pid=26415 comm="syz.2.5622" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 827.959069][T26098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 828.086841][ T28] audit: type=1400 audit(1777366328.742:7253): avc: denied { open } for pid=26415 comm="syz.2.5622" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 828.421206][T26453] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 828.466042][T26200] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 828.483477][T26453] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 828.504152][T26200] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 828.516563][T26200] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 828.529737][T26098] veth0_vlan: entered promiscuous mode [ 828.546751][T26200] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 828.568831][T26098] veth1_vlan: entered promiscuous mode [ 828.602801][T26098] veth0_macvtap: entered promiscuous mode [ 828.641610][T26098] veth1_macvtap: entered promiscuous mode [ 828.667986][T26098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 828.687130][T26098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 828.700065][ T5186] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 828.711235][ T5186] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 828.730434][ T5186] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 828.748384][ T5186] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 828.779575][ T28] audit: type=1400 audit(1777366329.591:7254): avc: denied { mounton } for pid=26098 comm="syz-executor" path="/root/syzkaller.8YcJCW/syz-tmp" dev="sda1" ino=2086 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 828.781274][T26200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 828.819285][ T28] audit: type=1400 audit(1777366329.591:7255): avc: denied { mount } for pid=26098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 828.842381][ T28] audit: type=1400 audit(1777366329.591:7256): avc: denied { mount } for pid=26098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 828.849777][T26200] 8021q: adding VLAN 0 to HW filter on device team0 [ 828.924610][ T1648] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.931745][ T1648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 828.962218][ T1648] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.969570][ T1648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 828.993692][T26200] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 829.018165][T26200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 829.117540][T26510] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5633'. [ 829.127132][T26510] 8021q: VLANs not supported on lo [ 829.353142][T26200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 829.396579][T26552] FAT-fs (loop11): unable to read boot sector [ 829.914523][T26200] veth0_vlan: entered promiscuous mode [ 829.933494][T26200] veth1_vlan: entered promiscuous mode [ 829.946336][T26200] veth0_macvtap: entered promiscuous mode [ 829.953987][T26200] veth1_macvtap: entered promiscuous mode [ 829.985304][T26200] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 830.010182][T26200] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 830.027483][ T8415] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.044345][ T8415] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.123648][ T8415] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.149661][ T8415] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.161512][T26581] loop3: detected capacity change from 0 to 512 [ 830.191104][T26581] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 830.204017][T26581] ext4 filesystem being mounted at /151/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 830.277057][T26596] SELinux: Context system_u:object_r:v4l_device_t:s0 is not valid (left unmapped). [ 830.304301][T26596] loop5: detected capacity change from 0 to 512 [ 830.335078][T22003] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 830.337608][T26596] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 830.339569][T26596] EXT4-fs (loop5): 1 truncate cleaned up [ 830.343479][T26596] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 830.354435][T26603] loop1: detected capacity change from 0 to 1024 [ 830.428703][T26603] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 830.514322][T26603] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 830.540138][T26623] FAT-fs (loop3): unable to read boot sector [ 830.637342][T26629] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5649'. [ 830.655842][T26617] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5647'. [ 830.671206][T26629] 8021q: VLANs not supported on lo [ 830.730004][T26617] loop2: detected capacity change from 0 to 512 [ 830.825362][T26617] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 830.838628][T26617] ext4 filesystem being mounted at /95/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 831.794044][ T10] hid_parser_main: 7 callbacks suppressed [ 831.794069][ T10] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 831.840186][T26098] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 831.871809][ T10] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 831.951134][T24449] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 832.118631][T26671] loop2: detected capacity change from 0 to 128 [ 832.156233][T26671] vfat: Unknown parameter 'shortnamŒ' [ 832.289731][T26676] syz.5.5659 (26676): /proc/26675/oom_adj is deprecated, please use /proc/26675/oom_score_adj instead. [ 832.309507][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 832.309537][ T28] audit: type=1400 audit(1777366333.109:7294): avc: denied { ioctl } for pid=26670 comm="syz.2.5657" path="socket:[77443]" dev="sockfs" ino=77443 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 832.385954][T26676] netlink: 108 bytes leftover after parsing attributes in process `syz.5.5659'. [ 832.423350][T26677] loop2: detected capacity change from 0 to 256 [ 832.575258][ T28] audit: type=1400 audit(1777366333.379:7295): avc: denied { setopt } for pid=26647 comm="syz.8.5653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 832.744017][T26689] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 832.776778][T26689] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 832.812670][T26697] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 832.846052][T26697] bond1 (unregistering): Released all slaves [ 832.868108][ T28] audit: type=1400 audit(1777366333.668:7296): avc: denied { ioctl } for pid=26700 comm="syz.8.5665" path="socket:[78235]" dev="sockfs" ino=78235 ioctlcmd=0x7453 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 832.930614][ T28] audit: type=1400 audit(1777366333.668:7297): avc: denied { create } for pid=26696 comm="syz.5.5664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 832.995011][T26713] bond3: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 833.016701][T26707] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 833.027158][T26713] bond3 (unregistering): Released all slaves [ 833.054027][T26707] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 833.073161][T26703] pimreg: entered allmulticast mode [ 833.203140][T26719] pimreg: entered allmulticast mode [ 833.587183][T26739] bond3: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 833.662826][T26739] bond3 (unregistering): Released all slaves [ 834.992791][T26796] bond3: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 835.027584][T26796] bond3 (unregistering): Released all slaves [ 835.273453][T26817] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 835.304644][T26817] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 835.539053][T26843] loop2: detected capacity change from 0 to 512 [ 835.553962][T26843] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 835.576012][T26849] netlink: 216 bytes leftover after parsing attributes in process `syz.8.5684'. [ 835.608559][T26846] loop5: detected capacity change from 0 to 512 [ 835.783026][T26846] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 835.813886][T26846] EXT4-fs (loop5): 1 truncate cleaned up [ 835.823852][T26846] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 835.925180][ T28] audit: type=1400 audit(1777366336.717:7298): avc: denied { read } for pid=26867 comm="syz.3.5687" dev="sockfs" ino=78340 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 836.053127][T26874] loop1: detected capacity change from 0 to 512 [ 836.100304][T26874] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 836.193204][ T28] audit: type=1400 audit(1777366336.717:7299): avc: denied { remount } for pid=26867 comm="syz.3.5687" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 836.292546][ T28] audit: type=1400 audit(1777366336.717:7300): avc: denied { ioctl } for pid=26867 comm="syz.3.5687" path="socket:[78340]" dev="sockfs" ino=78340 ioctlcmd=0x9412 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 836.469979][T26098] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 836.709375][T26895] loop2: detected capacity change from 0 to 512 [ 836.836923][T26895] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 836.922171][T26895] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 836.940820][T26895] EXT4-fs (loop2): 1 truncate cleaned up [ 836.961458][T26895] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 837.082524][T26910] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1317: group 0, block bitmap and bg descriptor inconsistent: 227 vs 220 free clusters [ 837.103535][ T28] audit: type=1400 audit(1777366337.886:7301): avc: denied { create } for pid=26894 comm="syz.2.5691" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 837.222999][T26910] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=46724 sclass=netlink_xfrm_socket pid=26910 comm=syz.2.5691 [ 837.238119][ T28] audit: type=1400 audit(1777366338.036:7302): avc: denied { write } for pid=26894 comm="syz.2.5691" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 837.302961][T26917] loop1: detected capacity change from 0 to 512 [ 837.311146][T24449] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 837.336094][T26917] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 837.377048][T26917] EXT4-fs (loop1): 1 truncate cleaned up [ 837.407788][T26917] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 837.481991][ T28] audit: type=1400 audit(1777366338.276:7303): avc: denied { read } for pid=26916 comm="syz.1.5693" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 837.506317][ T28] audit: type=1326 audit(1777366338.286:7304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.530219][ T28] audit: type=1326 audit(1777366338.286:7305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.554014][ T28] audit: type=1326 audit(1777366338.286:7306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.595857][ T28] audit: type=1326 audit(1777366338.286:7307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.650013][ T28] audit: type=1326 audit(1777366338.286:7308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.707467][ T28] audit: type=1326 audit(1777366338.286:7309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=82 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.773170][ T28] audit: type=1326 audit(1777366338.286:7310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.837860][ T28] audit: type=1326 audit(1777366338.286:7311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.892084][ T28] audit: type=1326 audit(1777366338.286:7312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26916 comm="syz.1.5693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 837.917750][T26925] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5694'. [ 837.940973][T26940] loop2: detected capacity change from 0 to 512 [ 837.993813][T26940] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 838.028454][T26940] EXT4-fs (loop2): orphan cleanup on readonly fs [ 838.029105][T26200] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 838.043929][T26940] EXT4-fs warning (device loop2): ext4_enable_quotas:7261: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 838.059150][T26940] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 838.069184][T26940] EXT4-fs error (device loop2): ext4_validate_block_bitmap:432: comm syz.2.5694: bg 0: block 15: invalid block bitmap [ 838.108978][T26940] loop2: lost filesystem error report for type 5 error -117 [ 