last executing test programs: 11m40.916226407s ago: executing program 32 (id=1911): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r2, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x4, @multicast}, 0x10) sendmmsg(r2, 0x0, 0x0, 0x0) 2m22.762174972s ago: executing program 33 (id=6566): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}]}, 0x1, 0x4c0, &(0x7f0000000f00)="$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") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010300000000000000002b0000000c000600"], 0x20}}, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)={0x7c, r6, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24008045}, 0x4010) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000500)=[{0x14, 0x0, [0x7ff, 0x10001, 0x7, 0x100, 0x9, 0x6, 0x6, 0x1, 0xfe55, 0x7, 0x10001, 0x800, 0x233a, 0x80000001, 0x6, 0x2]}, {0x10, 0x0, [0x7, 0x3, 0xe23, 0x7, 0xf, 0xfffeffff, 0x3, 0x314fd6b6, 0x1ff, 0x7, 0x10001, 0x8, 0x8, 0x800, 0x3, 0x8]}], r3, 0x1, 0x1, 0x90}}, 0x20) creat(&(0x7f0000000200)='./file1\x00', 0x1) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f6400947e570028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000d04fcff", 0x58}], 0x1) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) socket$tipc(0x1e, 0x2, 0x0) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r9, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r10 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) pwritev2(r10, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0x5405, 0x0, 0x0) pwrite64(r8, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 2m13.593494685s ago: executing program 34 (id=6703): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x94) 2m10.073657721s ago: executing program 35 (id=6746): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') pread64(r0, &(0x7f0000000480)=""/177, 0xb1, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x10, 0x7, 0x0, 0x0, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4e20, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xff, 0x0, 0xee00}, {@in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x0, 0x2b}, @in6=@private0, {0x0, 0x0, 0x2, 0x0, 0x10000000, 0x0, 0x6}, {0x0, 0x1, 0xf, 0x5}, {0x40000, 0xfbe2, 0xae8}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x104}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x54}, 0x50) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r4, 0x0) close(r3) fdatasync(r4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={&(0x7f0000000240)="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", &(0x7f0000000880)=""/139, &(0x7f0000000940)="a0257bb097b7df07565ba347a8efb1b7598b419b70483f8f34e0b03cb0697e8a368915514b9d0cafd674efe4f49e26f8497c5f8ee75c8c50b1da0f02e629d42cd72c99555f7ce5243ca31906707a", &(0x7f0000000a00)="2dd374ff6db033f80c6d225eb8f8f6a6b5800d92146154df5d8fe2687eb16e254d4208e26503b072885ce5876018c53c84adfe91c61c609df935490f2626f01b757afb15bcf8592a528bc6d2cb605431b0e65a4d81826080b50779f57a51d7a9b2c7f2d097e34381abe68b99f947e3e83a127fb64d85ae604fcc97d5ccc6e7566da98112c5", 0x6, r1, 0x4}, 0x38) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@private}}, &(0x7f0000000400)=0xffffffffffffff6c) sendmsg$nl_xfrm(r4, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)=@updpolicy={0x120, 0x19, 0x400, 0x70bd2c, 0x25dfdbfe, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in=@rand_addr=0x64010101, 0x4e22, 0x0, 0x4e20, 0x9, 0xa, 0x0, 0x0, 0x1d, 0x0, r5}, {0x1, 0x9, 0x1, 0xb, 0x7, 0x3ff, 0x8000000000000}, {0x8001, 0x8, 0x3, 0x100}, 0x8, 0x6e6bbe, 0x2, 0x1, 0x3, 0x3}, [@user_kmaddress={0x2c, 0x13, {@in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0xa}}, @extra_flags={0x8, 0x18, 0x1000}, @address_filter={0x28, 0x1a, {@in=@broadcast, @in6=@mcast1, 0xa, 0x44, 0x4}}, @mark={0xc, 0x15, {0x35075b}}]}, 0x120}, 0x1, 0x0, 0x0, 0x800}, 0x4004080) pread64(r0, 0x0, 0x0, 0xa4e) 1m59.916758362s ago: executing program 36 (id=6849): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 1m58.504251504s ago: executing program 37 (id=6867): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a01"], 0x40}}, 0x8000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) syz_io_uring_setup(0x3bd4, &(0x7f0000000180)={0x0, 0xcc19, 0x130c8, 0x6, 0x30e}, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r3 = getpgid(r2) syz_pidfd_open(r3, 0x0) socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtaction={0x70, 0x30, 0x0, 0x0, 0x0, {0x9}, [{0x5c, 0x1, [@m_sample={0x58, 0x0, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_RATE={0x8}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x80000}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x4}}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4008085}, 0x20040000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5], 0x90}}, 0x0) 1m55.898932005s ago: executing program 38 (id=6893): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) socket(0x29, 0x1, 0xfffffff9) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "b39625e03be22ead", "8da0640c9e8f6b81143f1a1a6d81ee2b", "3b0e7088", "19a4216dfdbf6602"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "f64e40992f79ecf0", "53c272d8b763f690b35605dff8a4a8d2", "3da2d199", "72392a24199b5903"}, 0x28) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) 1m54.189671575s ago: executing program 39 (id=6902): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4800}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x16, 0xa01}, 0x78}}, 0x0) recvmmsg$unix(r0, &(0x7f00000011c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) (fail_nth: 2) 1m45.938526135s ago: executing program 40 (id=6958): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) io_cancel(0x0, 0x0, &(0x7f0000010280)) 1m44.65356783s ago: executing program 41 (id=6969): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0xa, 0x0) 1m43.2726322s ago: executing program 42 (id=6983): bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r0 = fsopen(&(0x7f0000001140)='hugetlbfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x2], 0x0, 0x0, 0x1, 0x1}}, 0x40) 1m41.954261107s ago: executing program 43 (id=6997): openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) syz_read_part_table(0x635, &(0x7f0000000000)="$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") r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, '\x00', 0xffffffffffffffff}}, 0x20) request_key(&(0x7f0000000480)='logon\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000500)='.\x00', 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r5, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) setsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000003000)={0x2}, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x1, 0x7fff, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x1000, 0x9, 0x0, 0x3, 0x1, 0xfffffffa, 0x0, 0x6, 0x9, 0x4, 0x7, 0x5, 0x100000, 0x762, 0x3, 0xd, 0x0, 0x2b12, 0x100, 0x4, 0x1c00, 0x8, 0x7, 0xbed4, 0x8, 0x8000100, 0x3, 0x0, 0x11000, 0x8, 0x5, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0xa, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x84, 0x2, 0x180000, 0x4007, 0x8b, 0x5, 0x2af, 0xf7, 0x5, 0x2, 0x6, 0x9, 0x4, 0x7, 0x4009, 0x0, 0x4, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x10001, 0x2, 0xffffffff, 0x6, 0x6, 0x9, 0x80000000, 0xfdffffff, 0x2, 0x2, 0x84, 0x100, 0x5, 0x252, 0x81, 0xe, 0x5, 0x20006, 0x5, 0x2, 0xb, 0x2, 0xd9a, 0xd, 0x2a2, 0xfffffffd, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x4, 0x4, 0x401, 0x66cd, 0x8, 0x8, 0x1, 0x1fc, 0xc5c, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="0000023f3201"], 0x138) 1m29.990812873s ago: executing program 44 (id=7047): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, 0x0) 1m26.810575708s ago: executing program 45 (id=7065): r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="aefdda9d240303005a90f57f07703aeff0f64eb9ee07962c220a2e11b44e65d76641cb010852f426072a", 0x2a}, {&(0x7f0000000140)="53000000b79269c1707131dc42e588726b9dd721c4dc9d273d33512f0e973041da845453", 0x24}], 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYRESHEX=r0], 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) write$binfmt_misc(r2, &(0x7f00000002c0)="2320a5cd53e7789a995e1cff10ae52b8870ae6a9e9281ad31b27a53f7bb2267d888df98e86e1bed82b1b083d51d6b9719042942f6eca089ac91ebe964fc65d205543ade0a09c761226a0e08fa50ce79c7b3a9997f9de3948398a1b5cc01aba36351e1a3938c568a1d419ad2c8d1afe990009a434182e34b0e9e48b6bc57c5bebf792facc7d03e10f8bc9cc82403db4b97035db3e805b7ae4bccc1814489b1b8cf88e4c4e2aeedd2e0fb385860adc7b5a1dee5fe03e6fdd1b051e9448a6134ec908e2", 0xc2) splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0) write(r3, &(0x7f0000000040)="26eec4039ed14b954bcb6471204af9dd78dfecae669e2c1ba1c845b273c237dbda1bc4cf5ee458e71929915b4a59c4e7b04c99d87b562c80c94fc6b7bc8c16de2555989098a386d77549e0f302326e8c86cee637668d14770266cdbf1287b909d41de6ac5a0321f3f171d3256dd6bb00cbdc664e7dd4e291c704ffebfe370c5910a047e0e74c974dd2d33e33fc16d7b95b04b3bbba6b7e714ee2bb4e4aa08b7451fbf5e5960f1451c569e8b01bc2a699", 0xb0) 1m26.587465201s ago: executing program 46 (id=7067): r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002100010000000000000000000a0000000000000000000000050019"], 0x24}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x12c}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)='.', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) setsockopt$inet_int(r0, 0x0, 0x19, 0x0, 0x0) 1m19.790956387s ago: executing program 47 (id=7087): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f00000002c0)={[{@barrier}, {@nodioread_nolock}, {@noquota}, {@barrier}, {@auto_da_alloc}, {@nodioread_nolock}]}, 0x1, 0x59c, &(0x7f0000001840)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r0, &(0x7f0000000080)="f724a4c24191853632", 0x9, 0xbfe) write$selinux_create(r0, &(0x7f0000000180)=@objname={'system_u:object_r:urandom_device_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x19, 0x20, './file1\x00'}, 0x53) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100), r0) ftruncate(r0, 0x100) 1m17.66563848s ago: executing program 48 (id=7104): r0 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x0) fchdir(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ec}, 0x94) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r2, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x1, 0x353a, 0x1}}, 0x20) dup(r3) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) 1m17.608240624s ago: executing program 49 (id=7106): r0 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x100c404, &(0x7f0000000200)=ANY=[@ANYBLOB="646f74732d666d61736b3d30303030303030303030303030303030303030d1a82cf32c6e6f646f74732c7569643d", @ANYRESHEX=0xee00, @ANYBLOB=',dots,nodots,gid=', @ANYRESHEX=0xee00, @ANYBLOB=',nodots,nodots,time_offset=0xfffffffffffffc85,nodots,nodots,nodots,check=relaxed,nodots,nfs,nodots,showexec,flush,umask=00000000000000000000007,nodots,dots,\x00'], 0x1, 0x1f5, &(0x7f0000000600)="$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") openat(r0, &(0x7f0000000100)='.\x00', 0x0, 0x6fe9948ef63690ab) 1m16.547469895s ago: executing program 50 (id=7112): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2112, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x0, 0x6, 0x982}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2cc, &(0x7f0000000100), 0xfd, 0x4a5, &(0x7f0000000e00)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)="cdc7afea6bae72b642dbcbbb125562252df92ab1f93a8659f50b0bf5d24aba2ca0cb7ecc67888551b20ea50f5e17cea4d9a38fe6dad7ace21d1ffcbce1cbfdff0b7f", 0x42) 1m5.448902841s ago: executing program 51 (id=7184): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b8000000190001000000000000000000e000000200000000000000000000000000000000000000000000ffff6401010080000000000000000a00000087", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000040fbffffffffffffff0300000000000000000000000000000000000000000000020000dce40000000000000008"], 0xb8}}, 0x2c000010) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x4004) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt(r3, 0x1, 0x38, &(0x7f00000002c0)=""/61, &(0x7f0000000300)=0x3d) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x0, 0x0, 0x9, 0x0, 0x0, 0x2, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x7}}, 0xb8}}, 0x10) 1m0.409014254s ago: executing program 52 (id=7232): r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x54, &(0x7f0000000040), 0x4) socket$inet(0x2, 0x3, 0x8d) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x44, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x528, 0x0, @perf_config_ext={0xe, 0xfffffffffffffffe}, 0x0, 0x40000000, 0xd2, 0x9, 0x103fb, 0x1ff, 0x1ff, 0x0, 0x0, 0x0, 0x400000000000007}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x8) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) write$binfmt_format(r1, &(0x7f0000000100)='0\x00', 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x78, '\x00', 0x0, @fallback=0x30, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) write$qrtrtun(r1, &(0x7f0000000300)="ca0e808bb35b", 