838.112698][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 838.126484][ C0] EXT4-fs (loop2): initial error at time 1777366338: ext4_validate_block_bitmap:432 [ 838.135915][ C0] EXT4-fs (loop2): last error at time 1777366338: ext4_validate_block_bitmap:432 [ 838.145116][T26940] EXT4-fs error (device loop2) in ext4_mb_clear_bb:6685: Corrupt filesystem [ 838.162727][T26940] loop2: lost filesystem error report for type 5 error -117 [ 838.163442][T26955] netlink: 'syz.1.5695': attribute type 3 has an invalid length. [ 838.183376][T26940] EXT4-fs warning (device loop2): ext4_evict_inode:195: inode #16: comm syz.2.5694: data will be lost [ 838.194783][T26940] EXT4-fs (loop2): 1 truncate cleaned up [ 838.200924][T26940] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 838.202759][T26955] netlink: 'syz.1.5695': attribute type 3 has an invalid length. [ 838.221818][T26925] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 838.304886][T26962] FAT-fs (loop3): unable to read boot sector [ 838.323856][T24449] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 838.439000][T26973] loop2: detected capacity change from 0 to 128 [ 838.491227][T26980] FAULT_INJECTION: forcing a failure. [ 838.491227][T26980] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 838.509683][T26966] loop1: detected capacity change from 0 to 512 [ 838.512300][T26973] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 838.537339][T26980] CPU: 0 UID: 0 PID: 26980 Comm: syz.5.5700 Tainted: G W syzkaller #0 PREEMPT(full) [ 838.537378][T26980] Tainted: [W]=WARN [ 838.537449][T26980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 838.537462][T26980] Call Trace: [ 838.537469][T26980] [ 838.537549][T26980] __dump_stack+0x1d/0x30 [ 838.537593][T26980] dump_stack_lvl+0x95/0xd0 [ 838.537622][T26980] dump_stack+0x15/0x1b [ 838.537651][T26980] should_fail_ex+0x263/0x280 [ 838.537686][T26980] should_fail+0xb/0x20 [ 838.537716][T26980] should_fail_usercopy+0x1a/0x20 [ 838.537768][T26980] _copy_to_user+0x20/0xa0 [ 838.537836][T26980] sk_getsockopt+0x162c/0x1a70 [ 838.537955][T26980] ? rep_movs_alternative+0xf/0x90 [ 838.537995][T26980] do_sock_getsockopt+0x14d/0x210 [ 838.538061][T26980] __x64_sys_getsockopt+0x11d/0x1a0 [ 838.538101][T26980] x64_sys_call+0x2dcf/0x3020 [ 838.538180][T26980] do_syscall_64+0x12c/0x370 [ 838.538256][T26980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 838.538295][T26980] RIP: 0033:0x7fc4535ec819 [ 838.538312][T26980] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 838.538331][T26980] RSP: 002b:00007fc45203f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 838.538352][T26980] RAX: ffffffffffffffda RBX: 00007fc453865fa0 RCX: 00007fc4535ec819 [ 838.538366][T26980] RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000003 [ 838.538442][T26980] RBP: 00007fc45203f090 R08: 0000200000000280 R09: 0000000000000000 [ 838.538501][T26980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 838.538513][T26980] R13: 00007fc453866038 R14: 00007fc453865fa0 R15: 00007fff05dbedd8 [ 838.538530][T26980] [ 838.746875][T26973] ext4 filesystem being mounted at /105/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 838.788790][T26986] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 838.805470][T24449] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 838.818388][T26986] bond1 (unregistering): Released all slaves [ 838.838454][T26966] FAT-fs (loop1): Directory bread(block 199916) failed [ 838.847805][T26966] FAT-fs (loop1): Directory bread(block 199917) failed [ 838.872084][T26966] FAT-fs (loop1): Directory bread(block 199918) failed [ 838.874489][T26992] loop2: detected capacity change from 0 to 512 [ 838.881974][T26966] FAT-fs (loop1): Directory bread(block 199919) failed [ 838.906448][T26966] FAT-fs (loop1): Directory bread(block 199920) failed [ 838.916064][T26966] FAT-fs (loop1): Directory bread(block 199921) failed [ 838.923797][T26966] FAT-fs (loop1): Directory bread(block 199922) failed [ 838.933761][T26992] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 839.024476][T26966] FAT-fs (loop1): Directory bread(block 199923) failed [ 839.802659][T27036] loop2: detected capacity change from 0 to 128 [ 839.848663][T27036] FAULT_INJECTION: forcing a failure. [ 839.848663][T27036] name failslab, interval 1, probability 0, space 0, times 0 [ 839.897132][T14444] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 839.898021][T27036] CPU: 1 UID: 0 PID: 27036 Comm: syz.2.5710 Tainted: G W syzkaller #0 PREEMPT(full) [ 839.898055][T27036] Tainted: [W]=WARN [ 839.898062][T27036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 839.898076][T27036] Call Trace: [ 839.898083][T27036] [ 839.898128][T27036] __dump_stack+0x1d/0x30 [ 839.898159][T27036] dump_stack_lvl+0x95/0xd0 [ 839.898183][T27036] dump_stack+0x15/0x1b [ 839.898217][T27036] should_fail_ex+0x263/0x280 [ 839.898311][T27036] ? vfat_add_entry+0xc6/0x2280 [ 839.898345][T27036] should_failslab+0x8c/0xb0 [ 839.898370][T27036] __kmalloc_cache_noprof+0x5f/0x410 [ 839.898477][T27036] ? fat_search_long+0x79b/0x9b0 [ 839.898498][T27036] vfat_add_entry+0xc6/0x2280 [ 839.898530][T27036] ? fat_search_long+0x93a/0x9b0 [ 839.898555][T27036] ? ktime_get_coarse_real_ts64_mg+0x17c/0x1a0 [ 839.898718][T27036] ? current_time+0x188/0x240 [ 839.898749][T27036] vfat_rename2+0x81d/0x13e0 [ 839.898786][T27036] ? __pfx_vfat_rename2+0x10/0x10 [ 839.898859][T27036] vfs_rename+0x97f/0xad0 [ 839.898890][T27036] filename_renameat2+0x3b6/0x6e0 [ 839.898986][T27036] __se_sys_rename+0x4a/0x1c0 [ 839.899110][T27036] __x64_sys_rename+0x31/0x40 [ 839.899136][T27036] x64_sys_call+0x2b3/0x3020 [ 839.899164][T27036] do_syscall_64+0x12c/0x370 [ 839.899193][T27036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 839.899265][T27036] RIP: 0033:0x7f2d91c2c819 [ 839.899283][T27036] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 839.899303][T27036] RSP: 002b:00007f2d9067f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 839.899326][T27036] RAX: ffffffffffffffda RBX: 00007f2d91ea5fa0 RCX: 00007f2d91c2c819 [ 839.899341][T27036] RDX: 0000000000000000 RSI: 0000200000000f40 RDI: 0000200000000600 [ 839.899395][T27036] RBP: 00007f2d9067f090 R08: 0000000000000000 R09: 0000000000000000 [ 839.899409][T27036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 839.899422][T27036] R13: 00007f2d91ea6038 R14: 00007f2d91ea5fa0 R15: 00007ffe8385e3f8 [ 839.899442][T27036] [ 840.196066][T27056] FAULT_INJECTION: forcing a failure. [ 840.196066][T27056] name failslab, interval 1, probability 0, space 0, times 0 [ 840.210307][T14444] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 840.249880][T27056] CPU: 1 UID: 0 PID: 27056 Comm: syz.3.5715 Tainted: G W syzkaller #0 PREEMPT(full) [ 840.249991][T27056] Tainted: [W]=WARN [ 840.249999][T27056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 840.250014][T27056] Call Trace: [ 840.250024][T27056] [ 840.250034][T27056] __dump_stack+0x1d/0x30 [ 840.250065][T27056] dump_stack_lvl+0x95/0xd0 [ 840.250162][T27056] dump_stack+0x15/0x1b [ 840.250251][T27056] should_fail_ex+0x263/0x280 [ 840.250304][T27056] should_failslab+0x8c/0xb0 [ 840.250330][T27056] __kmalloc_cache_node_noprof+0x6b/0x480 [ 840.250437][T27056] ? __get_vm_area_node+0x106/0x1d0 [ 840.250467][T27056] __get_vm_area_node+0x106/0x1d0 [ 840.250498][T27056] __vmalloc_node_range_noprof+0x291/0x12b0 [ 840.250529][T27056] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 840.250571][T27056] ? selinux_file_open+0x2e6/0x330 [ 840.250633][T27056] ? __rcu_read_unlock+0x4e/0x70 [ 840.250655][T27056] ? avc_has_perm_noaudit+0xab/0x130 [ 840.250692][T27056] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 840.250716][T27056] __vmalloc_noprof+0xa4/0xf0 [ 840.250747][T27056] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 840.250772][T27056] bpf_prog_alloc_no_stats+0x47/0x390 [ 840.250795][T27056] ? bpf_prog_alloc+0x2a/0x150 [ 840.250817][T27056] bpf_prog_alloc+0x3c/0x150 [ 840.250880][T27056] bpf_prog_load+0x506/0x1140 [ 840.250908][T27056] ? security_bpf+0x2b/0x90 [ 840.250931][T27056] __sys_bpf+0x505/0x7e0 [ 840.251041][T27056] __x64_sys_bpf+0x41/0x50 [ 840.251063][T27056] x64_sys_call+0x10cb/0x3020 [ 840.251114][T27056] do_syscall_64+0x12c/0x370 [ 840.251145][T27056] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 840.251200][T27056] RIP: 0033:0x7f815868c819 [ 840.251220][T27056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 840.251241][T27056] RSP: 002b:00007f81570e7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.251267][T27056] RAX: ffffffffffffffda RBX: 00007f8158905fa0 RCX: 00007f815868c819 [ 840.251285][T27056] RDX: 0000000000000094 RSI: 00002000000005c0 RDI: 0000000000000005 [ 840.251301][T27056] RBP: 00007f81570e7090 R08: 0000000000000000 R09: 0000000000000000 [ 840.251335][T27056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.251358][T27056] R13: 00007f8158906038 R14: 00007f8158905fa0 R15: 00007fffd592cad8 [ 840.251379][T27056] [ 840.251577][T27056] syz.3.5715: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null) [ 840.270544][T27057] fido_id[27057]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 840.307809][T27056] ,cpuset= [ 840.469173][T27061] loop1: detected capacity change from 0 to 8192 [ 840.529725][T27056] /,mems_allowed=0 [ 840.533584][T27056] CPU: 0 UID: 0 PID: 27056 Comm: syz.3.5715 Tainted: G W syzkaller #0 PREEMPT(full) [ 840.533625][T27056] Tainted: [W]=WARN [ 840.533632][T27056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 840.533644][T27056] Call Trace: [ 840.533652][T27056] [ 840.533660][T27056] __dump_stack+0x1d/0x30 [ 840.533689][T27056] dump_stack_lvl+0x95/0xd0 [ 840.533750][T27056] dump_stack+0x15/0x1b [ 840.533770][T27056] warn_alloc+0x145/0x1c0 [ 840.533859][T27056] __vmalloc_node_range_noprof+0x2b6/0x12b0 [ 840.533892][T27056] ? selinux_file_open+0x2e6/0x330 [ 840.533927][T27056] ? __rcu_read_unlock+0x4e/0x70 [ 840.533947][T27056] ? avc_has_perm_noaudit+0xab/0x130 [ 840.533978][T27056] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 840.534039][T27056] __vmalloc_noprof+0xa4/0xf0 [ 840.534065][T27056] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 840.534084][T27056] bpf_prog_alloc_no_stats+0x47/0x390 [ 840.534103][T27056] ? bpf_prog_alloc+0x2a/0x150 [ 840.534205][T27056] bpf_prog_alloc+0x3c/0x150 [ 840.534284][T27056] bpf_prog_load+0x506/0x1140 [ 840.534311][T27056] ? security_bpf+0x2b/0x90 [ 840.534331][T27056] __sys_bpf+0x505/0x7e0 [ 840.534411][T27056] __x64_sys_bpf+0x41/0x50 [ 840.534428][T27056] x64_sys_call+0x10cb/0x3020 [ 840.534453][T27056] do_syscall_64+0x12c/0x370 [ 840.534479][T27056] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 840.534507][T27056] RIP: 0033:0x7f815868c819 [ 840.534602][T27056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 840.534620][T27056] RSP: 002b:00007f81570e7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.534640][T27056] RAX: ffffffffffffffda RBX: 00007f8158905fa0 RCX: 00007f815868c819 [ 840.534673][T27056] RDX: 0000000000000094 RSI: 00002000000005c0 RDI: 0000000000000005 [ 840.534686][T27056] RBP: 00007f81570e7090 R08: 0000000000000000 R09: 0000000000000000 [ 840.534756][T27056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.534768][T27056] R13: 00007f8158906038 R14: 00007f8158905fa0 R15: 00007fffd592cad8 [ 840.534785][T27056] [ 840.764371][T27056] Mem-Info: [ 840.768876][T27056] active_anon:11434 inactive_anon:6 isolated_anon:0 [ 840.768876][T27056] active_file:16085 inactive_file:12229 isolated_file:0 [ 840.768876][T27056] unevictable:0 dirty:144 writeback:0 [ 840.768876][T27056] slab_reclaimable:4265 slab_unreclaimable:22852 [ 840.768876][T27056] mapped:29912 shmem:1545 pagetables:3723 [ 840.768876][T27056] sec_pagetables:0 bounce:0 [ 840.768876][T27056] kernel_misc_reclaimable:0 [ 840.768876][T27056] free:1844194 free_pcp:10729 free_cma:0 [ 840.818323][T27056] Node 0 active_anon:45852kB inactive_anon:24kB active_file:64340kB inactive_file:48916kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:123708kB dirty:576kB writeback:0kB shmem:6180kB kernel_stack:4528kB pagetables:14892kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 840.847020][T27056] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 840.887848][T14112] loop1: p1 p2 [ 840.891441][T14112] loop1: p1 start 51314688 is beyond EOD, truncated [ 840.904963][T27061] loop1: p1 p2 [ 840.908963][T27061] loop1: p1 start 51314688 is beyond EOD, truncated [ 840.957623][T27056] lowmem_reserve[]: 0 2879 7857 7857 [ 840.966726][T27056] Node 0 DMA32 free:2944612kB boost:0kB min:4128kB low:7052kB high:9976kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948136kB mlocked:0kB bounce:0kB free_pcp:3524kB local_pcp:3524kB free_cma:0kB [ 841.007347][T27056] lowmem_reserve[]: 0 0 4978 4978 [ 841.013957][T27056] Node 0 Normal free:4416692kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:46200kB inactive_anon:24kB active_file:64340kB inactive_file:48916kB unevictable:0kB writepending:576kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:39104kB local_pcp:10052kB free_cma:0kB [ 841.049095][T27056] lowmem_reserve[]: 0 0 0 0 [ 841.053680][T27056] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 841.078398][T27056] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 2*16kB (M) 5*32kB (M) 4*64kB (M) 1*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2944612kB [ 841.113844][T27056] Node 0 Normal: 3645*4kB (UME) 1995*8kB (UM) 1709*16kB (UM) 1305*32kB (UM) 846*64kB (UME) 643*128kB (UME) 454*256kB (UME) 312*512kB (UME) 255*1024kB (UME) 177*2048kB (UM) 802*4096kB (UM) = 4420668kB [ 841.132333][T14112] udevd[14112]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 841.144228][T27056] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 841.159416][T27056] 28821 total pagecache pages [ 841.168608][T14112] udevd[14112]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 841.171715][T27056] 6 pages in swap cache [ 841.183533][T27056] Free swap = 124972kB [ 841.202934][T27056] Total swap = 124996kB [ 841.220225][T27056] 2097051 pages RAM [ 841.224071][T27056] 0 pages HighMem/MovableOnly [ 841.232450][T27056] 81617 pages reserved [ 841.263117][T27080] netlink: 104 bytes leftover after parsing attributes in process `syz.5.5722'. [ 841.401691][T27091] syzkaller0: entered promiscuous mode [ 841.407371][T27091] syzkaller0: entered allmulticast mode [ 841.423402][T27091] FAULT_INJECTION: forcing a failure. [ 841.423402][T27091] name failslab, interval 1, probability 0, space 0, times 0 [ 841.447138][T27091] CPU: 0 UID: 0 PID: 27091 Comm: syz.3.5726 Tainted: G W syzkaller #0 PREEMPT(full) [ 841.447220][T27091] Tainted: [W]=WARN [ 841.447229][T27091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 841.447243][T27091] Call Trace: [ 841.447251][T27091] [ 841.447260][T27091] __dump_stack+0x1d/0x30 [ 841.447291][T27091] dump_stack_lvl+0x95/0xd0 [ 841.447334][T27091] dump_stack+0x15/0x1b [ 841.447360][T27091] should_fail_ex+0x263/0x280 [ 841.447393][T27091] should_failslab+0x8c/0xb0 [ 841.447421][T27091] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 841.447471][T27091] ? __alloc_skb+0x2d6/0x690 [ 841.447504][T27091] __alloc_skb+0x2d6/0x690 [ 841.447540][T27091] ? __alloc_skb+0x200/0x690 [ 841.447596][T27091] alloc_skb_with_frags+0x7d/0x470 [ 841.447626][T27091] ? xa_load+0xb1/0xe0 [ 841.447659][T27091] sock_alloc_send_pskb+0x44d/0x500 [ 841.447692][T27091] ? __rcu_read_unlock+0x4e/0x70 [ 841.447714][T27091] ? __rcu_read_unlock+0x4e/0x70 [ 841.447734][T27091] packet_sendmsg+0x23c7/0x3370 [ 841.447775][T27091] ? avc_has_perm+0x101/0x190 [ 841.447961][T27091] ? selinux_socket_sendmsg+0x192/0x1c0 [ 841.448005][T27091] ? __pfx_packet_sendmsg+0x10/0x10 [ 841.448033][T27091] ____sys_sendmsg+0x563/0x5b0 [ 841.448122][T27091] ___sys_sendmsg+0x195/0x1e0 [ 841.448207][T27091] __x64_sys_sendmsg+0xd4/0x160 [ 841.448247][T27091] x64_sys_call+0x194c/0x3020 [ 841.448280][T27091] do_syscall_64+0x12c/0x370 [ 841.448369][T27091] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.448394][T27091] RIP: 0033:0x7f815868c819 [ 841.448414][T27091] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 841.448435][T27091] RSP: 002b:00007f81570e7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 841.448478][T27091] RAX: ffffffffffffffda RBX: 00007f8158905fa0 RCX: 00007f815868c819 [ 841.448496][T27091] RDX: 0000000000000004 RSI: 00002000000000c0 RDI: 0000000000000004 [ 841.448511][T27091] RBP: 00007f81570e7090 R08: 0000000000000000 R09: 0000000000000000 [ 841.448525][T27091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.448540][T27091] R13: 00007f8158906038 R14: 00007f8158905fa0 R15: 00007fffd592cad8 [ 841.448561][T27091] [ 841.702888][T27096] loop5: detected capacity change from 0 to 512 [ 842.317684][T27104] loop5: detected capacity change from 0 to 512 [ 842.478875][T27109] loop3: detected capacity change from 0 to 4096 [ 842.530333][T27109] ext4: Unknown parameter 'fsname' [ 842.587988][T27104] FAT-fs (loop5): Directory bread(block 199916) failed [ 842.615723][T27104] FAT-fs (loop5): Directory bread(block 199917) failed [ 842.623617][T27104] FAT-fs (loop5): Directory bread(block 199918) failed [ 842.645012][ T28] kauditd_printk_skb: 176 callbacks suppressed [ 842.645031][ T28] audit: type=1400 audit(1777366343.433:7488): avc: denied { create } for pid=27107 comm="syz.3.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 842.734465][T27104] FAT-fs (loop5): Directory bread(block 199919) failed [ 842.736730][T27115] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5732'. [ 842.737058][T27104] FAT-fs (loop5): Directory bread(block 199920) failed [ 842.738091][T27104] FAT-fs (loop5): Directory bread(block 199921) failed [ 842.738500][T27104] FAT-fs (loop5): Directory bread(block 199922) failed [ 842.738951][T27104] FAT-fs (loop5): Directory bread(block 199923) failed [ 842.746670][ T28] audit: type=1400 audit(1777366343.473:7489): avc: denied { write } for pid=27107 comm="syz.3.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 842.812267][ T28] audit: type=1400 audit(1777366343.603:7490): avc: denied { ioctl } for pid=27112 comm="syz.1.5732" path="socket:[78600]" dev="sockfs" ino=78600 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 843.101255][ T28] audit: type=1400 audit(1777366343.893:7491): avc: denied { connect } for pid=27123 comm="syz.3.5734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 843.212736][T27093] syz.8.5727 (27093) used greatest stack depth: 5664 bytes left [ 843.214997][T26098] FAT-fs (loop5): Directory bread(block 199916) failed [ 843.245326][T26098] FAT-fs (loop5): Directory bread(block 199917) failed [ 843.278540][ T28] audit: type=1326 audit(1777366344.073:7492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27128 comm="syz.3.5738" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 843.323065][ T28] audit: type=1326 audit(1777366344.073:7493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27128 comm="syz.3.5738" exe="/root/syz-executor" sig=0 arch=c000003e syscall=191 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 843.351201][ T28] audit: type=1326 audit(1777366344.073:7494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27128 comm="syz.3.5738" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 843.398478][ T28] audit: type=1326 audit(1777366344.073:7495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27128 comm="syz.3.5738" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 843.425306][T27136] loop3: detected capacity change from 0 to 128 [ 843.451169][T27134] lo speed is unknown, defaulting to 1000 [ 843.457111][T27134] lo speed is unknown, defaulting to 1000 [ 843.463008][T27134] lo speed is unknown, defaulting to 1000 [ 843.469479][ T28] audit: type=1400 audit(1777366344.243:7496): avc: denied { create } for pid=27130 comm="syz.8.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 843.493239][T27134] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 843.500473][ T28] audit: type=1400 audit(1777366344.243:7497): avc: denied { write } for pid=27130 comm="syz.8.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 843.526149][T27134] lo speed is unknown, defaulting to 1000 [ 843.532296][T27134] lo speed is unknown, defaulting to 1000 [ 843.541417][T27134] lo speed is unknown, defaulting to 1000 [ 843.557041][T27134] lo speed is unknown, defaulting to 1000 [ 843.605349][T27134] lo speed is unknown, defaulting to 1000 [ 843.615848][T27139] netlink: 80 bytes leftover after parsing attributes in process `syz.3.5739'. [ 843.625330][T27134] lo speed is unknown, defaulting to 1000 [ 843.636040][T22150] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 843.659632][T27143] loop1: detected capacity change from 0 to 128 [ 843.731693][T27139] syz.3.5739: attempt to access beyond end of device [ 843.731693][T27139] loop3: rw=0, sector=121, nr_sectors = 920 limit=128 [ 843.732336][T22150] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 843.858924][T22150] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 843.947808][T27151] lo speed is unknown, defaulting to 1000 [ 844.075373][T27162] loop2: detected capacity change from 0 to 136 [ 844.103737][T27162] iso9660: Unknown parameter ' ' [ 844.244641][T22150] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 844.286116][T27151] dummy0 speed is unknown, defaulting to 1000 [ 844.292678][T27151] lo speed is unknown, defaulting to 1000 [ 844.409668][T27174] FAULT_INJECTION: forcing a failure. [ 844.409668][T27174] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 844.490701][T27151] chnl_net:caif_netlink_parms(): no params data found [ 844.498779][T27174] CPU: 1 UID: 0 PID: 27174 Comm: syz.3.5748 Tainted: G W syzkaller #0 PREEMPT(full) [ 844.498873][T27174] Tainted: [W]=WARN [ 844.498883][T27174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 844.498898][T27174] Call Trace: [ 844.498944][T27174] [ 844.498953][T27174] __dump_stack+0x1d/0x30 [ 844.498982][T27174] dump_stack_lvl+0x95/0xd0 [ 844.499059][T27174] dump_stack+0x15/0x1b [ 844.499102][T27174] should_fail_ex+0x263/0x280 [ 844.499128][T27174] should_fail+0xb/0x20 [ 844.499216][T27174] should_fail_usercopy+0x1a/0x20 [ 844.499307][T27174] _copy_to_user+0x20/0xa0 [ 844.499350][T27174] simple_read_from_buffer+0xb5/0x130 [ 844.499454][T27174] proc_fail_nth_read+0x10e/0x150 [ 844.499485][T27174] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 844.499545][T27174] vfs_read+0x1ab/0x7f0 [ 844.499563][T27174] ? __rcu_read_unlock+0x4e/0x70 [ 844.499585][T27174] ? __fget_files+0x184/0x1c0 [ 844.499667][T27174] ? mutex_lock+0x57/0x90 [ 844.499687][T27174] ksys_read+0xdc/0x1a0 [ 844.499748][T27174] __x64_sys_read+0x40/0x50 [ 844.499767][T27174] x64_sys_call+0x2886/0x3020 [ 844.499797][T27174] do_syscall_64+0x12c/0x370 [ 844.499823][T27174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 844.499866][T27174] RIP: 0033:0x7f815864d04e [ 844.499885][T27174] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 844.499907][T27174] RSP: 002b:00007f81570e6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 844.499929][T27174] RAX: ffffffffffffffda RBX: 00007f81570e76c0 RCX: 00007f815864d04e [ 844.499994][T27174] RDX: 000000000000000f RSI: 00007f81570e70a0 RDI: 0000000000000006 [ 844.500010][T27174] RBP: 00007f81570e7090 R08: 0000000000000000 R09: 0000000000000000 [ 844.500026][T27174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 844.500090][T27174] R13: 00007f8158906038 R14: 00007f8158905fa0 R15: 00007fffd592cad8 [ 844.500114][T27174] [ 844.758047][T22150] bridge_slave_1: left allmulticast mode [ 844.766206][T22150] bridge_slave_1: left promiscuous mode [ 844.772738][T22150] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.792780][T22150] bridge_slave_0: left allmulticast mode [ 844.802258][T22150] bridge_slave_0: left promiscuous mode [ 844.816213][T22150] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.978732][T22150] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 844.988609][T22150] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 844.998412][T22150] bond0 (unregistering): Released all slaves [ 845.026544][T27151] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.033804][T27151] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.041132][T27151] bridge_slave_0: entered allmulticast mode [ 845.048163][T27151] bridge_slave_0: entered promiscuous mode [ 845.062754][T27151] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.073815][T27151] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.082710][T27151] bridge_slave_1: entered allmulticast mode [ 845.090100][T27151] bridge_slave_1: entered promiscuous mode [ 845.116728][T27204] loop1: detected capacity change from 0 to 1764 [ 845.183711][T27212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=27212 comm=syz.3.5753 [ 845.199370][T27212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=27212 comm=syz.3.5753 [ 