0x6) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x30}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) lseek(0xffffffffffffffff, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r5 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) lseek(r4, 0x8, 0x3) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r8, 0x11, 0x1, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 59.704316976s ago: executing program 2 (id=7235): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 59.675565277s ago: executing program 53 (id=7235): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 31.553597524s ago: executing program 8 (id=7479): r0 = syz_socket_connect_nvme_tcp() r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x19, 0x5, 0x6, 0x9, 0xfffffff0, 0x9}) syz_emit_ethernet(0x82, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff1704b45adbde0800450000740001000000000000001e0001ac1414aa0c009078e00000e0460000000000000000110000ac1414aaac141400830300070300443c00030a01013300000000ac1414aa00000000ac1e000100000000ac1414bb000000000000000000000000ac1414bb00000000e0000002000000001600"], 0x0) r2 = syz_io_uring_setup(0x5c6, &(0x7f00000002c0)={0x0, 0x80001021, 0x80, 0x6, 0x110}, &(0x7f0000000340)=0x0, &(0x7f0000000240)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r2, 0x40f5, 0xc49, 0x1, 0x0, 0x0) connect$qrtr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xee00, 0xee00, 0x0) r5 = syz_io_uring_setup(0x4e0, &(0x7f00000000c0)={0x0, 0x79af, 0x1000, 0x3, 0x400252}, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000500)=@IORING_OP_MKDIRAT={0x25, 0x17, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0xf9b7a26b18f77d51}) io_uring_enter(r5, 0x627, 0x4c1, 0x43, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0xa}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0xe, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r10 = syz_io_uring_setup(0x4e0, &(0x7f00000000c0)={0x0, 0x79ae, 0x3180, 0x8000, 0x400252}, &(0x7f0000000640)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r11, r12, &(0x7f0000000500)=@IORING_OP_SYMLINKAT={0x26, 0x12, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r10, 0x627, 0x4c1, 0x43, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e20, @multicast1}, 0x10) socket$netlink(0x10, 0x3, 0x1) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r13 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x20000) fgetxattr(r13, &(0x7f0000000180)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)=""/54, 0x36) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000161e5340"], &(0x7f0000001f80)=""/226, 0x26, 0xe2, 0x2}, 0x28) close(r0) 30.806646607s ago: executing program 8 (id=7484): mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000001c0)=0x2, 0x4) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r1, &(0x7f0000000280)={0x1d, 0x0, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x24000000) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000180)=0x3, 0x12) 29.942031177s ago: executing program 8 (id=7488): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000170000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095"], 0x0, 0xffffffff}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r1, 0x1, 0x4d, 0xffffffffffffffff, &(0x7f00000003c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 29.829968994s ago: executing program 54 (id=7490): mknodat(0xffffffffffffff9c, 0x0, 0x81c0, 0x0) symlinkat(&(0x7f00000000c0)='./file7\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000700)='./file7\x00', 0x0) mknodat(0xffffffffffffff9c, 0x0, 0xc1c0, 0x0) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000880)='./file7\x00', 0x11c0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) linkat(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file7\x00', 0x400) symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000b40)='./file7\x00') renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) 29.019352271s ago: executing program 8 (id=7492): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r4 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r4, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@getchain={0x2c, 0x66, 0x400, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x8, 0xfff3}, {0x6, 0xc}, {0x1, 0xfffc}}, [{0x8, 0xb, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4048006) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 27.413869345s ago: executing program 8 (id=7506): mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x1, @local}, 0x10) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r1, &(0x7f0000000280)={0x1d, 0x0, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x24000000) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000180)=0x3, 0x12) 27.278415452s ago: executing program 8 (id=7498): r0 = socket(0x10, 0x3, 0x0) r1 = getpgrp(0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp(r1, r2, 0x0, r0, r0) perf_event_open(&(0x7f0000000900)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x14, 0x0, 0x11004, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0xcd0b7000) openat$dir(0xffffffffffffff9c, 0x0, 0x40900, 0x90) r3 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0xfd09, 0x1000, 0x2, 0x224}, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r3, 0x47f8, 0x0, 0x0, 0x0, 0x0) 27.218913916s ago: executing program 55 (id=7498): r0 = socket(0x10, 0x3, 0x0) r1 = getpgrp(0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp(r1, r2, 0x0, r0, r0) perf_event_open(&(0x7f0000000900)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x14, 0x0, 0x11004, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0xcd0b7000) openat$dir(0xffffffffffffff9c, 0x0, 0x40900, 0x90) r3 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0xfd09, 0x1000, 0x2, 0x224}, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r3, 0x47f8, 0x0, 0x0, 0x0, 0x0) 24.092997978s ago: executing program 6 (id=7512): r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x152829b66759750a}, &(0x7f0000000180)=0x60) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000008000000000018000380140003801000018004000300080001"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r2, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8, 0x4, '\x00\x00\x00\x00'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, 0x0) 23.613938746s ago: executing program 6 (id=7515): mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000001c0)=0x2, 0x4) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r1, &(0x7f0000000280)={0x1d, 0x0, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x24000000) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000180)=0x3, 0x12) 22.709058838s ago: executing program 6 (id=7529): add_key(&(0x7f0000000a00)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x16, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) 22.256812225s ago: executing program 6 (id=7531): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$eJzs28tvG8UfAPDvOnHS5y/5lfLoAwgURMQjadICPXABgdQLEhIcyjGkaVWaNqgJEq0qGhAqEhfUvwA4IvEXcIILAk4gOILEBQkhVagXCge0aO3dxrGd1Ekcm9afj+RkZnY2M9/dnex41g6gZ41kP5KIHRHx00DEUDW7vMJI9df1axen/7p2cTqJNH35j6RS789rF6eLqsV+2/PMaCmi9F4S+5q0O3/+wump2dmZc3l+fOHMG+Pz5y88cerM1MmZkzNnJ48cOXxo4umnJp9sS5w7s77ufXtu/56jr155cfrYlde++Swr35Fvr42janjDbY7ESHFM0vptD0f8mqYNxbesnTXppL+LHWFN+iIiO13lbPzHUPTF0skbihfe7WrngE2Vpmk62FDaVyQWU+A2lkS3ewB0R3Gjz97/Fq8OTj+67uqz1TdAWdzX81d1S3+U8jrluve37TQSEccW//7o2GI222q2DgEA0F5fZPOfx5vN/0pxV029/0X12dBwRPw/InZFxB0RsTsi7oyo1L07Iu5Z/udv+iRgpC7fOP/5fuu6g2tBNv97Jn+2tXz+V8z+Yrgvz+2sxF9OTpyanTmYH5PRKA9m+YlV2vjy+R8+XGnb0vyv+sraz34v1Sj93l+3QHd8amFqIzHXuvpOxN7+ZvEnN05eEhF7ImLvOv5+dsxOPfrp/pW23zz+VbThOVP6ScQj1fO/GHXxF5LVn0+Ob4nZmYPjxVXR6NvvLr+0Uvsbir8NsvO/ren1fyP+4aT2ee18NC4XL/NBQ8nln99f8T3Neq//geSVSnogL3tramHh3ETEQLLYWD65tG+RL+pn8Y8eaD7+d0X883G+376IyC7ieyPivoi4P+/7AxHxYEQcWOWIfP3cQ6+vP/7NlcV/fE3nf+2JvtNffb5S+62d/8OV1Ghe0sr/v1Y7uJFjBwAAALeKpPIZ+KQ0lq9x7ohSaWys+hn+3bGtNDs3v/DYibk3zx6vflZ+OMqlYqVrqGY9dCJfGy7yk3X5Q5V14zRN062V/Nj03OxmPVMHWrN9hfGf+S3/GLCvc8BtbE0DPNm8fgCd5wYPvcv4h97V6vgvb3I/gM5z/4fe1Wz8X4q43oWuAB3m/g+9q+n4L3W+H0Dnuf9D7zL+oSdt5Hv9qyV2Ha0rGWx593RDrW/JA1vn7r9sytFYLdHXwbbamYhS003liPiP9LBp4sdKotTtbtQmBiOi1cqX1nthrznR5X9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbfJvAAAA//9BL+kV") syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 21.48770177s ago: executing program 6 (id=7526): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") ptrace(0x10, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 21.046220645s ago: executing program 6 (id=7528): mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000001c0)=0x2, 0x4) bind$rds(r0, &(0x7f0000000040)={0x2, 0x1, @local}, 0x10) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000280)={0x1d, r2, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'team0\x00'}) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000180)=0x3, 0x12) 21.023520617s ago: executing program 56 (id=7528): mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000001c0)=0x2, 0x4) bind$rds(r0, &(0x7f0000000040)={0x2, 0x1, @local}, 0x10) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000280)={0x1d, r2, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'team0\x00'}) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000180)=0x3, 0x12) 19.906259242s ago: executing program 5 (id=7537): syz_open_dev$tty20(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[], 0x4, 0x127d, &(0x7f00000011c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x103a42, 0x32) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000500)) gettimeofday(&(0x7f0000000100), &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18050000000004000000000000000000850000007a0400009500000000000000115ed0e22788e543f820f0dffc9caee92db47aeafb63db0821e74d2d28c2080a17edc593cc"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) r3 = creat(0x0, 0x9) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x20, 0x1) close_range(r0, r3, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2c2b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x456b}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setxattr$trusted_overlay_opaque(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x0, 0x0, 0x3) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x10) socket(0x1, 0x803, 0x0) 19.580002491s ago: executing program 5 (id=7540): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) statx(r0, 0x0, 0x1000, 0xf0cb2f4a0c2cfc5d, &(0x7f00000006c0)) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}, {@delalloc}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x3}}]}, 0x1, 0x475, &(0x7f0000000200)="$eJzs289rHFUcAPDvTH60tT8Sa/3RWjVahKCYNGnVHrwoCiIVBT3UY0y2JXTbSBPF1qJRxJMgBT2LR9G/wJsIop4Er548SaFoL209RWZ2Jt1sftlmtxO7nw9M9r2Zt/veN/Pr7XuzAXStoexPErEjIn6PiIFGdmmBocbL1cvnJ69dPj+ZxMLCa38lebkrl89PlkXL920vMsNpRPpxUlSy1OzZcycn6vXamSI/OnfqrdHZs+eeeOfUxInaidrp8SNHDh8ae/qp8SfbEmcW15V978/s3/viGxdenjx24c2fv83au6PY3hxHuwxlgf+9kGvd9mi7K6vSloidTdmkt8K2cEN6IiLbXX35+T8QPXF95w3ECx9V2jigo7J705bVN88vALexJKpuAVCN8kafff8tl1vU9dgULj3b+AKUxX21WBpbeiMtymTfjXZ2qP6hiDg2/8+X2RIdGocAAGj26eQXR/sj4r1r37yU9T0GFrekcU/++kf+d1cxhzIYEXdGxO6IuCsi9kTE3RF52Xsj4r4Ntmd5/ye9uMGPXFPW/3ummNta2v8re38x2FPkdubx9yXHp+u1g8X/ZDj6tmT5sTXq+P753z5bbVtz/y9bsvrLvmDRjou9LQN0UxNzE3mntA0ufRixr3el+JPFmYAkIvZGxL4b++hdZWL6sa/3r1Zo/fjX0IZ5poWvsvDms/jnoyX+UtI8Pzm9bH5ydGvUawdHy6NiuV9+/eTV1eq/ifjTDYS7zKVa47Vp/7cWGUya52tn21n7TR//aX/yej7P3F+se3dibu7MWER/cjTPL1k/fv29Zb4snx3/wwdWPv93F+/J4r8/IrKD+IGIeDAiHira/nBEPBIRB9aI8afn1o8/0ps4/tsgi39qxevf4vHfsv9vPNFz8sfvVqv/v+3/w3lquFiTX//WsVJzsstFawM38r8DAACA/4s0fwY+SUcW02k6MtJ4hn9P3JHWZ2bnHj8+8/bpqcaz8oPRl5YjXQPFeGh9ul4bS+aLT2yMj44XY8XleOmhYtz4855teX5kcqY+VXHs0O22r3L+Z/7sqbp1QIdtW3HteP8tbwhQgdZ59KUzzEm8Ei4GcLvye23oXuuc/2194AzYXNz/oXutdP5/0JI3FwC3J/d/6F7Of+hS6Q9VtwCokPs/dKWN/K6/g4mtm6MZ1SQ2607JExFlIt0U7ZHoUKLqKxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB7/BsAAP//MTHmDA==") syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, 0x0) 18.542382141s ago: executing program 5 (id=7543): r0 = semget$private(0x0, 0x7, 0x180) semtimedop(r0, &(0x7f0000000080)=[{0x1, 0xffff, 0x2000}], 0x5b, 0x0) 17.789882915s ago: executing program 4 (id=7547): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") ptrace(0x10, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 17.588034297s ago: executing program 5 (id=7549): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r4 