845.219905][T27212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=27212 comm=syz.3.5753 [ 845.233813][T27212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=27212 comm=syz.3.5753 [ 845.246725][T22150] hsr_slave_0: left promiscuous mode [ 845.255754][T22150] hsr_slave_1: left promiscuous mode [ 845.267547][T22150] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 845.277131][T22150] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 845.286954][T22150] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 845.294791][T27213] loop3: detected capacity change from 0 to 512 [ 845.295971][T22150] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 845.320574][T22150] veth1_macvtap: left promiscuous mode [ 845.326190][T22150] veth0_macvtap: left promiscuous mode [ 845.361838][T22150] veth1_vlan: left promiscuous mode [ 845.383733][T22150] veth0_vlan: left promiscuous mode [ 845.406309][T27241] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 845.415646][T27241] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 845.440409][T22150] pimreg (unregistering): left allmulticast mode [ 845.472296][T22150] team0 (unregistering): Port device team_slave_1 removed [ 845.483551][T22150] team0 (unregistering): Port device team_slave_0 removed [ 845.516671][T27151] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 845.530988][T27151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 845.585469][T27151] team0: Port device team_slave_0 added [ 845.591910][T27246] loop1: detected capacity change from 0 to 256 [ 845.592882][T27151] team0: Port device team_slave_1 added [ 845.621888][T27246] vfat: Unknown parameter '0xffffffffffffffffÿÿÿÿÿÿÿÿÿÿ18446744073709551615ÿÿÿÿÿÿÿÿ' [ 845.641434][T27151] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 845.649098][T27151] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 845.675737][T27151] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 845.688251][T27151] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 845.707927][T27151] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 845.764597][T27151] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 845.815468][T27151] hsr_slave_0: entered promiscuous mode [ 845.827030][T27151] hsr_slave_1: entered promiscuous mode [ 846.463437][T27287] tls_set_device_offload_rx: netdev not found [ 846.592269][T27151] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 846.626005][T27151] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 846.636491][T27151] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 846.666634][T27151] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 846.717692][T27315] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 846.744380][T27292] loop3: detected capacity change from 0 to 512 [ 846.751896][T27315] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 846.770494][T27151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 846.807984][T27151] 8021q: adding VLAN 0 to HW filter on device team0 [ 846.823576][T27292] FAT-fs (loop3): Directory bread(block 199916) failed [ 846.838499][T27292] FAT-fs (loop3): Directory bread(block 199917) failed [ 846.858335][T27292] FAT-fs (loop3): Directory bread(block 199918) failed [ 846.859555][ T941] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.869088][T27292] FAT-fs (loop3): Directory bread(block 199919) failed [ 846.873004][ T941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 846.903163][ T941] bridge0: port 2(bridge_slave_1) entered blocking state [ 846.910293][ T941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 846.915855][T27292] FAT-fs (loop3): Directory bread(block 199920) failed [ 846.938296][T27292] FAT-fs (loop3): Directory bread(block 199921) failed [ 846.946721][T27292] FAT-fs (loop3): Directory bread(block 199922) failed [ 846.955569][T27151] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 847.006404][T27292] FAT-fs (loop3): Directory bread(block 199923) failed [ 847.038343][T27151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 847.198814][T27151] veth0_vlan: entered promiscuous mode [ 847.213113][T27151] veth1_vlan: entered promiscuous mode [ 847.249473][T27151] veth0_macvtap: entered promiscuous mode [ 847.264410][T27151] veth1_macvtap: entered promiscuous mode [ 847.312868][T27151] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 847.344914][T27151] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 847.381088][ T8417] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.403966][ T8417] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.456682][ T8417] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.456793][ T8417] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.583435][T27385] netlink: 'syz.2.5778': attribute type 21 has an invalid length. [ 847.589207][T27380] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 847.616423][T27380] bond1 (unregistering): Released all slaves [ 847.705539][T27385] netlink: 132 bytes leftover after parsing attributes in process `syz.2.5778'. [ 847.893828][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 847.893847][ T28] audit: type=1326 audit(1777366348.691:7528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 847.929158][ T28] audit: type=1326 audit(1777366348.721:7529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 847.977045][T27418] netlink: 'syz.8.5780': attribute type 1 has an invalid length. [ 847.985976][ T28] audit: type=1326 audit(1777366348.721:7530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.010369][ T28] audit: type=1326 audit(1777366348.721:7531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.035162][ T28] audit: type=1326 audit(1777366348.721:7532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.060918][ T28] audit: type=1326 audit(1777366348.721:7533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.105081][ T28] audit: type=1326 audit(1777366348.721:7534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.177562][T27418] 8021q: adding VLAN 0 to HW filter on device bond3 [ 848.189232][ T28] audit: type=1326 audit(1777366348.721:7535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.213911][ T28] audit: type=1326 audit(1777366348.731:7536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.237883][ T28] audit: type=1326 audit(1777366348.731:7537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27412 comm="syz.3.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f815868c819 code=0x7ffc0000 [ 848.454553][T27451] loop0: detected capacity change from 0 to 256 [ 848.580222][T27451] FAT-fs (loop0): Directory bread(block 64) failed [ 848.587087][T27451] FAT-fs (loop0): Directory bread(block 65) failed [ 848.593822][T27451] FAT-fs (loop0): Directory bread(block 66) failed [ 848.600462][T27451] FAT-fs (loop0): Directory bread(block 67) failed [ 848.607028][T27451] FAT-fs (loop0): Directory bread(block 68) failed [ 848.613595][T27451] FAT-fs (loop0): Directory bread(block 69) failed [ 848.620244][T27451] FAT-fs (loop0): Directory bread(block 70) failed [ 848.626862][T27451] FAT-fs (loop0): Directory bread(block 71) failed [ 848.633510][T27451] FAT-fs (loop0): Directory bread(block 72) failed [ 848.640164][T27451] FAT-fs (loop0): Directory bread(block 73) failed [ 848.682875][T27439] loop3: detected capacity change from 0 to 512 [ 848.934723][T27453] netlink: 7 bytes leftover after parsing attributes in process `syz.2.5789'. [ 848.953608][T27439] FAT-fs (loop3): Directory bread(block 199916) failed [ 848.993693][T27439] FAT-fs (loop3): Directory bread(block 199917) failed [ 849.080769][T27439] FAT-fs (loop3): Directory bread(block 199918) failed [ 849.102459][T27439] FAT-fs (loop3): Directory bread(block 199919) failed [ 849.152845][T27439] FAT-fs (loop3): Directory bread(block 199920) failed [ 849.179375][T27439] FAT-fs (loop3): Directory bread(block 199921) failed [ 849.198001][T27439] FAT-fs (loop3): Directory bread(block 199922) failed [ 849.206036][T27439] FAT-fs (loop3): Directory bread(block 199923) failed [ 849.344962][T27460] loop2: detected capacity change from 0 to 512 [ 849.374996][T27460] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 850.464042][T27476] loop0: detected capacity change from 0 to 512 [ 850.714146][T22003] FAT-fs (loop3): Directory bread(block 199916) failed [ 850.721394][T27495] loop0: detected capacity change from 0 to 128 [ 850.749294][T22003] FAT-fs (loop3): Directory bread(block 199917) failed [ 850.838746][T27488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=835 sclass=netlink_route_socket pid=27488 comm=syz.2.5795 [ 850.902911][ T8417] kworker/u8:19: attempt to access beyond end of device [ 850.902911][ T8417] loop0: rw=1, sector=145, nr_sectors = 8 limit=128 [ 850.917756][ T8417] kworker/u8:19: attempt to access beyond end of device [ 850.917756][ T8417] loop0: rw=1, sector=161, nr_sectors = 8 limit=128 [ 850.971374][ T8417] kworker/u8:19: attempt to access beyond end of device [ 850.971374][ T8417] loop0: rw=1, sector=177, nr_sectors = 8 limit=128 [ 850.988132][T27516] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 851.018842][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.018842][ T8417] loop0: rw=1, sector=193, nr_sectors = 8 limit=128 [ 851.032744][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.032744][ T8417] loop0: rw=1, sector=209, nr_sectors = 8 limit=128 [ 851.051298][T27516] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 851.062392][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.062392][ T8417] loop0: rw=1, sector=225, nr_sectors = 8 limit=128 [ 851.077231][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.077231][ T8417] loop0: rw=1, sector=241, nr_sectors = 8 limit=128 [ 851.091682][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.091682][ T8417] loop0: rw=1, sector=257, nr_sectors = 24 limit=128 [ 851.106846][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.106846][ T8417] loop0: rw=1, sector=289, nr_sectors = 8 limit=128 [ 851.120675][ T8417] kworker/u8:19: attempt to access beyond end of device [ 851.120675][ T8417] loop0: rw=1, sector=305, nr_sectors = 8 limit=128 [ 851.161724][T27534] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 851.177894][T27534] bond1 (unregistering): Released all slaves [ 851.194818][ T8417] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.263351][ T8417] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.322647][ T8417] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.347135][T27537] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5805'. [ 851.369230][T27537] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5805'. [ 851.383183][T27537] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5805'. [ 851.397749][ T8417] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.560546][T27550] lo speed is unknown, defaulting to 1000 [ 851.571155][T27580] netlink: 'syz.0.5808': attribute type 1 has an invalid length. [ 851.584996][ T8417] bridge_slave_1: left allmulticast mode [ 851.590950][ T8417] bridge_slave_1: left promiscuous mode [ 851.616985][ T8417] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.783131][ T8417] bridge_slave_0: left allmulticast mode [ 851.796696][ T8417] bridge_slave_0: left promiscuous mode [ 851.820299][ T8417] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.894671][T27582] loop1: detected capacity change from 0 to 512 [ 851.916892][T27582] EXT4-fs: Ignoring removed nobh option [ 851.954903][T27582] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 852.218282][ T8417] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 852.247936][ T8417] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 852.287876][T27582] EXT4-fs (loop1): 1 truncate cleaned up [ 852.297234][ T8417] bond0 (unregistering): Released all slaves [ 852.314291][ T8417] bond1 (unregistering): Released all slaves [ 852.343684][T27582] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 852.345693][ T8417] bond2 (unregistering): Released all slaves [ 852.377317][T27550] dummy0 speed is unknown, defaulting to 1000 [ 852.390965][T27587] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 852.411876][T27587] bond2 (unregistering): Released all slaves [ 852.447494][T27630] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5810'. [ 852.470127][T27550] lo speed is unknown, defaulting to 1000 [ 852.482823][ T8417] tipc: Left network mode [ 852.975200][T26200] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 853.224299][ T8417] hsr_slave_0: left