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r4, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05cefeb4ee6d5ae1071124b2c2fb684f5c7ac05000000c7880f67e775c748f6381a3e01e7f93330b30b90bbb4d2b697899a16f2df4fa2a8f06ac2c5352ddcae2b83672ef3d9f532e55f4e798924ac6332751e737383f6890d2dcfcbdbd41940a64c7b4374674e7bb6dd0d1b8d3d62f6d77b0282e166e2ce4c353d2d4d315a81146bf46a1508ef0d2ddc7d0b447fe17b85b292d13cea2256a16cab12d75a852bc680da7ea837480feb2e0500001e0000000000003bc18c52d0351cd285197b0641569048b5b416ba1c570000000000100083794afff0a9eed63b1226b18c4b455ab222d7ae1be52a22e8ec8bf2c0c7d99770415863f50aa18bcb66061a29bc55105f3482ed752f882d224a386b51836c1b437036b677156e22e174ff516dbab0b2cdf52bee43c4ffffffffffffffffd9487b8663a339b98df63b4bf3e97f02d6f1e7e65f968dd90841506355d9ac40f1b434c8a9b5bd91a70c53a5aadbebd9ed9d0a55bd47a967163e0c02753f8895bfbf1b41b5490667c241068d59983ae1d0f03e650f5357425284b76d793e25a2558fa437e38b8200000000630000000000000000000000000000000000000000000000e911000000000066e073c14bb74617079e0b6ecfc830db14244567fd8f4e4e5903eaf983786e28295783f130b95dc37f59a658000e88047db7783ce8a9cba6c255902cfb83946ea3f5f7a8cee911b2b37ae4b01e65ea86d5ea7ae17b2a9bc250c9b8fc9fbc04617939bdd13457954172d18701768f8a461bee740f2d82ae566d2e30a93ad2b201a6d16a93c75a950cc437e7f25d3aadddb8edd028d84490b6bafd636aa4fb482a8a4b3987dafe58e742448c4b36b03790090198145dee533257bb9050554f8cace210a5bc5c768f83e99019f7c00ff9ca679768dbba3f7d21c545c99c2f7688f7030fe37121d625d1f81018feb74c9d48eebdf1702550b097271ab9bd38c62f4b31fd9482c05ba0", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@getchain={0x2c, 0x66, 0x400, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x8, 0xfff3}, {0x6, 0xc}, {0x1, 0xfffc}}, [{0x8, 0xb, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4048006) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) 16.057460936s ago: executing program 4 (id=7552): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) statx(r0, 0x0, 0x1000, 0xf0cb2f4a0c2cfc5d, &(0x7f00000006c0)) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}, {@delalloc}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x3}}]}, 0x1, 0x475, &(0x7f0000000200)="$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") syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, 0x0) 16.044962256s ago: executing program 5 (id=7561): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$eJzs3MGLG1UcB/Bf19rW1N2sWqstiA+96GVo9uBFL0G2IA0obSO0gjB1JxoyJiETFiJi9eTVv0M8ehPEm1724t/gbS8eexBHTNR2l3hYdDewfD6X/OD3vuQ9BgbeMG/23/jq40Gvynr5NNbOnIm1cUR6kCLFWvzt83j19R9/euHWnbs32p3O9s2Urrdvt15LKW28+P17n37z0g/Ti+9+u/Hd+djbfH//161f9i7vXdn//fZH/Sr1qzQcTVOe7o1G0/xeWaSdfjXIUnqnLPKqSP1hVUwO9HvlaDyepXy4s94YT4qqSvlwlgbFLE1HaTqZpfzDvD9MWZal9UbwX3S/flDXdURdPx7noq7r+oloxMV4MtZjI5qxGU/F0/FMXIpn43I8F8/HlfmoVc8bAAAAAAAAAAAAAAAAAAAAThfn/wEAAAAAAAAAAAAAAAAAAGD1bt25e6Pd6WzfTOlCRPnlbne3u/hd9Nu96EcZRVyLZvwW89P/C4v6+lud7WtpbjO+KO//lb+/233sYL41/5zA0nxrkU8H8+ej8Wh+K5pxaXl+a2n+Qrzy8iP5LJrx8wcxijJ24s/sw/xnrZTefLtzKH91Pg4AAABOgyz9Y+n+Pcv+rb/IH+H5wKH99dm4ena1ayeimn0yyMuymBxbcS6O/S8UCsX/XKz6zsRJeHjRVz0TAAAAAAAAAAAAjuIkXidc9RoBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA/2IFjAQAAAABh/tZpdGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBVAAAA//8xgdSv") ptrace(0x10, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 15.98464554s ago: executing program 5 (id=7554): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$setregset(0x4205, r1, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b0451a6cc55c", 0x98}) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000024c0)=ANY=[], 0x14}}, 0x4044003) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ptrace$setregset(0x4205, r1, 0x1, &(0x7f00000001c0)={0x0}) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0xc0, &(0x7f0000000100)=ANY=[@ANYBLOB="646f74732c6e66732c71756965742c6e6f646f74732c636865636b3d7374726963742c6e66733d7374616c655f72772c646f74732c6572726f72733d636f6e74696e7565008000000000000074732c00"], 0x1, 0x23d, &(0x7f0000000d00)="$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") perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}]}, 0x1, 0x4c0, &(0x7f0000000f00)="$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") r3 = creat(&(0x7f0000000200)='./file1\x00', 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r5, 0x10f, 0x85) unshare(0x2c020400) r6 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) pwritev2(r6, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0x5405, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, 0x0, 0x24000050) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x44, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x0, 0x20}}}}, [@NL80211_ATTR_SSID={0x12, 0x34, @random="012b83ff05b0292bbe10b24f8eb7"}, @NL80211_ATTR_DISABLE_HT={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000411}, 0x4000) sendmsg$NL80211_CMD_DEL_PMKSA(r3, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)={0x64, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @random="7c08e0861c5f"}, @NL80211_ATTR_PMK={0x14, 0xfe, "c4197cb71ba21a1e99ff85ecc617fdbc"}, @NL80211_ATTR_MAC={0xa, 0x6, @random="b2b1db2c4d7e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x47}]}, 0x64}, 0x1, 0x0, 0x0, 0x4800}, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 15.952103262s ago: executing program 57 (id=7554): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$setregset(0x4205, r1, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b0451a6cc55c", 0x98}) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000024c0)=ANY=[], 0x14}}, 0x4044003) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ptrace$setregset(0x4205, r1, 0x1, &(0x7f00000001c0)={0x0}) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0xc0, &(0x7f0000000100)=ANY=[@ANYBLOB="646f74732c6e66732c71756965742c6e6f646f74732c636865636b3d7374726963742c6e66733d7374616c655f72772c646f74732c6572726f72733d636f6e74696e7565008000000000000074732c00"], 0x1, 0x23d, &(0x7f0000000d00)="$eJzs3cFq1EAcBvB/220be7Fn8RDw4qmobxBkBTEgrOSgJwPVSytCeome9jF8Bh/Jx+ipt4hN6NZUPUjadJvfD5Z87MfAzGVnDzO77x9+Ojr8fPKx+fEtkiSNWcQyziL2YzO2orXRPTfP805ctgwAYN0sFmU29hwY0MbVt6oqK7cjYvdKU3y/mUkBAAAAAAAAAAAwNOf/AWB6nP+/+6oqK/e672+/c/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGM9Z09xv/vEae34AwPDs/wAwPfZ/AJge+z8ATM+bt+9eZXk+X6RpEnG6rIu6aJ9t/+JlPn+SnttfjTqt62K7y/n8adun/X6vG//sj/1OPH7U9r+656/zXr8bh9e9eAAAAAAAAAAAAAAAAAAAALglDtILvfv9W21/8Le+TZd+H6B3f38WD2Y3tgwAAAAAAAAAAAAAAAAAAABYaydfvh6Vx8cfKkG4CPfiP0YlcTsmLwwSxv5kAgAAAAAAAAAAAAAAAACA6Vld+h17JgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwntX//19fGHuNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDT8DAAA//8GmZGk") perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}]}, 0x1, 0x4c0, &(0x7f0000000f00)="$eJzs3ctvW1UaAPDPdpMmaWb6mNGo7WimlTpS56HmqVGTmdnMaoZFJUQlNiCVkLghxImj2ClN1EUCuy5YIBBIiAV7/gI2dEWFhFjDHrFARVCCBEhIRvfabhM3DhakMc39/aTbnPuwv3NifafnHt+bG0BmnU3+yUUMRsRHEXG0vrr9gLP1H5t3b0wnSy5qtctf5tLjkvXmoc3XHYmI9Yjoi4gn/hfxbO7BuJXVtfmpUqm43Fgfri4sDVdW1y7MLUzNFmeLi6MTFycnJ0bGxyb3rK03X37+5qV3H+t959uX7tx+5f33kmoNNvZtbcdeqje9J45v2XYoIv7zMIJ1QaHRnv5uV4SfJfn8fhcR59L8PxqF9NMEsqBWq9V+qB1ut3u9BhxY+XQMnMsPRUS9nM8PDdXH8L+PgXypXKn+42p5ZXGmPlY+Fj35q3Ol4kjjXOFY9OSS9dG0fH99rGV9PCIdA79a6E/Xh6bLpZn97eqAFkda8v+bQj3/gYxwyg/ZJf8hu+Q/ZJf8h+yS/5Bd8h+yS/5Ddsl/yC75D9lV6HYFgK7x/z9k0uOXLiVLrXn/+8y11ZX58rULM8XK/NDCyvTQdHl5aWi2XJ5N79lZ+Kn3K5XLS6P/jJXrw9VipTpcWV27slBeWaxeSe/rv1Ls2ZdWAZ04fubWJ7mIWP9Xf7okehv75CocbLVaLrp9DzLQHab+ILtM/UF2OccHWv9Eb+u4oK/dC5fuzxcCj5Z8tysAdM35U77/g6wy/w/ZZf4fsssYH9jhEX3b7Db/DzyazP9Ddg22ef7Xb7Y8u2skIn4bER8Xeg43n/UFHAT5z3ON8f/5o38ZbN3bm/su/YqgNyJeePPy69enqtXl0WT7V/e2V99obB/b8sK2JwxAtzTztJnHAEB2bd69Md1c9jPuF/+tX4TwYPxDjbnJvvQ7yoHN3LZrFXJ7dO3C+kZEnNwpfq7xvPP6iczAZuGB+CcaP3P1t0jreyh9bvr+xD+1Jf6ft8Q//Yt/K5ANt5L+Z2Sn/MunOR338m97/zO4R9dOtO//8vf6v0Kb/u9MhzGee+vFz9rG34g4vWP8Zry+NFZr/KRu5zuMf+fpJ//Qbl/t7fr77BS/KSkNVxeWhiuraxfmFjZmi7PFxdGJi5OTEyPjY5PDV+dKxT8daR//3yc/vL1b+wca8Xui8/Yn2/7WYfu//+MHT53dJf5fz+38+Z/YJX5/RPy9w/hfj336TLt9SfyZNr///C7xk23jHcavvPb/wx0eCgDsg8rq2vxUqVRcVlBQ6Eph49dRjZZCt3sm4GGrrCan5knSd7smAAAAAAAAAAAAQKf243LibrcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAg+DEAAP//KbnRCQ==") r3 = creat(&(0x7f0000000200)='./file1\x00', 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r5, 0x10f, 0x85) unshare(0x2c020400) r6 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) pwritev2(r6, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0x5405, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, 0x0, 0x24000050) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x44, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x0, 0x20}}}}, [@NL80211_ATTR_SSID={0x12, 0x34, @random="012b83ff05b0292bbe10b24f8eb7"}, @NL80211_ATTR_DISABLE_HT={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000411}, 0x4000) sendmsg$NL80211_CMD_DEL_PMKSA(r3, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)={0x64, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @random="7c08e0861c5f"}, @NL80211_ATTR_PMK={0x14, 0xfe, "c4197cb71ba21a1e99ff85ecc617fdbc"}, @NL80211_ATTR_MAC={0xa, 0x6, @random="b2b1db2c4d7e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x47}]}, 0x64}, 0x1, 0x0, 0x0, 0x4800}, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 15.603133422s ago: executing program 4 (id=7558): r0 = semget$private(0x0, 0x7, 0x180) semtimedop(r0, &(0x7f0000000080)=[{0x1, 0xffff, 0x2000}], 0x5b, 0x0) 14.633142918s ago: executing program 4 (id=7566): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregset(0x4205, r5, 0x201, &(0x7f00000001c0)={0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 14.352217355s ago: executing program 0 (id=7567): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000840)='./bus\x00', 0x10, &(0x7f0000000540), 0x1, 0x7cc, &(0x7f00000022c0)="$eJzs3ctrW1caAPDvyvJjnGTsgYFJZmUYmDGEyOOMJ5mBLlK6KIUGAu26iZEVk1q2giWH2BjSUArdFNrQRaHdZJ226a7bPrbtv9BuSikJaeuEJnRRXK4esRxLjpzYchP/fnCtc+7D53z3ce6R7kEKYM8aSf9kIg5FxNtJxFB9fhIRvdVUNuJEbb27K8v5dEpidfWln5LqOndWlvPRtE0MDsa+euZgRHzxRsThzMZyy4tLM5PFYmG+nh+rzJ4fKy8uHTk3OzldmC7MHRufmDh6/L/H+7cv1l++Xtp/853n//XxiV9f/9v1t75M4kTsry9rjmO7jMRIbZ9Eb7oL13luuwvbZcluV4BHkl6aPbWrPA7FUDb6Ot82u5MVAwB2zKWIWAUA9pjE/R8A9pjG5wB3Vpbz6bR6aXc/j+i2W89GxEAt/sbzzdqSbP2Z3UD1OejgnWTd844kIoa3ofyRiPjg01c+TKfYoeeQAK28djkizgyPNNr/tfYn2TBmoabzARn/biQ2GRww8kBe+wfd81na//nfWv9v7frL3O//RIv+T3+La/dRjMT6EScbr//MjW0opq20//dM79rYtrtN8dcN99RzB6p9vt7k7LliIW3b/hwRo9Hbn+bHNylj9PZvt9fNaIq4uf/385VXr6Xlp69ra2RuZB9ocqcmK5OPG3fDrcsRf8+2ij+5f/yTNv3fUx2W8cL/33y/3bI0/jTexrQ+/p0fVbZ6NeKf0Tr+hmSz8YnHxqqnw1jjpGjhk+/eG2xXfvPxT6e0/Np7gQPbH2wL6fEf3Dz+4aR5vGZ562V8dXXo83bL2sff0Pr870terqYbl9LFyUplfjyiL3lx4/yja9s28o310/hH/9H6+t/s/E/fE57pMP7szR8/emj8jRkb4q8b6LCwLUrjn9rS8d964vrdmZ525Xd2/CfSRM9ofU4n7d9m9eprWueRdxwAAAAAAAAAAAAAAAAAAAAAAAAAbEEmIvZHksndT2cyuVxUf8P7rzGYKZbKlcNnSwtzU1H9rezh6M00vupyqOn7UMfr34ffyB99IP+fiPhLRLzb/6dqPpcvFad2O3gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAqNvX5vf/Uz/0117v7WoNAYAdMfDQNW4XulIRAKBrHn7/j4j+na8HANA9Hd3/AYCnivs/AOw97v8AsPcMRGR3uw4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA81U6dPJlOq/dWlvNpfurC4sJM6cKRqUJ5Jje7kM/lS/Pnc9Ol0nSxkMuXZps2/abV/yuWSucnYm7h4lilUK6MlReXTs+WFuYqp8/NTk4XThd6uxYZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHSuvLg0M1ksFubriWuDEevndCnRU69QVwt9IhOrQ7U99Uepz84nvj/y7cHN1rmy4TSWeOzEbrZKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE+O3wMAAP//mc0dAw==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xa142, 0x189) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40009, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0xc4042, 0x1ff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x25dfdbfc, {{@in=@multicast1, @in6=@mcast2, 0x4, 0xb6e, 0x4e21, 0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0xee00}, {@in=@loopback, 0x4d4, 0x32}, @in=@rand_addr=0x64010101, {0x0, 0x0, 0x9, 0x8000000000000001, 0xfffffffeffffffff, 0x10, 0x8001, 0x543}, {0x4, 0x7fffffffffffffff, 0xb, 0xfffffffffffffffd}, {0x0, 0xe}, 0x70bd2c, 0x3500, 0x2, 0x0, 0x0, 0x70}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x40}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x880}, 0x2094) socket$kcm(0x2b, 0x1, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{@fixed}]}) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'veth1_vlan\x00', @random="2b0100004ec6"}) unshare(0x2c020400) writev(r0, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x64000}], 0x1) 13.349708423s ago: executing program 0 (id=7572): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xfffffffffffffffb, 0x40002) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0x1, 0x1}) 13.301713466s ago: executing program 4 (id=7573): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x2, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./bus\x00', 0x2004006, &(0x7f0000001180)=ANY=[@ANYBLOB='rodir,utf8=0,nonumtail=0,uni_xlate=1,utf8=1,shortname=mixed,utf8=0,shortname=mixed,shortname=winnt,iocharset=mn,shortname=winnt,uni_xlate=1,iocharset=default,shortname=lower,shortname=mixed,\x00\x00\x00\x00\x00\x00\x00'], 0x25, 0x352, &(0x7f0000000c80)="$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") munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x101000, 0x108) getdents64(r3, &(0x7f00000001c0)=""/43, 0x2b) getdents64(r3, &(0x7f0000001f80)=""/4102, 0x1006) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=@newlink={0x70, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00'}, @IFLA_GRE_LOCAL={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x15}}, @IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x43}]}}}]}, 0x70}}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}, @in={0x2, 0x4e23, @multicast2}], 0x2c) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x5}, 0x1c, &(0x7f0000000740)=[{&(0x7f0000000340)="6e63e22a", 0x4}], 0x1}}], 0x1, 0x40044) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000140)={0x5750c0, 0xb6}, 0x18) 13.115239767s ago: executing program 0 (id=7575): socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) timerfd_create(0x7, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$ttys(0xc, 0x2, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[], 0x7c}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d45bd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0x4005, 0xb, 0x3, 0x1, 0x1000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x28, 0x4, 0x0, 0x0, 0x0, 0x7, 0x4401e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8000000000000000}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x2}, 0x2, r4}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendmsg$NFT_BATCH(r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) capset(0x0, 0x0) signalfd4(r0, 0x0, 0x0, 0x80000) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x680bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xef, 0x3d27}, 0x400, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendmmsg(r5, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x34000, 0x0) 12.946011336s ago: executing program 4 (id=7576): r0 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1) 12.901023859s ago: executing program 58 (id=7576): r0 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1) 12.89843826s ago: executing program 0 (id=7578): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$eJzs28tvG8UfAPDvOnHS5y/5lfLoAwgURMQjadICPXABgdQLEhIcyjGkaVWaNqgJEq0qGhAqEhfUvwA4IvEXcIILAk4gOILEBQkhVagXCge0aO3dxrGd1Ekcm9afj+RkZnY2M9/dnex41g6gZ41kP5KIHRHx00DEUDW7vMJI9df1axen/7p2cTqJNH35j6RS789rF6eLqsV+2/PMaCmi9F4S+5q0O3/+wump2dmZc3l+fOHMG+Pz5y88cerM1MmZkzNnJ48cOXxo4umnJp9sS5w7s77ufXtu/56jr155cfrYlde++Swr35Fvr42janjDbY7ESHFM0vptD0f8mqYNxbesnTXppL+LHWFN+iIiO13lbPzHUPTF0skbihfe7WrngE2Vpmk62FDaVyQWU+A2lkS3ewB0R3Gjz97/Fq8OTj+67uqz1TdAWdzX81d1S3+U8jrluve37TQSEccW//7o2GI222q2DgEA0F5fZPOfx5vN/0pxV029/0X12dBwRPw/InZFxB0RsTsi7oyo1L07Iu5Z/udv+iRgpC7fOP/5fuu6g2tBNv97Jn+2tXz+V8z+Yrgvz+2sxF9OTpyanTmYH5PRKA9m+YlV2vjy+R8+XGnb0vyv+sraz34v1Sj93l+3QHd8amFqIzHXuvpOxN7+ZvEnN05eEhF7ImLvOv5+dsxOPfrp/pW23zz+VbThOVP6ScQj1fO/GHXxF5LVn0+Ob4nZmYPjxVXR6NvvLr+0Uvsbir8NsvO/ren1fyP+4aT2ee18NC4XL/NBQ8nln99f8T3Neq//geSVSnogL3tramHh3ETEQLLYWD65tG+RL+pn8Y8eaD7+d0X883G+376IyC7ieyPivoi4P+/7AxHxYEQcWOWIfP3cQ6+vP/7NlcV/fE3nf+2JvtNffb5S+62d/8OV1Ghe0sr/v1Y7uJFjBwAAALeKpPIZ+KQ0lq9x7ohSaWys+hn+3bGtNDs3v/DYibk3zx6vflZ+OMqlYqVrqGY9dCJfGy7yk3X5Q5V14zRN062V/Nj03OxmPVMHWrN9hfGf+S3/GLCvc8BtbE0DPNm8fgCd5wYPvcv4h97V6vgvb3I/gM5z/4fe1Wz8X4q43oWuAB3m/g+9q+n4L3W+H0Dnuf9D7zL+oSdt5Hv9qyV2Ha0rGWx593RDrW/JA1vn7r9sytFYLdHXwbbamYhS003liPiP9LBp4sdKotTtbtQmBiOi1cqX1nthrznR5X9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbfJvAAAA//9BL+kV") syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11.640386203s ago: executing program 0 (id=7585): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfffffffd, @empty, 0x5}}}, 0x30) (fail_nth: 3) 10.706842567s ago: executing program 0 (id=7590): ftruncate(0xffffffffffffffff, 0x6000000) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000500)) gettimeofday(&(0x7f0000000100), &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18050000000004000000000000000000850000007a0400009500000000000000115ed0e22788e543f820f0dffc9caee92db47aeafb63db0821e74d2d28c2080a17edc593cc"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) r3 = creat(0x0, 0x9) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x20, 0x1) close_range(r0, r3, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2c2b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x456b}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setxattr$trusted_overlay_opaque(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x0, 0x0, 0x3) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x10) socket(0x1, 0x803, 0x0) 10.663650109s ago: executing program 7 (id=7591): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) syz_open_dev$tty1(0xc, 0x4, 0x2) (async) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_BLANKSCREEN(r1, 0x560e, &(0x7f0000000000)) (async) ioctl$TIOCL_BLANKSCREEN(r1, 0x560e, &(0x7f0000000000)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x611, 0xe76, 0x9}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x8, 0x41}) (async) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x8, 0x41}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0x32600) ftruncate(r2, 0x7fff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@ipv4, 0x0}, &(0x7f0000000180)=0x14) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xa, 0xb, 0x42, 0x3e, 0x42}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x12, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x0, 0x5, 0x16, 0x1, 0xc}, @map_fd={0x18, 0x3, 0x1, 0x0, r2}, @generic={0xd, 0x1, 0x0, 0x3, 0x8000}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x56}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x51, &(0x7f00000002c0)=""/81, 0x40f00, 0x11, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000380)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x0, 0x37ec, 0x27}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000440)=[r6], &(0x7f0000000480)=[{0x4, 0x3, 0x3, 0x8}, {0x5, 0x2, 0xc, 0x2}, {0x4, 0x5, 0x7, 0x1}, {0x1, 0x4, 0xf, 0x5}, {0x2, 0x3, 0x0, 0x2}, {0x2, 0x5, 0xe, 0x4}, {0x5, 0x2, 0x1, 0xc}, {0x1, 0x5, 0xb, 0x3}], 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="6f11ba816056a1827a33ae059cf3", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) 10.632998642s ago: executing program 59 (id=7590): ftruncate(0xffffffffffffffff, 0x6000000) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000500)) gettimeofday(&(0x7f0000000100), &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18050000000004000000000000000000850000007a0400009500000000000000115ed0e22788e543f820f0dffc9caee92db47aeafb63db0821e74d2d28c2080a17edc593cc"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) r3 = creat(0x0, 0x9) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x20, 0x1) close_range(r0, r3, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2c2b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x456b}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setxattr$trusted_overlay_opaque(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x0, 0x0, 0x3) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x10) socket(0x1, 0x803, 0x0) 10.474263891s ago: executing program 7 (id=7594): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05cefeb4ee6d5ae1071124b2c2fb684f5c7ac05000000c7880f67e775c748f6381a3e01e7f93330b30b90bbb4d2b697899a16f2df4fa2a8f06ac2c5352ddcae2b83672ef3d9f532e55f4e798924ac6332751e737383f6890d2dcfcbdbd41940a64c7b4374674e7bb6dd0d1b8d3d62f6d77b0282e166e2ce4c353d2d4d315a81146bf46a1508ef0d2ddc7d0b447fe17b85b292d13cea2256a16cab12d75a852bc680da7ea837480feb2e0500001e0000000000003bc18c52d0351cd285197b0641569048b5b416ba1c570000000000100083794afff0a9eed63b1226b18c4b455ab222d7ae1be52a22e8ec8bf2c0c7d99770415863f50aa18bcb66061a29bc55105f3482ed752f882d224a386b51836c1b437036b677156e22e174ff516dbab0b2cdf52bee43c4ffffffffffffffffd9487b8663a339b98df63b4bf3e97f02d6f1e7e65f968dd90841506355d9ac40f1b434c8a9b5bd91a70c53a5aadbebd9ed9d0a55bd47a967163e0c02753f8895bfbf1b41b5490667c241068d59983ae1d0f03e650f5357425284b76d793e25a2558fa437e38b8200000000630000000000000000000000000000000000000000000000e911000000000066e073c14bb74617079e0b6ecfc830db14244567fd8f4e4e5903eaf983786e28295783f130b95dc37f59a658000e88047db7783ce8a9cba6c255902cfb83946ea3f5f7a8cee911b2b37ae4b01e65ea86d5ea7ae17b2a9bc250c9b8fc9fbc04617939bdd13457954172d18701768f8a461bee740f2d82ae566d2e30a93ad2b201a6d16a93c75a950cc437e7f25d3aadddb8edd028d84490b6bafd636aa4fb482a8a4b3987dafe58e742448c4b36b03790090198145dee533257bb9050554f8cace210a5bc5c768f83e99019f7c00ff9ca679768dbba3f7d21c545c99c2f7688f7030fe37121d625d1f81018feb74c9d48eebdf1702550b097271ab9bd38c62f4b31fd9482c05ba0", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") ptrace(0x10, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 8.314487697s ago: executing program 7 (id=7601): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") ptrace(0x10, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 7.497982994s ago: executing program 7 (id=7602): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r4 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r4, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@getchain={0x2c, 0x66, 0x400, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x8, 0xfff3}, {0x6, 0xc}, {0x1, 0xfffc}}, [{0x8, 0xb, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4048006) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) 5.393763616s ago: executing program 7 (id=7615): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r4 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r4, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@getchain={0x2c, 0x66, 0x400, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x8, 0xfff3}, {0x6, 0xc}, {0x1, 0xfffc}}, [{0x8, 0xb, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4048006) open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 5.086372664s ago: executing program 7 (id=7617): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x200, 0xffffffff}, 0x102006, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x80, 0xffffffffffffffff, 0x0, 0x7}, 0x38) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x0, r0}, 0x68) prlimit64(0x0, 0x6, &(0x7f0000000140)={0x0, 0x4}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208000004"], 0x48) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x2000000, &(0x7f0000000240)=ANY=[@ANYBLOB="747a3d5554432c756e695f786c6174653d312c646973636172642c757466383d302c756e695f786c6174653d312c726f6469722c757466383d312c00ee284a015f4d897833fb742704c70630c7e3804afc5fe645f66ca614e17a7c3e5fcafc620b6af31b1896c6c50b36c73b7ad41b37f80916dee79d4e30902beed2"], 0x1, 0x247, &(0x7f0000000840)="$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") creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x9) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 5.085810864s ago: executing program 9 (id=7618): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0xd9a, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0xce0, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(0xffffffffffffffff) 5.026637848s ago: executing program 60 (id=7617): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x200, 0xffffffff}, 0x102006, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x80, 0xffffffffffffffff, 0x0, 0x7}, 0x38) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x0, r0}, 0x68) prlimit64(0x0, 0x6, &(0x7f0000000140)={0x0, 0x4}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208000004"], 0x48) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x2000000, &(0x7f0000000240)=ANY=[@ANYBLOB="747a3d5554432c756e695f786c6174653d312c646973636172642c757466383d302c756e695f786c6174653d312c726f6469722c757466383d312c00ee284a015f4d897833fb742704c70630c7e3804afc5fe645f66ca614e17a7c3e5fcafc620b6af31b1896c6c50b36c73b7ad41b37f80916dee79d4e30902beed2"], 0x1, 0x247, &(0x7f0000000840)="$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") creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x9) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 5.024293458s ago: executing program 9 (id=7620): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={r3}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x442, 0x1e7) mknodat$null(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x103) inotify_init1(0x80000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r4) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)={0x1c, r5, 0x1, 0x703d25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40400c4}, 0x8842) 5.023947118s ago: executing program 2 (id=7577): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$eJzs28tvG8UfAPDvOnHS5y/5lfLoAwgURMQjadICPXABgdQLEhIcyjGkaVWaNqgJEq0qGhAqEhfUvwA4IvEXcIILAk4gOILEBQkhVagXCge0aO3dxrGd1Ekcm9afj+RkZnY2M9/dnex41g6gZ41kP5KIHRHx00DEUDW7vMJI9df1axen/7p2cTqJNH35j6RS789rF6eLqsV+2/PMaCmi9F4S+5q0O3/+wump2dmZc3l+fOHMG+Pz5y88cerM1MmZkzNnJ48cOXxo4umnJp9sS5w7s77ufXtu/56jr155cfrYlde++Swr35Fvr42janjDbY7ESHFM0vptD0f8mqYNxbesnTXppL+LHWFN+iIiO13lbPzHUPTF0skbihfe7WrngE2Vpmk62FDaVyQWU+A2lkS3ewB0R3Gjz97/Fq8OTj+67uqz1TdAWdzX81d1S3+U8jrluve37TQSEccW//7o2GI222q2DgEA0F5fZPOfx5vN/0pxV029/0X12dBwRPw/InZFxB0RsTsi7oyo1L07Iu5Z/udv+iRgpC7fOP/5fuu6g2tBNv97Jn+2tXz+V8z+Yrgvz+2sxF9OTpyanTmYH5PRKA9m+YlV2vjy+R8+XGnb0vyv+sraz34v1Sj93l+3QHd8amFqIzHXuvpOxN7+ZvEnN05eEhF7ImLvOv5+dsxOPfrp/pW23zz+VbThOVP6ScQj1fO/GHXxF5LVn0+Ob4nZmYPjxVXR6NvvLr+0Uvsbir8NsvO/ren1fyP+4aT2ee18NC4XL/NBQ8nln99f8T3Neq//geSVSnogL3tramHh3ETEQLLYWD65tG+RL+pn8Y8eaD7+d0X883G+376IyC7ieyPivoi4P+/7AxHxYEQcWOWIfP3cQ6+vP/7NlcV/fE3nf+2JvtNffb5S+62d/8OV1Ghe0sr/v1Y7uJFjBwAAALeKpPIZ+KQ0lq9x7ohSaWys+hn+3bGtNDs3v/DYibk3zx6vflZ+OMqlYqVrqGY9dCJfGy7yk3X5Q5V14zRN062V/Nj03OxmPVMHWrN9hfGf+S3/GLCvc8BtbE0DPNm8fgCd5wYPvcv4h97V6vgvb3I/gM5z/4fe1Wz8X4q43oWuAB3m/g+9q+n4L3W+H0Dnuf9D7zL+oSdt5Hv9qyV2Ha0rGWx593RDrW/JA1vn7r9sytFYLdHXwbbamYhS003liPiP9LBp4sdKotTtbtQmBiOi1cqX1nthrznR5X9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbfJvAAAA//9BL+kV") ptrace(0x10, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 