promiscuous mode [ 853.237117][ T8417] hsr_slave_1: left promiscuous mode [ 853.248377][ T8417] veth1_macvtap: left promiscuous mode [ 853.254082][ T8417] veth0_macvtap: left promiscuous mode [ 853.259765][ T8417] veth1_vlan: left promiscuous mode [ 853.265170][ T8417] veth0_vlan: left promiscuous mode [ 853.302527][ T8417] pimreg (unregistering): left allmulticast mode [ 853.348088][ T8417] team0 (unregistering): Port device team_slave_1 removed [ 853.362423][ T8417] team0 (unregistering): Port device team_slave_0 removed [ 853.432455][T19354] dummy0 speed is unknown, defaulting to 1000 [ 853.459409][T19354] infiniband syz1: ib_query_port failed (-19) [ 853.477061][T27663] bond4: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 853.479428][T27673] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 853.499358][T27675] loop2: detected capacity change from 0 to 512 [ 853.499969][T27675] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 853.557052][T27673] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 853.591641][T27663] bond4 (unregistering): Released all slaves [ 853.657070][T27550] chnl_net:caif_netlink_parms(): no params data found [ 853.940198][T27550] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.965779][T27550] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.973742][T27550] bridge_slave_0: entered allmulticast mode [ 853.981343][T27550] bridge_slave_0: entered promiscuous mode [ 853.995792][T27550] bridge0: port 2(bridge_slave_1) entered blocking state [ 854.003543][T27550] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.015484][T27550] bridge_slave_1: entered allmulticast mode [ 854.023188][T27550] bridge_slave_1: entered promiscuous mode [ 854.102829][T27550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 854.120993][T27550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 854.187584][T27550] team0: Port device team_slave_0 added [ 854.204641][T27550] team0: Port device team_slave_1 added [ 854.235253][T27550] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 854.244961][T27707] netlink: 'syz.0.5822': attribute type 1 has an invalid length. [ 854.267466][T27550] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 854.309988][T27550] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 854.321970][T27550] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 854.328977][T27550] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 854.464073][T27716] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5825'. [ 854.550981][T27550] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 854.601772][T27711] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 854.615657][T27732] loop2: detected capacity change from 0 to 128 [ 854.627146][T27711] bond1 (unregistering): Released all slaves [ 854.643137][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 854.643154][ T28] audit: type=1400 audit(1777366355.437:7581): avc: denied { bind } for pid=27731 comm="syz.2.5828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 854.702875][ T28] audit: type=1400 audit(1777366355.497:7582): avc: denied { read } for pid=27731 comm="syz.2.5828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 854.779133][T27550] hsr_slave_0: entered promiscuous mode [ 854.791570][T27550] hsr_slave_1: entered promiscuous mode [ 854.808274][T27550] debugfs: 'hsr0' already exists in 'hsr' [ 854.817745][T27550] Cannot create hsr debugfs directory [ 855.016762][ T28] audit: type=1400 audit(1777366355.807:7583): avc: denied { ioctl } for pid=27756 comm="syz.1.5829" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x7013 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 855.042462][ T28] audit: type=1400 audit(1777366355.807:7584): avc: denied { create } for pid=27756 comm="syz.1.5829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 855.091871][ T28] audit: type=1400 audit(1777366355.807:7585): avc: denied { bind } for pid=27756 comm="syz.1.5829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 855.136813][ T28] audit: type=1400 audit(1777366355.807:7586): avc: denied { name_bind } for pid=27756 comm="syz.1.5829" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 855.173039][ T28] audit: type=1400 audit(1777366355.807:7587): avc: denied { node_bind } for pid=27756 comm="syz.1.5829" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 855.201539][T27770] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 855.240333][T27770] bond1 (unregistering): Released all slaves [ 855.308613][T27550] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 855.318121][T27550] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 855.330446][T27550] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 855.341920][T27550] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 855.390802][T27550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 855.407230][T27550] 8021q: adding VLAN 0 to HW filter on device team0 [ 855.426399][ T1796] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.433507][ T1796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 855.463599][T27811] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 855.466675][ T28] audit: type=1326 audit(1777366356.257:7588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27810 comm="syz.1.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 855.498540][ T28] audit: type=1326 audit(1777366356.257:7589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27810 comm="syz.1.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7be45cc819 code=0x7ffc0000 [ 855.529451][T22150] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.536651][T22150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 855.603764][T27822] xt_HMARK: proto mask must be zero with L3 mode [ 855.624828][T27800] loop0: detected capacity change from 0 to 512 [ 855.670615][T27800] FAT-fs (loop0): Directory bread(block 199916) failed [ 855.674453][T27550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 855.682207][T27800] FAT-fs (loop0): Directory bread(block 199917) failed [ 855.704134][T27800] FAT-fs (loop0): Directory bread(block 199918) failed [ 855.727358][T27800] FAT-fs (loop0): Directory bread(block 199919) failed [ 855.744966][T27800] FAT-fs (loop0): Directory bread(block 199920) failed [ 855.756092][T27800] FAT-fs (loop0): Directory bread(block 199921) failed [ 855.772778][T27800] FAT-fs (loop0): Directory bread(block 199922) failed [ 855.787219][T27800] FAT-fs (loop0): Directory bread(block 199923) failed [ 855.979200][T27550] veth0_vlan: entered promiscuous mode [ 856.002329][T27550] veth1_vlan: entered promiscuous mode [ 856.036596][T27550] veth0_macvtap: entered promiscuous mode [ 856.058370][T27550] veth1_macvtap: entered promiscuous mode [ 856.079809][T27550] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 856.104373][T27550] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 856.131225][ T5189] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.160542][ T5189] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.183181][ T5189] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.213895][ T5189] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.305896][T27151] FAT-fs (loop0): Directory bread(block 199916) failed [ 856.322130][T27151] FAT-fs (loop0): Directory bread(block 199917) failed [ 857.614038][T27913] loop0: detected capacity change from 0 to 128 [ 857.784998][T27921] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 857.920182][T27924] loop1: detected capacity change from 0 to 512 [ 857.940788][T27924] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 857.983981][T27921] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 857.994258][T27924] EXT4-fs (loop1): 1 truncate cleaned up [ 858.001057][T27924] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 858.067707][T27913] SELinux: policydb magic number 0x6c65732f does not match expected magic number 0xf97cff8c [ 858.082977][T27913] SELinux: failed to load policy [ 858.102428][T26200] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 858.283056][T27953] netlink: 88 bytes leftover after parsing attributes in process `syz.1.5860'. [ 858.304140][T27953] netlink: 88 bytes leftover after parsing attributes in process `syz.1.5860'. [ 858.321382][T27932] loop2: detected capacity change from 0 to 512 [ 858.386983][T27932] FAT-fs (loop2): Directory bread(block 199916) failed [ 858.396920][T27932] FAT-fs (loop2): Directory bread(block 199917) failed [ 858.406657][T27932] FAT-fs (loop2): Directory bread(block 199918) failed [ 858.411536][T27959] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 858.424417][T27932] FAT-fs (loop2): Directory bread(block 199919) failed [ 858.433767][T27932] FAT-fs (loop2): Directory bread(block 199920) failed [ 858.441778][T27932] FAT-fs (loop2): Directory bread(block 199921) failed [ 858.461900][T27932] FAT-fs (loop2): Directory bread(block 199922) failed [ 858.471912][T27932] FAT-fs (loop2): Directory bread(block 199923) failed [ 858.485050][T27959] bond1 (unregistering): Released all slaves [ 858.982093][T24449] FAT-fs (loop2): Directory bread(block 199916) failed [ 858.989886][T24449] FAT-fs (loop2): Directory bread(block 199917) failed [ 859.384464][T28024] netlink: 36 bytes leftover after parsing attributes in process `syz.6.5872'. [ 859.421267][T28024] loop6: detected capacity change from 0 to 1024 [ 859.458971][T28024] EXT4-fs: Ignoring removed oldalloc option [ 859.489502][T28032] netlink: 88 bytes leftover after parsing attributes in process `syz.1.5873'. [ 859.501958][T28032] netlink: 88 bytes leftover after parsing attributes in process `syz.1.5873'. [ 859.555539][T28024] EXT4-fs (loop6): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 859.559989][T28039] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 859.630260][T28024] ext4 filesystem being mounted at /6/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 859.647008][T28039] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 859.742392][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 859.742409][ T28] audit: type=1400 audit(1777366360.525:7650): avc: denied { map } for pid=28018 comm="syz.6.5872" path="/6/file1/file3" dev="loop6" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 859.830145][T14444] lo speed is unknown, defaulting to 1000 [ 859.853934][ T1796] batman_adv: batadv1: MLD Querier disappeared - multicast optimizations disabled [ 860.556603][T27550] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 860.574877][ T10] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 860.584289][ T10] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 860.892453][ T28] audit: type=1326 audit(1777366361.674:7651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28127 comm="syz.6.5889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 860.947165][ T28] audit: type=1326 audit(1777366361.674:7652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28127 comm="syz.6.5889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 861.001270][T28137] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5891'. [ 861.027810][ T28] audit: type=1326 audit(1777366361.714:7653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28127 comm="syz.6.5889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=191 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 861.056187][T28137] FAULT_INJECTION: forcing a failure. [ 861.056187][T28137] name failslab, interval 1, probability 0, space 0, times 0 [ 861.063359][ T28] audit: type=1326 audit(1777366361.714:7654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28127 comm="syz.6.5889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 861.074269][T28137] CPU: 1 UID: 0 PID: 28137 Comm: syz.0.5891 Tainted: G W syzkaller #0 PREEMPT(full) [ 861.074322][T28137] Tainted: [W]=WARN [ 861.074330][T28137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 861.074343][T28137] Call Trace: [ 861.074350][T28137] [ 861.074359][T28137] __dump_stack+0x1d/0x30 [ 861.074387][T28137] dump_stack_lvl+0x95/0xd0 [ 861.074450][T28137] dump_stack+0x15/0x1b [ 861.074473][T28137] should_fail_ex+0x263/0x280 [ 861.074501][T28137] ? sctp_add_bind_addr+0x71/0x1e0 [ 861.074523][T28137] should_failslab+0x8c/0xb0 [ 861.074546][T28137] __kmalloc_cache_noprof+0x5f/0x410 [ 861.074626][T28137] sctp_add_bind_addr+0x71/0x1e0 [ 861.074730][T28137] sctp_copy_local_addr_list+0x1b3/0x250 [ 861.074767][T28137] sctp_copy_one_addr+0x7f/0x280 [ 861.074788][T28137] sctp_bind_addr_copy+0x79/0x290 [ 861.074869][T28137] sctp_assoc_set_bind_addr_from_ep+0xce/0xe0 [ 861.074901][T28137] sctp_connect_new_asoc+0x1c3/0x3a0 [ 861.074959][T28137] sctp_sendmsg+0xfff/0x1d60 [ 861.074985][T28137] ? selinux_socket_sendmsg+0x192/0x1c0 [ 861.075047][T28137] ? __pfx_sctp_sendmsg+0x10/0x10 [ 861.075128][T28137] inet_sendmsg+0xc5/0xd0 [ 861.075147][T28137] ? __pfx_inet_sendmsg+0x10/0x10 [ 861.075221][T28137] ____sys_sendmsg+0x519/0x5b0 [ 861.075309][T28137] ___sys_sendmsg+0x195/0x1e0 [ 861.075423][T28137] ? path_openat+0x1b01/0x2050 [ 861.075453][T28137] __sys_sendmmsg+0x185/0x320 [ 861.075480][T28137] __x64_sys_sendmmsg+0x57/0x70 [ 861.075579][T28137] x64_sys_call+0x27aa/0x3020 [ 861.075606][T28137] do_syscall_64+0x12c/0x370 [ 861.075634][T28137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 861.075657][T28137] RIP: 0033:0x7f4d34eac819 [ 861.075719][T28137] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 861.075738][T28137] RSP: 002b:00007f4d338ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 861.075761][T28137] RAX: ffffffffffffffda RBX: 00007f4d35125fa0 RCX: 00007f4d34eac819 [ 861.075776][T28137] RDX: 0000000000000001 RSI: 0000200000000300 RDI: 0000000000000007 [ 861.075790][T28137] RBP: 00007f4d338ff090 R08: 0000000000000000 R09: 0000000000000000 [ 861.075804][T28137] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000002 [ 861.075860][T28137] R13: 00007f4d35126038 R14: 00007f4d35125fa0 R15: 00007ffff4c1a848 [ 861.075880][T28137] [ 861.147242][T28146] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 861.344073][ T28] audit: type=1400 audit(1777366361.784:7655): avc: denied { shutdown } for pid=28135 comm="syz.0.5891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 861.378522][T28146] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 861.541649][ T28] audit: type=1400 audit(1777366361.794:7656): avc: denied { write } for pid=28101 comm="syz.2.5882" name="hidraw0" dev="devtmpfs" ino=3644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 861.581100][T28153] loop0: detected capacity change from 0 to 128 [ 861.751449][ T28] audit: type=1326 audit(1777366362.504:7657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28169 comm="syz.2.5900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d91c2c819 code=0x7ffc0000 [ 861.878729][ T28] audit: type=1326 audit(1777366362.504:7658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28169 comm="syz.2.5900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2d91c2c819 code=0x7ffc0000 [ 861.911275][ T28] audit: type=1326 audit(1777366362.504:7659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28169 comm="syz.2.5900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d91c2c819 code=0x7ffc0000 [ 862.103898][T28188] SELinux: failed to load policy [ 862.493443][T28221] netlink: 'syz.0.5894': attribute type 1 has an invalid length. [ 862.831599][T28221] bond1: entered promiscuous mode [ 862.836923][T28221] 8021q: adding VLAN 0 to HW filter on device bond1 [ 862.896035][T28244] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 862.934234][T28244] bond2 (unregistering): Released all slaves [ 863.012460][ T10] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 863.024011][ T10] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 863.210802][T28264] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 863.271272][T28264] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 863.515102][T28271] loop2: detected capacity change from 0 to 1024 [ 863.548403][T28271] EXT4-fs: inline encryption not supported [ 863.554527][T28271] ext4: Unknown parameter 'uid' [ 863.715800][T28294] netlink: 32 bytes leftover after parsing attributes in process `syz.8.5921'. [ 863.734415][T19354] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 863.749942][T19354] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 863.961341][T28314] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5924'. [ 864.009152][T28318] loop2: detected capacity change from 0 to 512 [ 864.040425][T28318] EXT4-fs (loop2): can't mount with data=, fs mounted w/o journal [ 864.200754][T28329] loop1: detected capacity change from 0 to 512 [ 864.235919][T28329] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 864.311886][T28329] EXT4-fs (loop1): 1 truncate cleaned up [ 864.333954][T28329] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 864.383190][T28340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 864.428504][T28340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 864.690591][T26200] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 864.711300][T28301] loop2: detected capacity change from 0 to 512 [ 864.749998][T28371] loop1: detected capacity change from 0 to 1024 [ 864.791750][T28371] EXT4-fs (loop1): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 864.807727][T28371] ext4 filesystem being mounted at /62/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 864.824715][T28371] IPVS: set_ctl: invalid protocol: 12 172.30.0.2:20003 [ 864.832851][ T28] kauditd_printk_skb: 124 callbacks suppressed [ 864.832870][ T28] audit: type=1400 audit(1777366365.622:7784): avc: denied { ioctl } for pid=28370 comm="syz.1.5929" path="/62/file1/file1" dev="loop1" ino=15 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 864.919336][T26200] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 865.075687][ T28] audit: type=1400 audit(1777366365.852:7785): avc: denied { create } for pid=28387 comm="syz.6.5932" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=x25_socket permissive=1 [ 865.153749][ T28] audit: type=1400 audit(1777366365.922:7786): avc: denied { write } for pid=28390 comm="syz.1.5934" name="file0" dev="tmpfs" ino=366 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 865.182629][T28301] EXT4-fs error (device loop2): ext4_orphan_get:1397: inode #15: comm syz.2.5922: inode has both inline data and extents flags [ 865.220982][ T28] audit: type=1400 audit(1777366365.922:7787): avc: denied { open } for pid=28390 comm="syz.1.5934" path="/64/file0" dev="tmpfs" ino=366 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 865.250231][T28396] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 865.337213][T28301] loop2: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 865.341263][T28396] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 865.348661][ T28] audit: type=1400 audit(1777366365.992:7788): avc: denied { create } for pid=28387 comm="syz.6.5932" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=tcp_socket permissive=1 [ 865.350674][ C1] EXT4-fs (loop2): error count since last fsck: 1 [ 865.358157][ T28] audit: type=1400 audit(1777366365.992:7789): avc: denied { write } for pid=28387 comm="syz.6.5932" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=tcp_socket permissive=1 [ 865.406401][ C1] EXT4-fs (loop2): initial error at time 1777366366: ext4_orphan_get:1397: inode 15 [ 865.409808][T28301] EXT4-fs error (device loop2): ext4_orphan_get:1402: comm syz.2.5922: couldn't read orphan inode 15 (err -117) [ 865.416080][ C1] EXT4-fs (loop2): last error at time 1777366366: ext4_orphan_get:1397: inode 15 [ 865.453359][T28301] loop2: lost filesystem error report for type 5 error -117 [ 865.461802][T28404] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 865.491791][T28404] bond2 (unregistering): Released all slaves [ 865.514164][T28301] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 865.809157][ T28] audit: type=1400 audit(1777366366.582:7790): avc: denied { setopt } for pid=28299 comm="syz.2.5922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 865.858416][T24449] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 865.908630][T28418] tipc: Failed to remove unknown binding: 66,1,1/0:2632767715/2632767717 [ 866.073410][T28438] netlink: 'syz.2.5943': attribute type 21 has an invalid length. [ 866.104803][T28444] FAULT_INJECTION: forcing a failure. [ 866.104803][T28444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 866.105156][T28443] veth1_to_batadv: entered promiscuous mode [ 866.136578][T28444] CPU: 0 UID: 0 PID: 28444 Comm: syz.0.5944 Tainted: G W syzkaller #0 PREEMPT(full) [ 866.136614][T28444] Tainted: [W]=WARN [ 866.136623][T28444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 866.136638][T28444] Call Trace: [ 866.136646][T28444] [ 866.136653][T28444] __dump_stack+0x1d/0x30 [ 866.136679][T28444] dump_stack_lvl+0x95/0xd0 [ 866.136738][T28444] dump_stack+0x15/0x1b [ 866.136763][T28444] should_fail_ex+0x263/0x280 [ 866.136796][T28444] should_fail+0xb/0x20 [ 866.136824][T28444] should_fail_usercopy+0x1a/0x20 [ 866.136887][T28444] _copy_from_user+0x1c/0xb0 [ 866.136924][T28444] sctp_getsockopt_pf_expose+0x71/0x340 [ 866.136956][T28444] sctp_getsockopt+0x40a/0xaa0 [ 866.136997][T28444] sock_common_getsockopt+0x60/0x70 [ 866.137025][T28444] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 866.137055][T28444] do_sock_getsockopt+0x1c4/0x210 [ 866.137125][T28444] __x64_sys_getsockopt+0x11d/0x1a0 [ 866.137167][T28444] x64_sys_call+0x2dcf/0x3020 [ 866.137194][T28444] do_syscall_64+0x12c/0x370 [ 866.137228][T28444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 866.137253][T28444] RIP: 0033:0x7f4d34eac819 [ 866.137279][T28444] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 866.137297][T28444] RSP: 002b:00007f4d338ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 866.137322][T28444] RAX: ffffffffffffffda RBX: 00007f4d35125fa0 RCX: 00007f4d34eac819 [ 866.137336][T28444] RDX: 0000000000000083 RSI: 0000000000000084 RDI: 0000000000000003 [ 866.137401][T28444] RBP: 00007f4d338ff090 R08: 0000200000000180 R09: 0000000000000000 [ 866.137415][T28444] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 866.137428][T28444] R13: 00007f4d35126038 R14: 00007f4d35125fa0 R15: 00007ffff4c1a848 [ 866.137446][T28444] [ 866.324400][T28438] 9p: Bad value for 'rfdno' [ 866.329574][T28438] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5943'. [ 866.484035][ T28] audit: type=1400 audit(1777366367.271:7791): avc: denied { unmount } for pid=24449 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 866.523914][ T28] audit: type=1400 audit(1777366367.311:7792): avc: denied { create } for pid=28451 comm="syz.2.5947" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 866.548803][ T28] audit: type=1400 audit(1777366367.331:7793): avc: denied { write } for pid=28451 comm="syz.2.5947" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 866.570160][T28454] loop0: detected capacity change from 0 to 1024 [ 866.607761][T28454] EXT4-fs error (device loop0): __ext4_fill_super:5588: inode #2: comm syz.0.5948: iget: bad extra_isize 65535 (inode size 256) [ 866.633644][T28449] loop6: detected capacity change from 0 to 512 [ 866.666595][T28454] loop0: lost file I/O error report for ino 2 type 5 pos 0x0 len 0x0 error -117 [ 866.667008][ C1] EXT4-fs (loop0): error count since last fsck: 1 [ 866.682894][ C1] EXT4-fs (loop0): initial error at time 1777366367: __ext4_fill_super:5588: inode 2 [ 866.692491][ C1] EXT4-fs (loop0): last error at time 1777366367: __ext4_fill_super:5588: inode 2 [ 866.706686][T28454] EXT4-fs (loop0): get root inode failed [ 866.713085][T28449] EXT4-fs: Mount option(s) incompatible with ext2 [ 866.753035][T28454] EXT4-fs (loop0): mount failed [ 866.759798][T28449] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2560 sclass=netlink_xfrm_socket pid=28449 comm=syz.6.5946 [ 867.295184][T28476] loop0: detected capacity change from 0 to 1024 [ 867.307919][T28476] EXT4-fs: inline encryption not supported [ 867.322393][T28476] EXT4-fs: Ignoring removed bh option [ 867.337000][T28476] EXT4-fs (loop0): bad geometry: bigalloc file system with non-zero first_data_block [ 867.337000][T28476] [ 867.393314][T28503] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 867.414265][T28503] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 868.139506][T28516] netlink: 72 bytes leftover after parsing attributes in process `syz.2.5958'. [ 868.176047][T28516] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.190315][T28519] netlink: 72 bytes leftover after parsing attributes in process `syz.2.5958'. [ 868.291800][T28522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 868.300252][T28522] team0: Port device bond0 added [ 868.463151][T28530] loop6: detected capacity change from 0 to 512 [ 868.721490][T28534] macvtap1: entered promiscuous mode [ 868.731281][T28530] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 868.759288][T28530] EXT4-fs (loop6): 1 truncate cleaned up [ 868.781859][T28534] macvtap1: entered allmulticast mode [ 868.786373][T28530] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 868.797128][T28534] bridge0: entered allmulticast mode [ 868.812616][T28534] bridge0: port 2(macvtap1) entered blocking state [ 868.826219][T27550] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 868.835383][T28534] bridge0: port 2(macvtap1) entered disabled state [ 868.843536][T28534] bridge0: left allmulticast mode [ 869.843086][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 869.849315][ T28] audit: type=1400 audit(1777366370.620:7802): avc: denied { write } for pid=28543 comm="syz.6.5968" laddr=fe80::13 lport=32945 faddr=ff02::1 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 870.198911][T28559] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5971'. [ 870.283114][T28562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2566 sclass=netlink_route_socket pid=28562 comm=syz.1.5973 [ 870.408789][T28575] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 870.434593][T28575] bond1 (unregistering): Released all slaves [ 870.455568][T28577] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 870.473435][T28566] loop6: detected capacity change from 0 to 512 [ 870.481966][T28577] bond2 (unregistering): Released all slaves [ 870.565895][T28566] FAT-fs (loop6): Directory bread(block 199916) failed [ 870.576680][T28566] FAT-fs (loop6): Directory bread(block 199917) failed [ 870.587084][T28566] FAT-fs (loop6): Directory bread(block 199918) failed [ 870.601878][T28566] FAT-fs (loop6): Directory bread(block 199919) failed [ 870.610665][T28566] FAT-fs (loop6): Directory bread(block 199920) failed [ 870.620929][T28566] FAT-fs (loop6): Directory bread(block 199921) failed [ 870.628701][T28566] FAT-fs (loop6): Directory bread(block 199922) failed [ 870.636094][T28566] FAT-fs (loop6): Directory bread(block 199923) failed [ 870.671562][T28596] netlink: 'syz.2.5983': attribute type 34 has an invalid length. [ 870.729989][ T1033] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 870.751240][ T1033] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz0 [ 871.025615][T28566] FAT-fs (loop6): FAT read failed (blocknr 128) [ 871.092527][T28621] bridge_slave_1: left allmulticast mode [ 871.098498][T28621] bridge_slave_1: left promiscuous mode [ 871.104419][T28621] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.166495][T28621] bridge_slave_0: left allmulticast mode [ 871.172507][T28621] bridge_slave_0: left promiscuous mode [ 871.178381][T28621] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.745091][T28637] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_cmd_wq": -EINTR [ 871.760757][ T28] audit: type=1400 audit(1777366372.509:7803): avc: denied { read append } for pid=28633 comm="syz.0.5993" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 871.797696][ T28] audit: type=1400 audit(1777366372.509:7804): avc: denied { open } for pid=28633 comm="syz.0.5993" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 872.180162][T28622] bond4: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 872.209455][T28645] loop0: detected capacity change from 0 to 128 [ 872.235555][T28622] bond4 (unregistering): Released all slaves [ 872.262868][T28623] netlink: 'syz.1.5988': attribute type 12 has an invalid length. [ 872.324981][T28647] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 872.339724][T28647] bond1 (unregistering): Released all slaves [ 872.348761][T28650] loop2: detected capacity change from 0 to 1024 [ 872.363744][T28650] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 872.376676][T28654] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5995'. [ 872.387585][T28654] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.390029][T28650] EXT4-fs (loop2): group descriptors corrupted! [ 872.395055][T28654] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.468735][T28654] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5995'. [ 872.528341][ T3521] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 872.543830][ T3521] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 [ 872.598269][ T3521] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 872.624169][ T3521] hid-generic 0000:0000:0000.000A: hidraw1: HID v0.00 Device [syz1] on syz0 [ 872.670597][T28671] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 872.692572][T28671] bond1 (unregistering): Released all slaves [ 872.889808][T28682] FAULT_INJECTION: forcing a failure. [ 872.889808][T28682] name failslab, interval 1, probability 0, space 0, times 0 [ 872.913231][T28682] CPU: 0 UID: 0 PID: 28682 Comm: syz.6.6006 Tainted: G W syzkaller #0 PREEMPT(full) [ 872.913270][T28682] Tainted: [W]=WARN [ 872.913279][T28682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 872.913326][T28682] Call Trace: [ 872.913336][T28682] [ 872.913347][T28682] __dump_stack+0x1d/0x30 [ 872.913401][T28682] dump_stack_lvl+0x95/0xd0 [ 872.913428][T28682] dump_stack+0x15/0x1b [ 872.913456][T28682] should_fail_ex+0x263/0x280 [ 872.913566][T28682] should_failslab+0x8c/0xb0 [ 872.913596][T28682] kmem_cache_alloc_noprof+0x66/0x400 [ 872.913625][T28682] ? security_file_alloc+0x32/0xf0 [ 872.913740][T28682] security_file_alloc+0x32/0xf0 [ 872.913760][T28682] init_file+0x5b/0x1b0 [ 872.913802][T28682] alloc_empty_file+0x8b/0x200 [ 872.913836][T28682] dentry_open+0x2d/0x90 [ 872.913868][T28682] open_namespace+0xa9/0x140 [ 872.913895][T28682] pidfd_ioctl+0xe76/0x1480 [ 872.913928][T28682] ? __rcu_read_unlock+0x4e/0x70 [ 872.913978][T28682] ? __fget_files+0x184/0x1c0 [ 872.914007][T28682] ? mutex_lock+0x57/0x90 [ 872.914028][T28682] ? __pfx_pidfd_ioctl+0x10/0x10 [ 872.914075][T28682] __se_sys_ioctl+0xce/0x140 [ 872.914100][T28682] __x64_sys_ioctl+0x43/0x50 [ 872.914140][T28682] x64_sys_call+0x1563/0x3020 [ 872.914165][T28682] do_syscall_64+0x12c/0x370 [ 872.914252][T28682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 872.914325][T28682] RIP: 0033:0x7ff05c1cc819 [ 872.914369][T28682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 872.914393][T28682] RSP: 002b:00007ff05ac27028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 872.914449][T28682] RAX: ffffffffffffffda RBX: 00007ff05c445fa0 RCX: 00007ff05c1cc819 [ 872.914468][T28682] RDX: 0000000000000000 RSI: 000000000000ff07 RDI: 0000000000000003 [ 872.914485][T28682] RBP: 00007ff05ac27090 R08: 0000000000000000 R09: 0000000000000000 [ 872.914501][T28682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 872.914570][T28682] R13: 00007ff05c446038 R14: 00007ff05c445fa0 R15: 00007ffd643fc738 [ 872.914593][T28682] [ 872.918067][ T3521] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 872.935636][ T28] audit: type=1400 audit(1777366373.718:7805): avc: denied { relabelfrom } for pid=28684 comm="syz.1.6007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 872.955821][ T3521] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz0 [ 872.998133][ T28] audit: type=1400 audit(1777366373.718:7806): avc: denied { relabelto } for pid=28684 comm="syz.1.6007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 873.239952][T28691] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 873.258149][T28691] bond1 (unregistering): Released all slaves [ 873.306722][ T28] audit: type=1400 audit(1777366374.078:7807): avc: denied { ioctl } for pid=28698 comm="syz.1.6010" path="/dev/sg0" dev="devtmpfs" ino=137 ioctlcmd=0x2285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 873.349949][T28696] loop0: detected capacity change from 0 to 512 [ 873.374125][T28701] netlink: 60 bytes leftover after parsing attributes in process `syz.1.6011'. [ 873.397845][T28701] netlink: 60 bytes leftover after parsing attributes in process `syz.1.6011'. [ 873.414996][T28696] FAT-fs (loop0): Directory bread(block 199916) failed [ 873.427761][T28696] FAT-fs (loop0): Directory bread(block 199917) failed [ 873.459210][T28710] tipc: Failed to remove unknown binding: 66,1,1/0:2405957818/2405957820 [ 873.482082][T28696] FAT-fs (loop0): Directory bread(block 199918) failed [ 873.493723][ T3414] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 873.502354][ T3414] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz0 [ 873.503934][T28696] FAT-fs (loop0): Directory bread(block 199919) failed [ 873.547345][T28696] FAT-fs (loop0): Directory bread(block 199920) failed [ 873.563910][T28696] FAT-fs (loop0): Directory bread(block 199921) failed [ 873.583489][T28696] FAT-fs (loop0): Directory bread(block 199922) failed [ 873.597212][ T28] audit: type=1400 audit(1777366374.378:7808): avc: denied { bind } for pid=28719 comm="syz.8.6018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 873.628052][T28696] FAT-fs (loop0): Directory bread(block 199923) failed [ 873.649633][ T28] audit: type=1400 audit(1777366374.408:7809): avc: denied { listen } for pid=28719 comm="syz.8.6018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 873.676267][ T28] audit: type=1400 audit(1777366374.408:7810): avc: denied { accept } for pid=28719 comm="syz.8.6018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 873.696314][ T28] audit: type=1400 audit(1777366374.408:7811): avc: denied { setopt } for pid=28719 comm="syz.8.6018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 873.699532][T28713] lo speed is unknown, defaulting to 1000 [ 874.073399][T27151] FAT-fs (loop0): Directory bread(block 199916) failed [ 874.083600][T27151] FAT-fs (loop0): Directory bread(block 199917) failed [ 874.102592][T28737] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6023'. [ 874.201488][T28742] bond3: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 874.214739][T28742] bond3 (unregistering): Released all slaves [ 874.362060][T28713] lo speed is unknown, defaulting to 1000 [ 874.523145][T28752] netlink: 60 bytes leftover after parsing attributes in process `syz.1.6027'. [ 874.570003][T28752] netlink: 60 bytes leftover after parsing attributes in process `syz.1.6027'. [ 874.595529][ T10] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 874.618658][ T10] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz0 [ 874.645716][T28758] SELinux: failed to load policy [ 874.820322][T28778] loop6: detected capacity change from 0 to 512 [ 874.840233][T28771] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6034'. [ 874.842557][T28778] FAT-fs (loop6): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 875.014614][T28781] tipc: Failed to remove unknown binding: 66,1,1/0:830331688/830331690 [ 875.918172][T28811] bond3: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 875.921809][T28822] netlink: 60 bytes leftover after parsing attributes in process `syz.2.6043'. [ 875.929406][T28823] loop1: detected capacity change from 0 to 128 [ 875.944945][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 875.944963][ T28] audit: type=1326 audit(1777366376.727:7850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 875.980511][ T28] audit: type=1326 audit(1777366376.727:7851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 875.981245][T28811] bond3 (unregistering): Released all slaves [ 876.004310][ T28] audit: type=1326 audit(1777366376.727:7852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.022183][T28828] netlink: 60 bytes leftover after parsing attributes in process `syz.2.6043'. [ 876.033673][ T28] audit: type=1326 audit(1777366376.727:7853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.091147][ T28] audit: type=1326 audit(1777366376.727:7854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.183476][ T28] audit: type=1326 audit(1777366376.727:7855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.198740][T28847] loop2: detected capacity change from 0 to 128 [ 876.209902][ T28] audit: type=1326 audit(1777366376.727:7856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.296602][ T28] audit: type=1326 audit(1777366376.727:7857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.379179][ T28] audit: type=1326 audit(1777366376.727:7858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.383999][T28854] bio_check_eod: 100 callbacks suppressed [ 876.384074][T28854] syz.2.6048: attempt to access beyond end of device [ 876.384074][T28854] loop2: rw=0, sector=121, nr_sectors = 920 limit=128 [ 876.430062][ T28] audit: type=1326 audit(1777366376.727:7859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28815 comm="syz.6.