4.921916394s ago: executing program 9 (id=7621): r0 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000000)=0x6568, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6c370c8900083c0120010000000000000000000000000000fe8000000000000000000000000000aaff"], 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) mmap$IORING_OFF_SQES(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x10000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x9f69a7a086f70ae8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x28, 0x8, 0x0, 0x5, 0x0, 0x9, 0x64a29, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b81, 0x6, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x2, 0x6, 0x0, 0xec5, 0x6, 0x40, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) socket(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="7c0000001000010400"/20, @ANYRES32=r11, @ANYBLOB="00000000000000005c001280110001006272696467655f736c61766500000000440005800500050000000000050020000100000005000800000000000600", @ANYRES32=r9], 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmmsg(r8, &(0x7f0000000000), 0x400000000000235, 0x0) setns(r4, 0x8020000) r12 = socket$inet(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xb, 0x0, 0xf0, 0xf8, 0xf0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller1\x00', {}, {}, 0x11}, 0xb000000, 0xd8, 0xf8, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x8}}, @common=@unspec=@quota={{0x38}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0x8, 0x72, 0x80000}, 0x20) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 4.564342535s ago: executing program 9 (id=7622): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregset(0x4205, r5, 0x201, &(0x7f00000001c0)={0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 3.544652254s ago: executing program 9 (id=7626): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000300), r2) sendmsg$NFC_CMD_DEP_LINK_DOWN(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010025bd7010fddbdf250502000008000100", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x20040080}, 0x20000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e20, @rand_addr=0x64010101}], 0x10) listen(r0, 0xfff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) 2.954567828s ago: executing program 2 (id=7630): pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0xf3a, 0x0) vmsplice(r2, &(0x7f0000000380)=[{&(0x7f0000013580)='\r', 0x1}], 0x1, 0x0) tee(r0, r2, 0x8f5, 0x100000000000000) r3 = syz_io_uring_setup(0x6dc6, &(0x7f0000000140)={0x0, 0x80001914, 0xc4, 0x3, 0x2c7}, &(0x7f00000001c0), &(0x7f0000000400)) io_uring_register$IORING_REGISTER_RESIZE_RINGS(r0, 0x21, &(0x7f00000004c0)={0x0, 0xcae1, 0x800, 0x1, 0x39f, 0x0, r3}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}]}, 0x1, 0x4c0, &(0x7f0000000f00)="$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") creat(&(0x7f0000000200)='./file1\x00', 0x1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r7, 0x10f, 0x85) unshare(0x2c020400) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)) r8 = openat(0xffffffffffffff9c, 0x0, 0x143142, 0x40) pwritev2(r8, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0x5405, 0x0, 0x0) pwrite64(r6, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 2.718212342s ago: executing program 9 (id=7632): r0 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x6c000200) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1b05bb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x7f}, 0x6025, 0x80004005, 0xb, 0x3, 0x1, 0x20005, 0xb, 0x0, 0x0, 0x0, 0xebb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0xdbfa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xe, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x0, 0x7fff000a}]}) creat(&(0x7f00000002c0)='./file0\x00', 0x0) kexec_load(0xf5, 0x1, &(0x7f0000000b80)=[{&(0x7f00000004c0)=')', 0x1, 0x0, 0x1000}], 0x0) truncate(0x0, 0x8fff5) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000001000fdff2dbd70f9ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0008000023020000280012800b0001006272696467650000180002800600090000"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) 2.711494292s ago: executing program 61 (id=7632): r0 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x6c000200) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1b05bb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x7f}, 0x6025, 0x80004005, 0xb, 0x3, 0x1, 0x20005, 0xb, 0x0, 0x0, 0x0, 0xebb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0xdbfa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xe, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x0, 0x7fff000a}]}) creat(&(0x7f00000002c0)='./file0\x00', 0x0) kexec_load(0xf5, 0x1, &(0x7f0000000b80)=[{&(0x7f00000004c0)=')', 0x1, 0x0, 0x1000}], 0x0) truncate(0x0, 0x8fff5) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000001000fdff2dbd70f9ffffffffffffff00", @ANYRES32=0x0, @ANYBLOB="0008000023020000280012800b0001006272696467650000180002800600090000"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) 2.661690895s ago: executing program 3 (id=7636): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={r3}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x442, 0x1e7) mknodat$null(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x103) r4 = inotify_init1(0x80000) inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x60006a4) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r5) sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)={0x1c, r6, 0x1, 0x703d25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40400c4}, 0x8842) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000140), 0xc0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB="19eaffd0fd11c913d762fcd48ec5d4c5c253cadde2e1e8428a7bf941673ff7a2313c410fc8db9a1825aac2b03ab32ad4046f26ed1963eeee7df815737180ea6840eb233d155de69784f138df1e1c8f7e13ff31446accec8147a600658ef9ede861df5085b3af4bcbf7326ecda12d81cd75d8c17198950b6fa3df57c33cacb2fd9aa02d98356a13df804b17ded46e3bef93ba3ad3f8ec044f3629e2f8", @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="95bd53d867ff420ed7790984a77d719fdf0000000000005c04d7365312a948266bed1dfd67e228f43d60c001a29f00002eeb107dbd835350490e3a0be3ddc2cad9457be511e5c8bf6f27d2edbe45caa48a14e5c10d4a0218b5d7892657172fca77b32c4b82ee17ad6a03004642b7aabede3de44d52bcdfc74fb73fb35afb5395967f10"]) socket$nl_route(0x10, 0x3, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{0x1, 0xffff, 0x2000}], 0x5b, 0x0) 1.880872921s ago: executing program 2 (id=7637): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregset(0x4205, r5, 0x201, &(0x7f00000001c0)={0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 1.880671201s ago: executing program 3 (id=7638): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0xd9a, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0xce0, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(0xffffffffffffffff) 1.694219722s ago: executing program 3 (id=7639): ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7f, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x118710, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x5, 0x0, 0x0, 0x0, 0x2009}, r0, 0xb, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x16, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207baaf8ff00000000bda106000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ffa1000000bda100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_create(0xb, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r2, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{}, {0x0, 0x3938700}}, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x1000000) 1.628539705s ago: executing program 3 (id=7640): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$eJzs3MGLG1UcB/Bf19rW1N2sWqstiA+96GVo9uBFL0G2IA0obSO0gjB1JxoyJiETFiJi9eTVv0M8ehPEm1724t/gbS8eexBHTNR2l3hYdDewfD6X/OD3vuQ9BgbeMG/23/jq40Gvynr5NNbOnIm1cUR6kCLFWvzt83j19R9/euHWnbs32p3O9s2Urrdvt15LKW28+P17n37z0g/Ti+9+u/Hd+djbfH//161f9i7vXdn//fZH/Sr1qzQcTVOe7o1G0/xeWaSdfjXIUnqnLPKqSP1hVUwO9HvlaDyepXy4s94YT4qqSvlwlgbFLE1HaTqZpfzDvD9MWZal9UbwX3S/flDXdURdPx7noq7r+oloxMV4MtZjI5qxGU/F0/FMXIpn43I8F8/HlfmoVc8bAAAAAAAAAAAAAAAAAAAAThfn/wEAAAAAAAAAAAAAAAAAAGD1bt25e6Pd6WzfTOlCRPnlbne3u/hd9Nu96EcZRVyLZvwW89P/C4v6+lud7WtpbjO+KO//lb+/233sYL41/5zA0nxrkU8H8+ej8Wh+K5pxaXl+a2n+Qrzy8iP5LJrx8wcxijJ24s/sw/xnrZTefLtzKH91Pg4AAABOgyz9Y+n+Pcv+rb/IH+H5wKH99dm4ena1ayeimn0yyMuymBxbcS6O/S8UCsX/XKz6zsRJeHjRVz0TAAAAAAAAAAAAjuIkXidc9RoBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA/2IFjAQAAAABh/tZpdGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBVAAAA//8xgdSv") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$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") r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregset(0x4205, r5, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$eJzs3c9rHOUbAPBnJkl/f79NoRQVkUAPVmo3TeKPCh7qUbRY0Htdkmko2XRLdlOaWLA92IsXKYKIBfGud4/Ff8C/oqCFIiXowUtkNrNtmt1NNunWjd3PB6a8787svu+7M8/bZ3ZmswEMrLH8nzTixYj4Kok4HBFJsW44ipVja9utPLw+nS9JrK5+/EfS2C6vN1+r+byDReWFiPjli4iTaWu7taXluXKlki0U9fH6/JXx2tLyqUvz5dlsNrs8OTV15s2pyXfefqtnY33t/F/ffnT3/TNfHl/55qf7R24ncTYOFevWj+Mp3FhfGYux4j0ZibMbNpzoQWO7SdLvDrAjQ0Wcj0Q+BxyOoSLqgeff5xGxCgyoRPzDgGrmAc1z+x6dB/9nPHhv7QSodfzDa5+NxL7GudGBleSJM6P8fHe0B+3nbfz8+53b+RK9+xwCYEs3bkbE6eHh1vkvKea/nTvdxTYb2zD/wb/nbp7/vN4u/0kf5T/RJv852CZ2d2Lr+E/v96CZjvL87922+e+ji1ajQ0Xtf42cbyS5eKmS5XPb/yPiRIzszeubXc85s3JvtdO69flfvuTtN3PBoh/3h/c++ZyZcr38NGNe78HNiJfa5r9JrHV6XyPX3bj/8/fjfJdtHMvuvNJp3dbjf7ZWf4h4te3+f3xFK9n8+uR443gYbx4Vrf68dezXTu33e/z5/j+w+fhHk/XXa2vbb+P7fX9nndY9Mf7o/vjfk3zSKO8pHrtWrtcXJiL2JB+2Pj75+LnNenP7fPwnjm8+/7U7/vdHxKddjv/W0R9f7mr8fdr/M9va/9sv3Pvgs+86td/d/PdGo3SieKSb+a/bDj7NewcAAAAAAAC7TRoRhyJJS4/KaVoqrd3fcTQOpJVqrX7yYhqXZ6LxXdnRGEmbV7oPr7sfYqK4H7ZZn9xQn4qIIxHx9dD+Rr00Xa3M9HvwAAAAAAAAAAAAAAAAAAAAsEsc7PD9/9xvQ/3uHfDM+clvGFxbxn8vfukJ2H1S///DIBP/MLjEPwwu8Q+DS/zD4BL/MLjEPwyu7cb/yDPqBwAAAAAAAAAAAAAAAAAAAAAAAAAAADwnzp87ly+rKw+vT+f1matLi3PVq6dmstpcaX5xujRdXbhSmq1WZytZabo6v9XrVarVKxOTsXhtvJ7V6uO1peUL89XFy/ULl+bLs9mFzJ8OBgAAAAAAAAAAAAAAAAAAgFa1peW5cqWSLSgo7KgwvDu6odDjQr9nJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB47J8AAAD//zPtN7U=") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 1.334209123s ago: executing program 1 (id=7641): mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000001c0)=0x2, 0x4) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x1, @local}, 0x10) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000280)={0x1d, 0x0, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x24000000) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000180)=0x3, 0x12) 1.128512705s ago: executing program 3 (id=7642): r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0xc0802, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setlease(r0, 0x400, 0x81a508fb016a5ae9) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) syz_usb_connect$cdc_ncm(0x0, 0x6e, 0x0, 0x0) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, r5, 0x0, {}, 0xfd}, 0x18) connect$can_j1939(r4, &(0x7f0000000080)={0x1d, r5, 0x0, {0x0, 0x0, 0x2}, 0xfe}, 0x18) sendmsg$can_j1939(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r6, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) sendto$inet6(r6, &(0x7f0000000100)="b8", 0x1, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x10000, @loopback, 0xffffffff}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000040)=0x8) sendmsg$can_j1939(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000081}, 0x480c4) r7 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000300)={r8, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f00000003c0)=0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000400)=@sack_info={r9, 0x3, 0xb}, &(0x7f0000000240)=0xc) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000004c0)={0xb, {{0xa, 0x4e23, 0x9, @private0, 0x5a}}, {{0xa, 0x4e23, 0x5, @mcast2, 0x5}}}, 0x108) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=@newtfilter={0x24, 0x11, 0x1, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x74, r3, {0xfff3, 0x10}, {0xfff1, 0x9}, {0x2, 0x8}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x48040}, 0x20000050) 1.058101428s ago: executing program 2 (id=7643): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000027c0)=@file={0x0, './file0\x00'}, 0x6e) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc8df, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x300, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xfff1, 0x8}, {0xe, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x20044042) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 714.300179ms ago: executing program 1 (id=7644): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x8, 0x4) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000000)=0x8, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xfffffffffffffe84}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = io_uring_setup(0xf74, &(0x7f0000000100)={0x0, 0x35e4, 0x4000, 0x1, 0xba}) r3 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0x40, 0x400000c, 0xa0002f5, 0x0, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x9f69a7a086f70ae8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0x10, 0x84}], 0x10}, 0x8000) io_uring_enter(r3, 0x2219, 0x7721, 0x16, 0x0, 0x0) 710.283499ms ago: executing program 1 (id=7645): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, @none, 0x0, 0x2}, 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000000a80)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) r2 = syz_open_pts(r1, 0x141601) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80045510, 0x0) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) writev(r4, &(0x7f0000002600)=[{0x0}, {&(0x7f00000024c0)="71e1151f", 0x4}], 0x2) write(r2, &(0x7f0000000000)="d5", 0xb840c58f) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1b) 668.031481ms ago: executing program 1 (id=7646): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80140, 0x38) prlimit64(0x0, 0xb, &(0x7f0000000000), 0x0) fcntl$setsig(r1, 0xa, 0x21) fcntl$setlease(r1, 0x400, 0x1) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f00000027c0)=@file={0x0, './file0\x00'}, 0xff33) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r2 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc8df, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x300, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xfff1, 0x8}, {0xe, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x20044042) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) 667.461851ms ago: executing program 3 (id=7647): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0xd9a, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0xce0, 0x4) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r1, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(r1) 616.651095ms ago: executing program 62 (id=7647): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0xd9a, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0xce0, 0x4) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r1, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(r1) 569.593087ms ago: executing program 2 (id=7649): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) prctl$PR_MCE_KILL(0x23, 0x2, 0x7fffffffeffe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r1}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r2, 0x1, &(0x7f0000000040), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_usb_connect(0x2, 0x68, &(0x7f0000000600)=ANY=[], 0x0) 550.701898ms ago: executing program 63 (id=7649): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) prctl$PR_MCE_KILL(0x23, 0x2, 0x7fffffffeffe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r1}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r2, 0x1, &(0x7f0000000040), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_usb_connect(0x2, 0x68, &(0x7f0000000600)=ANY=[], 0x0) 499.020511ms ago: executing program 1 (id=7651): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffa}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x6, 0x2, 0xffdffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0x9, 0xfffffffe, 0x0, 0x2}, 0x10) write(r3, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000001000000000000000500090002000000", 0x24) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="390000001300034700bb6be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f9313215", 0x3a}], 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1, 0x11dc, &(0x7f0000001280)="$eJzs3MGLG1UcB/Bf19rW1N2sWqstiA+96GVo9uBFL0G2IA0obSO0gjB1JxoyJiETFiJi9eTVv0M8ehPEm1724t/gbS8eexBHTNR2l3hYdDewfD6X/OD3vuQ9BgbeMG/23/jq40Gvynr5NNbOnIm1cUR6kCLFWvzt83j19R9/euHWnbs32p3O9s2Urrdvt15LKW28+P17n37z0g/Ti+9+u/Hd+djbfH//161f9i7vXdn//fZH/Sr1qzQcTVOe7o1G0/xeWaSdfjXIUnqnLPKqSP1hVUwO9HvlaDyepXy4s94YT4qqSvlwlgbFLE1HaTqZpfzDvD9MWZal9UbwX3S/flDXdURdPx7noq7r+oloxMV4MtZjI5qxGU/F0/FMXIpn43I8F8/HlfmoVc8bAAAAAAAAAAAAAAAAAAAAThfn/wEAAAAAAAAAAAAAAAAAAGD1bt25e6Pd6WzfTOlCRPnlbne3u/hd9Nu96EcZRVyLZvwW89P/C4v6+lud7WtpbjO+KO//lb+/233sYL41/5zA0nxrkU8H8+ej8Wh+K5pxaXl+a2n+Qrzy8iP5LJrx8wcxijJ24s/sw/xnrZTefLtzKH91Pg4AAABOgyz9Y+n+Pcv+rb/IH+H5wKH99dm4ena1ayeimn0yyMuymBxbcS6O/S8UCsX/XKz6zsRJeHjRVz0TAAAAAAAAAAAAjuIkXidc9RoBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA/2IFjAQAAAABh/tZpdGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBVAAAA//8xgdSv") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@usrjquota}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@barrier, 0x2e}], [], 0x2e}, 0x1, 0x48f, &(0x7f00000013c0)="$eJzs28tvG8UfAPDvOnHS5y/5lfLoAwgURMQjadICPXABgdQLEhIcyjGkaVWaNqgJEq0qGhAqEhfUvwA4IvEXcIILAk4gOILEBQkhVagXCge0aO3dxrGd1Ekcm9afj+RkZnY2M9/dnex41g6gZ41kP5KIHRHx00DEUDW7vMJI9df1axen/7p2cTqJNH35j6RS789rF6eLqsV+2/PMaCmi9F4S+5q0O3/+wump2dmZc3l+fOHMG+Pz5y88cerM1MmZkzNnJ48cOXxo4umnJp9sS5w7s77ufXtu/56jr155cfrYlde++Swr35Fvr42janjDbY7ESHFM0vptD0f8mqYNxbesnTXppL+LHWFN+iIiO13lbPzHUPTF0skbihfe7WrngE2Vpmk62FDaVyQWU+A2lkS3ewB0R3Gjz97/Fq8OTj+67uqz1TdAWdzX81d1S3+U8jrluve37TQSEccW//7o2GI222q2DgEA0F5fZPOfx5vN/0pxV029/0X12dBwRPw/InZFxB0RsTsi7oyo1L07Iu5Z/udv+iRgpC7fOP/5fuu6g2tBNv97Jn+2tXz+V8z+Yrgvz+2sxF9OTpyanTmYH5PRKA9m+YlV2vjy+R8+XGnb0vyv+sraz34v1Sj93l+3QHd8amFqIzHXuvpOxN7+ZvEnN05eEhF7ImLvOv5+dsxOPfrp/pW23zz+VbThOVP6ScQj1fO/GHXxF5LVn0+Ob4nZmYPjxVXR6NvvLr+0Uvsbir8NsvO/ren1fyP+4aT2ee18NC4XL/NBQ8nln99f8T3Neq//geSVSnogL3tramHh3ETEQLLYWD65tG+RL+pn8Y8eaD7+d0X883G+376IyC7ieyPivoi4P+/7AxHxYEQcWOWIfP3cQ6+vP/7NlcV/fE3nf+2JvtNffb5S+62d/8OV1Ghe0sr/v1Y7uJFjBwAAALeKpPIZ+KQ0lq9x7ohSaWys+hn+3bGtNDs3v/DYibk3zx6vflZ+OMqlYqVrqGY9dCJfGy7yk3X5Q5V14zRN062V/Nj03OxmPVMHWrN9hfGf+S3/GLCvc8BtbE0DPNm8fgCd5wYPvcv4h97V6vgvb3I/gM5z/4fe1Wz8X4q43oWuAB3m/g+9q+n4L3W+H0Dnuf9D7zL+oSdt5Hv9qyV2Ha0rGWx593RDrW/JA1vn7r9sytFYLdHXwbbamYhS003liPiP9LBp4sdKotTtbtQmBiOi1cqX1nthrznR5X9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbfJvAAAA//9BL+kV") r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregset(0x4205, r5, 0x201, &(0x7f00000001c0)={0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x55d, &(0x7f0000000380)="$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") open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) 0s ago: executing program 1 (id=7652): mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000001c0)=0x2, 0x4) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x1, @local}, 0x10) ioperm(0x0, 0x7, 0x80006) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000280)={0x1d, 0x0, 0x1, {0x2, 0x1, 0x2}, 0xff}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x24000000) rmdir(&(0x7f0000000000)='./file/file0/..//file0\x00') r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000180)=0x3, 0x12) kernel console output (not intermixed with test programs): 7f878a207090 R08: 0000000000000000 R09: 0000000000000000 [ 980.187806][T31375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.187822][T31375] R13: 00007f878ba26038 R14: 00007f878ba25fa0 R15: 00007ffeabfb5d38 [ 980.187852][T31375] [ 980.557332][T31365] EXT4-fs error (device loop0): ext4_empty_dir:3075: inode #12: comm syz.0.7384: invalid size [ 980.584885][T30435] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 980.781412][T31394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=31394 comm=syz.6.7386 [ 980.932255][T31422] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7394'. [ 980.991271][T31414] loop3: detected capacity change from 0 to 512 [ 981.012272][T31399] team_slave_0: entered promiscuous mode [ 981.018707][T31399] team_slave_1: entered promiscuous mode [ 981.048648][T31399] macvtap1: entered promiscuous mode [ 981.051290][T31414] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 981.054656][T31399] team0: entered promiscuous mode [ 981.078392][T31414] ext4 filesystem being mounted at /57/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 981.106616][T31399] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 981.122869][T31399] team0: Device macvtap1 is already an upper device of the team interface [ 981.172300][T31399] team0: left promiscuous mode [ 981.186664][T31399] team_slave_0: left promiscuous mode [ 981.193989][T31399] team_slave_1: left promiscuous mode [ 981.369120][T31431] FAULT_INJECTION: forcing a failure. [ 981.369120][T31431] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 981.397307][T31431] CPU: 0 UID: 0 PID: 31431 Comm: syz.6.7395 Not tainted syzkaller #0 PREEMPT(full) [ 981.397345][T31431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 981.397372][T31431] Call Trace: [ 981.397444][T31431] [ 981.397507][T31431] __dump_stack+0x1d/0x30 [ 981.397534][T31431] dump_stack_lvl+0x95/0xd0 [ 981.397570][T31431] dump_stack+0x15/0x1b [ 981.397595][T31431] should_fail_ex+0x263/0x280 [ 981.397636][T31431] should_fail+0xb/0x20 [ 981.397668][T31431] should_fail_usercopy+0x1a/0x20 [ 981.397765][T31431] _copy_from_user+0x1c/0xb0 [ 981.397813][T31431] smc_setsockopt+0x2ac/0x750 [ 981.397843][T31431] ? __pfx_smc_setsockopt+0x10/0x10 [ 981.397870][T31431] __sys_setsockopt+0x184/0x200 [ 981.398020][T31431] __x64_sys_setsockopt+0x64/0x80 [ 981.398110][T31431] x64_sys_call+0x2327/0x3020 [ 981.398147][T31431] do_syscall_64+0x12c/0x370 [ 981.398230][T31431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 981.398289][T31431] RIP: 0033:0x7f87b6e9bf79 [ 981.398310][T31431] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 981.398331][T31431] RSP: 002b:00007f87b58f7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 981.398387][T31431] RAX: ffffffffffffffda RBX: 00007f87b7115fa0 RCX: 00007f87b6e9bf79 [ 981.398403][T31431] RDX: 000000000000048c RSI: 0000000000000000 RDI: 0000000000000003 [ 981.398417][T31431] RBP: 00007f87b58f7090 R08: 0000000000000018 R09: 0000000000000000 [ 981.398432][T31431] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 981.398447][T31431] R13: 00007f87b7116038 R14: 00007f87b7115fa0 R15: 00007fff1ff4f608 [ 981.398472][T31431] [ 981.819216][T29254] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 981.897600][T31439] loop8: detected capacity change from 0 to 8192 [ 981.913312][T31460] loop3: detected capacity change from 0 to 512 [ 981.963246][T31460] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 981.983563][T31465] loop0: detected capacity change from 0 to 128 [ 981.984974][T31460] ext4 filesystem being mounted at /58/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 982.002459][ T931] bond0 (unregistering): Released all slaves [ 982.094294][T31470] netlink: 40 bytes leftover after parsing attributes in process `syz.1.7404'. [ 982.103973][T29254] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 982.141913][ T931] hsr_slave_0: left promiscuous mode [ 982.164694][ T931] hsr_slave_1: left promiscuous mode [ 982.198875][ T931] veth1_macvtap: left promiscuous mode [ 982.215151][ T931] veth0_macvtap: left promiscuous mode [ 982.216485][T31482] loop0: detected capacity change from 0 to 128 [ 982.230659][ T931] veth1_vlan: left promiscuous mode [ 982.236032][T31472] loop6: detected capacity change from 0 to 512 [ 982.239999][ T931] veth0_vlan: left promiscuous mode [ 982.255613][T31472] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 982.319093][T31489] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 982.333653][T31489] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 982.356988][T31472] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a856c018, mo2=0002] [ 982.375402][T31497] FAULT_INJECTION: forcing a failure. [ 982.375402][T31497] name failslab, interval 1, probability 0, space 0, times 0 [ 982.383373][T31472] System zones: 0-2, 18-18, 34-37 [ 982.401246][T31475] loop3: detected capacity change from 0 to 2048 [ 982.411334][T31472] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 982.436423][T31497] CPU: 1 UID: 0 PID: 31497 Comm: syz.8.7409 Not tainted syzkaller #0 PREEMPT(full) [ 982.436457][T31497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 982.436474][T31497] Call Trace: [ 982.436482][T31497] [ 982.436511][T31497] __dump_stack+0x1d/0x30 [ 982.436544][T31497] dump_stack_lvl+0x95/0xd0 [ 982.436574][T31497] dump_stack+0x15/0x1b [ 982.436608][T31497] should_fail_ex+0x263/0x280 [ 982.436693][T31497] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 982.436722][T31497] should_failslab+0x8c/0xb0 [ 982.436759][T31497] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 982.436827][T31497] ? shmem_alloc_inode+0x34/0x50 [ 982.436854][T31497] ? kstrtouint+0x76/0xc0 [ 982.436904][T31497] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 982.436932][T31497] shmem_alloc_inode+0x34/0x50 [ 982.437035][T31497] alloc_inode+0x40/0x170 [ 982.437067][T31497] new_inode+0x1d/0xe0 [ 982.437106][T31497] shmem_get_inode+0x246/0x750 [ 982.437205][T31497] __shmem_file_setup+0x112/0x210 [ 982.437285][T31497] shmem_file_setup+0x3b/0x50 [ 982.437318][T31497] memfd_alloc_file+0x4e/0x300 [ 982.437344][T31497] __se_sys_memfd_create+0x2e1/0x3b0 [ 982.437397][T31497] __x64_sys_memfd_create+0x31/0x40 [ 982.437496][T31497] x64_sys_call+0x1f22/0x3020 [ 982.437530][T31497] do_syscall_64+0x12c/0x370 [ 982.437575][T31497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 982.437638][T31497] RIP: 0033:0x7f878b7abf79 [ 