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7ff05c1cc819 code=0x7ffc0000 [ 876.590671][T28873] loop0: detected capacity change from 0 to 512 [ 876.617386][T28873] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 876.633529][ T10] lo speed is unknown, defaulting to 1000 [ 876.639712][ T10] syz2: Port: 1 Link DOWN [ 877.198954][T28914] loop6: detected capacity change from 0 to 512 [ 877.232126][T28914] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 877.281252][T28914] EXT4-fs (loop6): 1 truncate cleaned up [ 877.299662][T28914] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 877.348607][T27550] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 877.357909][T28936] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 877.382644][T28936] bond2 (unregistering): Released all slaves [ 877.625164][T28946] loop0: detected capacity change from 0 to 128 [ 877.834040][T28959] FAULT_INJECTION: forcing a failure. [ 877.834040][T28959] name failslab, interval 1, probability 0, space 0, times 0 [ 877.889177][T28959] CPU: 1 UID: 0 PID: 28959 Comm: syz.0.6068 Tainted: G W syzkaller #0 PREEMPT(full) [ 877.889215][T28959] Tainted: [W]=WARN [ 877.889265][T28959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 877.889277][T28959] Call Trace: [ 877.889285][T28959] [ 877.889294][T28959] __dump_stack+0x1d/0x30 [ 877.889335][T28959] dump_stack_lvl+0x95/0xd0 [ 877.889409][T28959] dump_stack+0x15/0x1b [ 877.889484][T28959] should_fail_ex+0x263/0x280 [ 877.889513][T28959] should_failslab+0x8c/0xb0 [ 877.889565][T28959] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 877.889594][T28959] ? v9fs_init_fs_context+0xae/0x220 [ 877.889696][T28959] kstrdup+0x3e/0xd0 [ 877.889720][T28959] v9fs_init_fs_context+0xae/0x220 [ 877.889783][T28959] alloc_fs_context+0x4a6/0x580 [ 877.889841][T28959] fs_context_for_mount+0x22/0x30 [ 877.889929][T28959] do_new_mount+0xe7/0x8d0 [ 877.889955][T28959] ? security_capable+0x7b/0x90 [ 877.889982][T28959] path_mount+0x4d0/0xbc0 [ 877.890005][T28959] __se_sys_mount+0x28c/0x2e0 [ 877.890080][T28959] ? fput+0x8f/0xc0 [ 877.890107][T28959] __x64_sys_mount+0x67/0x80 [ 877.890129][T28959] x64_sys_call+0x2d61/0x3020 [ 877.890177][T28959] do_syscall_64+0x12c/0x370 [ 877.890217][T28959] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 877.890238][T28959] RIP: 0033:0x7f4d34eac819 [ 877.890320][T28959] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 877.890343][T28959] RSP: 002b:00007f4d338ff028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 877.890369][T28959] RAX: ffffffffffffffda RBX: 00007f4d35125fa0 RCX: 00007f4d34eac819 [ 877.890387][T28959] RDX: 0000200000001200 RSI: 0000200000000000 RDI: 0000000000000000 [ 877.890459][T28959] RBP: 00007f4d338ff090 R08: 0000200000000180 R09: 0000000000000000 [ 877.890476][T28959] R10: 000000000000000a R11: 0000000000000246 R12: 0000000000000002 [ 877.890492][T28959] R13: 00007f4d35126038 R14: 00007f4d35125fa0 R15: 00007ffff4c1a848 [ 877.890515][T28959] [ 878.116787][T28953] loop6: detected capacity change from 0 to 512 [ 878.232663][T28953] FAT-fs (loop6): Directory bread(block 199916) failed [ 878.253376][T28953] FAT-fs (loop6): Directory bread(block 199917) failed [ 878.262154][T28953] FAT-fs (loop6): Directory bread(block 199918) failed [ 878.282445][T28953] FAT-fs (loop6): Directory bread(block 199919) failed [ 878.291302][T28953] FAT-fs (loop6): Directory bread(block 199920) failed [ 878.333697][T28953] FAT-fs (loop6): Directory bread(block 199921) failed [ 878.343638][T28953] FAT-fs (loop6): Directory bread(block 199922) failed [ 878.353431][T28953] FAT-fs (loop6): Directory bread(block 199923) failed [ 878.745634][T28994] netlink: 'syz.2.6072': attribute type 1 has an invalid length. [ 878.811677][T28996] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 878.872845][T28996] bond1 (unregistering): Released all slaves [ 879.295305][T29003] netlink: 56 bytes leftover after parsing attributes in process `syz.6.6078'. [ 879.323722][T29003] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6078'. [ 879.386759][T29008] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6080'. [ 879.405522][T29008] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6080'. [ 879.841690][T29032] netlink: 36 bytes leftover after parsing attributes in process `syz.1.6088'. [ 879.853548][T29032] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6088'. [ 879.883969][T29035] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 879.900833][T29032] loop1: detected capacity change from 0 to 256 [ 879.901100][T29035] bond2 (unregistering): Released all slaves [ 879.910022][T29038] loop6: detected capacity change from 0 to 512 [ 879.951576][T29038] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 880.000005][T29038] EXT4-fs (loop6): 1 truncate cleaned up [ 880.006182][T29038] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 880.062860][T27550] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 880.204926][T29044] SELinux: failed to load policy [ 880.342774][T29053] netlink: 'syz.1.6094': attribute type 1 has an invalid length. [ 880.534000][T29056] IPVS: sync thread started: state = MASTER, mcast_ifn = vcan0, syncid = 0, id = 0 [ 880.543381][T29055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=29055 comm=syz.0.6095 [ 881.019248][T29074] loop6: detected capacity change from 0 to 512 [ 881.027242][T29074] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 881.041998][ T28] kauditd_printk_skb: 132 callbacks suppressed [ 881.042013][ T28] audit: type=1400 audit(1777366381.824:7992): avc: denied { watch_reads } for pid=29066 comm="syz.2.6100" path="/192" dev="tmpfs" ino=1039 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 881.061994][T29074] EXT4-fs error (device loop6): xattr_find_entry:337: inode #15: comm syz.6.6101: corrupted xattr entries [ 881.082675][T29074] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 881.082764][ T28] audit: type=1400 audit(1777366381.854:7993): avc: denied { relabelto } for pid=29066 comm="syz.2.6100" name="192" dev="tmpfs" ino=1039 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsa" [ 881.091961][ C1] EXT4-fs (loop6): error count since last fsck: 1 [ 881.091985][ C1] EXT4-fs (loop6): initial error at time 1777366381: xattr_find_entry:337: inode 15 [ 881.092038][ C1] EXT4-fs (loop6): last error at time 1777366381: xattr_find_entry:337: inode 15 [ 881.125359][T29074] EXT4-fs (loop6): Remounting filesystem read-only [ 881.133793][ T28] audit: type=1400 audit(1777366381.854:7994): avc: denied { associate } for pid=29066 comm="syz.2.6100" name="192" dev="tmpfs" ino=1039 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsa" [ 881.152377][T29074] EXT4-fs (loop6): 1 truncate cleaned up [ 881.187228][T29074] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 881.199967][T29074] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 881.287707][T29079] loop6: detected capacity change from 0 to 512 [ 881.301882][T29079] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 881.323700][T29079] EXT4-fs (loop6): 1 truncate cleaned up [ 881.333291][T29079] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 881.360896][T27550] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 881.379864][ T28] audit: type=1400 audit(1777366382.154:7995): avc: denied { ioctl } for pid=29081 comm="syz.6.6103" path="/46/file0" dev="tmpfs" ino=262 ioctlcmd=0x1263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 881.404612][T29082] xt_limit: Overflow, try lower: 2147483649/3300 [ 881.447475][ T28] audit: type=1400 audit(1777366382.194:7996): avc: denied { write } for pid=29081 comm="syz.6.6103" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 881.550976][T29082] loop6: detected capacity change from 0 to 512 [ 881.672777][T29082] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 881.708809][T29082] ext4 filesystem being mounted at /46/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 881.721163][ C0] vcan0: j1939_tp_rxtimer: 0xffff88811afe9600: rx timeout, send abort [ 881.723368][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88811afe9600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 881.779748][T29082] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 881.786678][ T28] audit: type=1400 audit(1777366382.564:7997): avc: denied { read } for pid=2984 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 881.812515][ T28] audit: type=1400 audit(1777366382.564:7998): avc: denied { search } for pid=2984 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 881.843693][ T28] audit: type=1400 audit(1777366382.564:7999): avc: denied { append } for pid=2984 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.867472][ T28] audit: type=1400 audit(1777366382.564:8000): avc: denied { open } for pid=2984 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.947027][ T28] audit: type=1400 audit(1777366382.564:8001): avc: denied { getattr } for pid=2984 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 882.309352][T29095] loop0: detected capacity change from 0 to 512 [ 882.437137][T29095] FAT-fs (loop0): Directory bread(block 199916) failed [ 882.463396][T29095] FAT-fs (loop0): Directory bread(block 199917) failed [ 882.483490][T29095] FAT-fs (loop0): Directory bread(block 199918) failed [ 882.493615][T29104] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6108'. [ 882.503632][T29104] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6108'. [ 882.513059][T29104] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6108'. [ 882.522248][T29104] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6108'. [ 882.534081][T29095] FAT-fs (loop0): Directory bread(block 199919) failed [ 882.544036][T29095] FAT-fs (loop0): Directory bread(block 199920) failed [ 882.558642][T29095] FAT-fs (loop0): Directory bread(block 199921) failed [ 882.568532][T29095] FAT-fs (loop0): Directory bread(block 199922) failed [ 882.577206][T29095] FAT-fs (loop0): Directory bread(block 199923) failed [ 882.747122][T29111] netlink: 'syz.6.6109': attribute type 1 has an invalid length. [ 883.080367][ T3002] ================================================================== [ 883.080423][T29113] loop0: detected capacity change from 0 to 512 [ 883.088508][ T3002] BUG: KCSAN: data-race in block_uevent / inc_diskseq [ 883.101691][ T3002] [ 883.104028][ T3002] write to 0xffff888101d6ee18 of 8 bytes by task 29113 on cpu 0: [ 883.111772][ T3002] inc_diskseq+0x2d/0x40 [ 883.116072][ T3002] disk_force_media_change+0x9e/0xe0 [ 883.121402][ T3002] loop_configure+0x6cb/0x9c0 [ 883.126109][ T3002] lo_ioctl+0x1e1/0x13a0 [ 883.130377][ T3002] blkdev_ioctl+0x387/0x460 [ 883.134998][ T3002] __se_sys_ioctl+0xce/0x140 [ 883.139648][ T3002] __x64_sys_ioctl+0x43/0x50 [ 883.144258][ T3002] x64_sys_call+0x1563/0x3020 [ 883.149043][ T3002] do_syscall_64+0x12c/0x370 [ 883.153658][ T3002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.159572][ T3002] [ 883.161907][ T3002] read to 0xffff888101d6ee18 of 8 bytes by task 3002 on cpu 1: [ 883.169466][ T3002] block_uevent+0x31/0x50 [ 883.173819][ T3002] dev_uevent+0x375/0x400 [ 883.178190][ T3002] uevent_show+0x11a/0x200 [ 883.182634][ T3002] dev_attr_show+0x3f/0xa0 [ 883.187076][ T3002] sysfs_kf_seq_show+0x1a3/0x280 [ 883.192048][ T3002] kernfs_seq_show+0x82/0xa0 [ 883.196658][ T3002] seq_read_iter+0x31e/0x940 [ 883.201356][ T3002] kernfs_fop_read_iter+0xc1/0x330 [ 883.206477][ T3002] vfs_read+0x6c0/0x7f0 [ 883.210637][ T3002] ksys_read+0xdc/0x1a0 [ 883.214795][ T3002] __x64_sys_read+0x40/0x50 [ 883.219309][ T3002] x64_sys_call+0x2886/0x3020 [ 883.224014][ T3002] do_syscall_64+0x12c/0x370 [ 883.228619][ T3002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.234534][ T3002] [ 883.236871][ T3002] value changed: 0x0000000000000795 -> 0x0000000000000796 [ 883.243989][ T3002] [ 883.246322][ T3002] Reported by Kernel Concurrency Sanitizer on: [ 883.252485][ T3002] CPU: 1 UID: 0 PID: 3002 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(full) [ 883.262995][ T3002] Tainted: [W]=WARN [ 883.266794][ T3002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 883.277034][ T3002] ================================================================== [ 883.375432][T29113] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 883.388492][T29113] ext4 filesystem being mounted at /65/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 883.968491][T27151] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.