982.437655][T31497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 982.437674][T31497] RSP: 002b:00007f878a206e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 982.437714][T31497] RAX: ffffffffffffffda RBX: 000000000000042a RCX: 00007f878b7abf79 [ 982.437733][T31497] RDX: 00007f878a206ee0 RSI: 0000000000000000 RDI: 00007f878b8429dd [ 982.437751][T31497] RBP: 0000200000000500 R08: 00000000ffffffff R09: 0000000000000000 [ 982.437796][T31497] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000480 [ 982.437809][T31497] R13: 00007f878a206ee0 R14: 00007f878a206ea0 R15: 00002000000004c0 [ 982.437832][T31497] [ 982.682581][T31475] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 982.779760][T31475] loop3: detected capacity change from 0 to 512 [ 982.800107][T31475] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 982.817066][T31507] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 982.819429][T31475] EXT4-fs warning (device loop3): ext4_update_dynamic_rev:1142: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 982.846939][T31475] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.7405: bg 0: block 248: padding at end of block bitmap is not set [ 982.861683][T31475] loop3: lost filesystem error report for type 5 error -117 [ 982.861951][T31475] __quota_error: 244 callbacks suppressed [ 982.861970][T31475] Quota error (device loop3): write_blk: dquota write failed [ 982.883696][T31475] Quota error (device loop3): qtree_write_dquot: Error -117 occurred while creating quota [ 982.893860][T31475] EXT4-fs error (device loop3): ext4_acquire_dquot:6991: comm syz.3.7405: Failed to acquire dquot type 1 [ 982.906222][T31475] loop3: lost filesystem error report for type 5 error -117 [ 982.915113][T31475] EXT4-fs (loop3): 1 truncate cleaned up [ 982.931844][T31475] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0008-000000000000 r/w without journal. Quota mode: writeback. [ 982.946236][T30186] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 983.025154][ T12] bio_check_eod: 20 callbacks suppressed [ 983.025173][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.025173][ T12] loop0: rw=1, sector=145, nr_sectors = 16 limit=128 [ 983.061749][T30451] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 983.097272][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.097272][ T12] loop0: rw=1, sector=169, nr_sectors = 8 limit=128 [ 983.142455][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.142455][ T12] loop0: rw=1, sector=185, nr_sectors = 8 limit=128 [ 983.155078][T31528] vlan2: entered allmulticast mode [ 983.194992][T29254] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0008-000000000000. [ 983.224750][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.224750][ T12] loop0: rw=1, sector=201, nr_sectors = 8 limit=128 [ 983.254405][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.254405][ T12] loop0: rw=1, sector=217, nr_sectors = 8 limit=128 [ 983.282027][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.282027][ T12] loop0: rw=1, sector=233, nr_sectors = 8 limit=128 [ 983.332129][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.332129][ T12] loop0: rw=1, sector=249, nr_sectors = 8 limit=128 [ 983.364147][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.364147][ T12] loop0: rw=1, sector=265, nr_sectors = 8 limit=128 [ 983.396275][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.396275][ T12] loop0: rw=1, sector=281, nr_sectors = 8 limit=128 [ 983.429587][ T12] kworker/u8:0: attempt to access beyond end of device [ 983.429587][ T12] loop0: rw=1, sector=297, nr_sectors = 8 limit=128 [ 983.441919][T31562] FAULT_INJECTION: forcing a failure. [ 983.441919][T31562] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 983.464078][T31562] CPU: 0 UID: 0 PID: 31562 Comm: syz.3.7421 Not tainted syzkaller #0 PREEMPT(full) [ 983.464115][T31562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 983.464132][T31562] Call Trace: [ 983.464142][T31562] [ 983.464155][T31562] __dump_stack+0x1d/0x30 [ 983.464190][T31562] dump_stack_lvl+0x95/0xd0 [ 983.464239][T31562] dump_stack+0x15/0x1b [ 983.464266][T31562] should_fail_ex+0x263/0x280 [ 983.464306][T31562] should_fail+0xb/0x20 [ 983.464337][T31562] should_fail_usercopy+0x1a/0x20 [ 983.464457][T31562] _copy_from_user+0x1c/0xb0 [ 983.464562][T31562] kstrtouint_from_user+0x69/0xf0 [ 983.464597][T31562] proc_fail_nth_write+0x50/0x160 [ 983.464621][T31562] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 983.464649][T31562] vfs_write+0x269/0x9f0 [ 983.464715][T31562] ? __rcu_read_unlock+0x4e/0x70 [ 983.464824][T31562] ? __fget_files+0x184/0x1c0 [ 983.464925][T31562] ? __sys_bind+0x222/0x290 [ 983.464966][T31562] ? mutex_lock+0x57/0x90 [ 983.465001][T31562] ksys_write+0xdc/0x1a0 [ 983.465091][T31562] __x64_sys_write+0x40/0x50 [ 983.465129][T31562] x64_sys_call+0x27e1/0x3020 [ 983.465164][T31562] do_syscall_64+0x12c/0x370 [ 983.465306][T31562] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 983.465338][T31562] RIP: 0033:0x7f648ec0c84e [ 983.465360][T31562] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 983.465432][T31562] RSP: 002b:00007f648d6a6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 983.465502][T31562] RAX: ffffffffffffffda RBX: 00007f648d6a76c0 RCX: 00007f648ec0c84e [ 983.465522][T31562] RDX: 0000000000000001 RSI: 00007f648d6a70a0 RDI: 0000000000000004 [ 983.465540][T31562] RBP: 00007f648d6a7090 R08: 0000000000000000 R09: 0000000000000000 [ 983.465558][T31562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 983.465575][T31562] R13: 00007f648eec6038 R14: 00007f648eec5fa0 R15: 00007fff400ff7e8 [ 983.465602][T31562] [ 983.909672][T31584] bridge_slave_0: left allmulticast mode [ 983.937207][T31584] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.977005][T31584] bridge_slave_1: left allmulticast mode [ 983.994595][T31584] bridge_slave_1: left promiscuous mode [ 984.008636][T31584] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.077231][T31584] bond0: (slave bond_slave_0): Releasing backup interface [ 984.115930][T31584] bond0: (slave bond_slave_1): Releasing backup interface [ 984.129167][T31584] team0: Port device team_slave_0 removed [ 984.142452][T31584] team0: Port device team_slave_1 removed [ 984.150412][T31584] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 984.158918][T31584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 984.170093][T31584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 984.178528][T31584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 984.200712][T31584] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 984.251282][T31600] bridge_slave_0: left promiscuous mode [ 984.283806][T31600] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.331992][T31600] bridge_slave_1: left allmulticast mode [ 984.358225][T31600] bridge_slave_1: left promiscuous mode [ 984.384966][T31600] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.428289][T31600] bond0: (slave bond_slave_0): Releasing backup interface [ 984.447517][T31600] bond0: (slave bond_slave_1): Releasing backup interface [ 984.475000][T31600] team0: Port device team_slave_0 removed [ 984.497155][T31580] msdos: Unknown parameter '‚”oJÍ>’æž1£LuÏH¨Àœé¢$@ê@œûÔù9í­Ä¡Ï̃:g—ù¬ú¬¬íöíö [ 985.651592][T31676] __dump_stack+0x1d/0x30 [ 985.651649][T31676] dump_stack_lvl+0x95/0xd0 [ 985.651676][T31676] dump_stack+0x15/0x1b [ 985.651701][T31676] should_fail_ex+0x263/0x280 [ 985.651736][T31676] should_fail+0xb/0x20 [ 985.651807][T31676] should_fail_usercopy+0x1a/0x20 [ 985.651895][T31676] _copy_to_user+0x20/0xa0 [ 985.651932][T31676] simple_read_from_buffer+0xb5/0x130 [ 985.651967][T31676] proc_fail_nth_read+0x10e/0x150 [ 985.652032][T31676] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 985.652074][T31676] vfs_read+0x1ab/0x7f0 [ 985.652102][T31676] ? __rcu_read_unlock+0x4e/0x70 [ 985.652154][T31676] ? __fget_files+0x184/0x1c0 [ 985.652190][T31676] ? mutex_lock+0x57/0x90 [ 985.652218][T31676] ksys_read+0xdc/0x1a0 [ 985.652248][T31676] __x64_sys_read+0x40/0x50 [ 985.652340][T31676] x64_sys_call+0x2886/0x3020 [ 985.652374][T31676] do_syscall_64+0x12c/0x370 [ 985.652411][T31676] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 985.652495][T31676] RIP: 0033:0x7faa6e4cc84e [ 985.652513][T31676] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 985.652533][T31676] RSP: 002b:00007faa6cf66fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 985.652555][T31676] RAX: ffffffffffffffda RBX: 00007faa6cf676c0 RCX: 00007faa6e4cc84e [ 985.652570][T31676] RDX: 000000000000000f RSI: 00007faa6cf670a0 RDI: 0000000000000004 [ 985.652659][T31676] RBP: 00007faa6cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 985.652673][T31676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 985.652687][T31676] R13: 00007faa6e786038 R14: 00007faa6e785fa0 R15: 00007ffdbf7e0798 [ 985.652711][T31676] [ 985.850251][T31681] netlink: 'syz.8.7432': attribute type 4 has an invalid length. [ 986.001983][T31694] netlink: 'syz.6.7440': attribute type 8 has an invalid length. [ 986.069058][T31691] set_capacity_and_notify: 4 callbacks suppressed [ 986.069130][T31691] loop8: detected capacity change from 0 to 8192 [ 986.142233][T31700] loop6: detected capacity change from 0 to 2048 [ 986.200693][T31708] FAULT_INJECTION: forcing a failure. [ 986.200693][T31708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.224546][T31708] CPU: 1 UID: 0 PID: 31708 Comm: syz.0.7446 Not tainted syzkaller #0 PREEMPT(full) [ 986.224582][T31708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 986.224601][T31708] Call Trace: [ 986.224610][T31708] [ 986.224620][T31708] __dump_stack+0x1d/0x30 [ 986.224718][T31708] dump_stack_lvl+0x95/0xd0 [ 986.224749][T31708] dump_stack+0x15/0x1b [ 986.224771][T31708] should_fail_ex+0x263/0x280 [ 986.224804][T31708] should_fail+0xb/0x20 [ 986.224845][T31708] should_fail_usercopy+0x1a/0x20 [ 986.224885][T31708] _copy_from_iter+0xcf/0xea0 [ 986.224932][T31708] ? __alloc_skb+0x397/0x4b0 [ 986.224982][T31708] ? __alloc_skb+0x219/0x4b0 [ 986.225028][T31708] netlink_sendmsg+0x4ae/0x6f0 [ 986.225080][T31708] ? __pfx_netlink_sendmsg+0x10/0x10 [ 986.225109][T31708] sock_write_iter+0x32a/0x360 [ 986.225150][T31708] ? __pfx_sock_write_iter+0x10/0x10 [ 986.225182][T31708] vfs_write+0x5a6/0x9f0 [ 986.225247][T31708] ksys_write+0xdc/0x1a0 [ 986.225286][T31708] __x64_sys_write+0x40/0x50 [ 986.225323][T31708] x64_sys_call+0x27e1/0x3020 [ 986.225423][T31708] do_syscall_64+0x12c/0x370 [ 986.225479][T31708] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 986.225589][T31708] RIP: 0033:0x7faa6e50bf79 [ 986.225653][T31708] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 986.225680][T31708] RSP: 002b:00007faa6cf67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 986.225706][T31708] RAX: ffffffffffffffda RBX: 00007faa6e785fa0 RCX: 00007faa6e50bf79 [ 986.225726][T31708] RDX: 0000000000000027 RSI: 0000200000005c00 RDI: 0000000000000004 [ 986.225745][T31708] RBP: 00007faa6cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 986.225763][T31708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.225823][T31708] R13: 00007faa6e786038 R14: 00007faa6e785fa0 R15: 00007ffdbf7e0798 [ 986.225852][T31708] [ 986.467308][T31700] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 986.513858][T31700] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 0 vs 150994969 free clusters [ 986.578229][T31722] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7445'. [ 986.621012][T31700] EXT4-fs (loop6): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 128 with error 28 [ 986.661848][T31700] EXT4-fs (loop6): This should not happen!! Data will be lost [ 986.661848][T31700] [ 986.696138][T31700] EXT4-fs (loop6): Total free blocks count 0 [ 986.706796][T31700] EXT4-fs (loop6): Free/Dirty block details [ 986.726123][T31700] EXT4-fs (loop6): free_blocks=2415919504 [ 986.751433][T31700] EXT4-fs (loop6): dirty_blocks=128 [ 986.772014][T31700] EXT4-fs (loop6): Block reservation details [ 986.818426][T31700] EXT4-fs (loop6): i_reserved_data_blocks=8 [ 986.829704][T31729] ieee802154 phy0 wpan0: encryption failed: -22 [ 986.855673][T31731] EXT4-fs (loop6): Delayed block allocation failed for inode 15 at logical offset 159 with max blocks 1 with error 28 [ 987.677585][T31792] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7455'. [ 987.947013][T31807] loop8: detected capacity change from 0 to 128 [ 988.131432][T31807] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 988.168816][T31807] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 988.712558][ T6274] bio_check_eod: 29 callbacks suppressed [ 988.712577][ T6274] kworker/u8:9: attempt to access beyond end of device [ 988.712577][ T6274] loop8: rw=1, sector=145, nr_sectors = 16 limit=128 [ 988.755429][ T6274] kworker/u8:9: attempt to access beyond end of device [ 988.755429][ T6274] loop8: rw=1, sector=169, nr_sectors = 8 limit=128 [ 988.810161][ T6274] kworker/u8:9: attempt to access beyond end of device [ 988.810161][ T6274] loop8: rw=1, sector=185, nr_sectors = 8 limit=128 [ 988.830361][ T6274] kworker/u8:9: attempt to access beyond end of device [ 988.830361][ T6274] loop8: rw=1, sector=201, nr_sectors = 8 limit=128 [ 988.845681][ T6274] kworker/u8:9: attempt to access beyond end of device [ 988.845681][ T6274] loop8: rw=1, sector=217, nr_sectors = 8 limit=128 [ 988.870434][T31884] FAULT_INJECTION: forcing a failure. [ 988.870434][T31884] name failslab, interval 1, probability 0, space 0, times 0 [ 988.895383][T31884] CPU: 0 UID: 0 PID: 31884 Comm: syz.3.7469 Not tainted syzkaller #0 PREEMPT(full) [ 988.895422][T31884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 988.895441][T31884] Call Trace: [ 988.895451][T31884] [ 988.895463][T31884] __dump_stack+0x1d/0x30 [ 988.895498][T31884] dump_stack_lvl+0x95/0xd0 [ 988.895524][T31884] dump_stack+0x15/0x1b [ 988.895552][T31884] should_fail_ex+0x263/0x280 [ 988.895592][T31884] should_failslab+0x8c/0xb0 [ 988.895631][T31884] kmem_cache_alloc_noprof+0x68/0x490 [ 988.895670][T31884] ? vm_area_dup+0x33/0x2c0 [ 988.895709][T31884] ? mas_state_walk+0x574/0x650 [ 988.895748][T31884] vm_area_dup+0x33/0x2c0 [ 988.895790][T31884] __split_vma+0xe9/0x660 [ 988.895831][T31884] ? can_vma_merge_right+0xe7/0x390 [ 988.895866][T31884] vma_modify+0xb30/0xd30 [ 988.895904][T31884] vma_modify_policy+0x177/0x1b0 [ 988.895947][T31884] mbind_range+0x1b8/0x440 [ 988.895978][T31884] ? mas_find+0x5d5/0x700 [ 988.896019][T31884] __se_sys_mbind+0x8b1/0xde0 [ 988.896088][T31884] __x64_sys_mbind+0x78/0x90 [ 988.896134][T31884] x64_sys_call+0x2b72/0x3020 [ 988.896171][T31884] do_syscall_64+0x12c/0x370 [ 988.896217][T31884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.896243][T31884] RIP: 0033:0x7f648ec4bf79 [ 988.896262][T31884] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 988.896286][T31884] RSP: 002b:00007f648d6a7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 988.896314][T31884] RAX: ffffffffffffffda RBX: 00007f648eec5fa0 RCX: 00007f648ec4bf79 [ 988.896333][T31884] RDX: 0000000000000002 RSI: 0000000000004000 RDI: 0000200000ffa000 [ 988.896351][T31884] RBP: 00007f648d6a7090 R08: 0000000000000008 R09: 0000000000000000 [ 988.896375][T31884] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 988.896394][T31884] R13: 00007f648eec6038 R14: 00007f648eec5fa0 R15: 00007fff400ff7e8 [ 988.896425][T31884] [ 989.119651][ T6274] kworker/u8:9: attempt to access beyond end of device [ 989.119651][ T6274] loop8: rw=1, sector=233, nr_sectors = 8 limit=128 [ 989.134073][ T6274] kworker/u8:9: attempt to access beyond end of device [ 989.134073][ T6274] loop8: rw=1, sector=249, nr_sectors = 8 limit=128 [ 989.149803][ T6274] kworker/u8:9: attempt to access beyond end of device [ 989.149803][ T6274] loop8: rw=1, sector=265, nr_sectors = 8 limit=128 [ 989.163974][ T6274] kworker/u8:9: attempt to access beyond end of device [ 989.163974][ T6274] loop8: rw=1, sector=281, nr_sectors = 8 limit=128 [ 989.178536][ T6274] kworker/u8:9: attempt to access beyond end of device [ 989.178536][ T6274] loop8: rw=1, sector=297, nr_sectors = 8 limit=128 [ 989.199472][T31881] loop6: detected capacity change from 0 to 8192 [ 989.312805][T31897] loop8: detected capacity change from 0 to 512 [ 989.332443][T31897] xt_hashlimit: Unknown mode mask C4, kernel too old? [ 989.407102][T31897] loop8: detected capacity change from 0 to 512 [ 989.415438][T31897] ext4: Unknown parameter 'nouser_xattr' [ 989.475223][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 989.475242][ T28] audit: type=1400 audit(1770822234.874:14485): avc: denied { remount } for pid=31896 comm="syz.8.7471" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 989.515788][T31909] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7473'. [ 989.567322][T31913] loop3: detected capacity change from 0 to 128 [ 989.574420][T31915] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7473'. [ 989.584668][T31898] FAT-fs (loop6): error, corrupted directory (invalid entries) [ 989.609566][T31898] FAT-fs (loop6): Filesystem has been set read-only [ 989.616915][T31917] FAULT_INJECTION: forcing a failure. [ 989.616915][T31917] name failslab, interval 1, probability 0, space 0, times 0 [ 989.638971][ T28] audit: type=1326 audit(1770822235.034:14486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31918 comm="syz.0.7477" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7faa6e50bf79 code=0x0 [ 989.666332][T31909] vlan2: entered promiscuous mode [ 989.670316][T31917] CPU: 0 UID: 0 PID: 31917 Comm: syz.8.7476 Not tainted syzkaller #0 PREEMPT(full) [ 989.670416][T31917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 989.670460][T31917] Call Trace: [ 989.670489][T31917] [ 989.670521][T31917] __dump_stack+0x1d/0x30 [ 989.670607][T31917] dump_stack_lvl+0x95/0xd0 [ 989.670706][T31917] dump_stack+0x15/0x1b [ 989.670780][T31917] should_fail_ex+0x263/0x280 [ 989.670910][T31917] should_failslab+0x8c/0xb0 [ 989.671008][T31917] kmem_cache_alloc_noprof+0x68/0x490 [ 989.671113][T31917] ? do_getname+0x2e/0x1c0 [ 989.671218][T31917] do_getname+0x2e/0x1c0 [ 989.671303][T31917] __se_sys_renameat2+0x38/0x1c0 [ 989.671369][T31917] __x64_sys_renameat2+0x67/0x80 [ 989.671550][T31917] x64_sys_call+0x2a12/0x3020 [ 989.671619][T31917] do_syscall_64+0x12c/0x370 [ 989.671661][T31917] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.671697][T31917] RIP: 0033:0x7f878b7abf79 [ 989.671715][T31917] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 989.671737][T31917] RSP: 002b:00007f878a207028 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 989.671794][T31917] RAX: ffffffffffffffda RBX: 00007f878ba25fa0 RCX: 00007f878b7abf79 [ 989.671811][T31917] RDX: ffffffffffffff9c RSI: 0000200000000400 RDI: ffffffffffffff9c [ 989.671829][T31917] RBP: 00007f878a207090 R08: 0000000000000000 R09: 0000000000000000 [ 989.671846][T31917] R10: 0000200000000440 R11: 0000000000000246 R12: 0000000000000001 [ 989.671888][T31917] R13: 00007f878ba26038 R14: 00007f878ba25fa0 R15: 00007ffeabfb5d38 [ 989.671972][T31917] [ 989.691231][T31923] FAULT_INJECTION: forcing a failure. [ 989.691231][T31923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 989.704376][T31906] FAT-fs (loop6): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.707879][T31913] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 989.711079][T31910] FAT-fs (loop6): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.714858][T31913] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 989.721758][T31914] FAT-fs (loop6): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.736434][T31909] bridge3: entered promiscuous mode [ 989.909935][T31923] CPU: 1 UID: 0 PID: 31923 Comm: syz.0.7477 Not tainted syzkaller #0 PREEMPT(full) [ 989.909969][T31923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 989.909983][T31923] Call Trace: [ 989.909991][T31923] [ 989.910000][T31923] __dump_stack+0x1d/0x30 [ 989.910071][T31923] dump_stack_lvl+0x95/0xd0 [ 989.910182][T31923] dump_stack+0x15/0x1b [ 989.910205][T31923] should_fail_ex+0x263/0x280 [ 989.910306][T31923] should_fail_alloc_page+0xf2/0x100 [ 989.910354][T31923] __alloc_frozen_pages_noprof+0x108/0x350 [ 989.910400][T31923] alloc_pages_mpol+0xb3/0x260 [ 989.910493][T31923] folio_alloc_mpol_noprof+0x39/0x80 [ 989.910519][T31923] shmem_get_folio_gfp+0x3da/0xd60 [ 989.910567][T31923] shmem_fault+0xf6/0x250 [ 989.910591][T31923] __do_fault+0xbc/0x200 [ 989.910669][T31923] handle_mm_fault+0xfa1/0x3030 [ 989.910712][T31923] do_user_addr_fault+0x3fd/0x1050 [ 989.910794][T31923] exc_page_fault+0x62/0xa0 [ 989.910827][T31923] asm_exc_page_fault+0x26/0x30 [ 989.910853][T31923] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 989.910895][T31923] Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb [ 989.910924][T31923] RSP: 0018:ffffc90005667cf0 EFLAGS: 00050216 [ 989.910944][T31923] RAX: 0000000000000013 RBX: 0000000000000030 RCX: 0000000000000030 [ 989.910985][T31923] RDX: 0000000000000000 RSI: ffffc90005667dc0 RDI: 0000200000001500 [ 989.911000][T31923] RBP: ffff88810255b888 R08: 000000000000018d R09: 0000000000000000 [ 989.911088][T31923] R10: 0001c90005667dc0 R11: 0001c90005667def R12: 0000200000001530 [ 989.911104][T31923] R13: 00007ffffffff000 R14: 0000200000001500 R15: ffffc90005667dc0 [ 989.911153][T31923] _copy_to_user+0x7c/0xa0 [ 989.911198][T31923] copy_siginfo_to_user+0x22/0xb0 [ 989.911235][T31923] ptrace_request+0x1661/0x1a90 [ 989.911364][T31923] ? get_pid_task+0x96/0xd0 [ 989.911410][T31923] arch_ptrace+0x289/0x3f0 [ 989.911567][T31923] __se_sys_ptrace+0xf3/0x2c0 [ 989.911600][T31923] __x64_sys_ptrace+0x55/0x70 [ 989.911621][T31923] x64_sys_call+0x287b/0x3020 [ 989.911690][T31923] do_syscall_64+0x12c/0x370 [ 989.911728][T31923] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.911775][T31923] RIP: 0033:0x7faa6e50bf79 [ 989.911792][T31923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 989.911833][T31923] RSP: 002b:00007faa6cf46028 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 989.911905][T31923] RAX: ffffffffffffffda RBX: 00007faa6e786090 RCX: 00007faa6e50bf79 [ 989.911927][T31923] RDX: 0000200000000140 RSI: 0000000000000089 RDI: 0000000000004209 [ 989.911941][T31923] RBP: 00007faa6cf46090 R08: 0000000000000000 R09: 0000000000000000 [ 989.911956][T31923] R10: 0000200000001500 R11: 0000000000000246 R12: 0000000000000001 [ 989.911970][T31923] R13: 00007faa6e786128 R14: 00007faa6e786090 R15: 00007ffdbf7e0798 [ 989.912011][T31923] [ 989.922788][T31909] vlan2: entered allmulticast mode [ 990.249135][T31909] bridge3: entered allmulticast mode [ 990.315008][T31926] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 990.383575][ T28] audit: type=1326 audit(1770822235.784:14487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31937 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f648ec4bf79 code=0x7ffc0000 [ 990.481573][ T28] audit: type=1326 audit(1770822235.824:14488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31937 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f648ec4bf79 code=0x7ffc0000 [ 990.518058][ T28] audit: type=1326 audit(1770822235.824:14489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31937 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f648ec4bf79 code=0x7ffc0000 [ 990.566945][ T28] audit: type=1326 audit(1770822235.824:14490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31937 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f648ec4bf79 code=0x7ffc0000 [ 990.597357][ T28] audit: type=1326 audit(1770822235.834:14491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31941 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f648ec0c84e code=0x7ffc0000 [ 990.674606][ T28] audit: type=1400 audit(1770822235.834:14492): avc: denied { append } for pid=31934 comm="syz.6.7489" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 990.830976][T31958] netlink: 'syz.3.7480': attribute type 4 has an invalid length. [ 990.883686][T31961] netlink: 'syz.3.7480': attribute type 4 has an invalid length. [ 990.902398][ T28] audit: type=1326 audit(1770822235.844:14493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31937 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f648ec4bf79 code=0x7ffc0000 [ 990.948252][ T28] audit: type=1326 audit(1770822235.844:14494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31937 comm="syz.3.7480" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f648ec4bf79 code=0x7ffc0000 [ 990.959563][T31956] loop6: detected capacity change from 0 to 8192 [ 991.000544][T31950] team_slave_0: entered promiscuous mode [ 991.007880][T31950] team_slave_1: entered promiscuous mode [ 991.023949][T31950] macvtap1: entered promiscuous mode [ 991.037541][T31956] FAT-fs (loop6): error, invalid access to FAT (entry 0x0000e1b1) [ 991.050365][T31950] team0: entered promiscuous mode [ 991.058340][T31956] FAT-fs (loop6): Filesystem has been set read-only [ 991.076085][T31956] FAT-fs (loop6): error, invalid access to FAT (entry 0x0000e1b1) [ 991.088492][T31964] netlink: 64 bytes leftover after parsing attributes in process `syz.6.7483'. [ 991.120282][T31956] FAT-fs (loop6): error, invalid access to FAT (entry 0x0000e1b1) [ 991.134969][T31964] netlink: 32 bytes leftover after parsing attributes in process `syz.6.7483'. [ 991.160672][T31956] Buffer I/O error on dev loop6, logical block 57847, async page read [ 991.190912][T31963] loop3: detected capacity change from 0 to 8192 [ 991.205356][T31956] FAT-fs (loop6): error, invalid access to FAT (entry 0x0000e1b1) [ 991.214666][T31950] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 991.233324][T31956] FAT-fs (loop6): error, invalid access to FAT (entry 0x0000e1b1) [ 991.255695][T31950] team0: Device macvtap1 is already an upper device of the team interface [ 991.273293][T31956] FAT-fs (loop6): error, invalid access to FAT (entry 0x0000e1b1) [ 991.312585][T31950] team0: left promiscuous mode [ 991.332216][T31950] team_slave_0: left promiscuous mode [ 991.340743][T31950] team_slave_1: left promiscuous mode [ 991.547082][T31966] macvtap1: entered promiscuous mode [ 991.556982][T31966] team0: entered promiscuous mode [ 991.575258][T31966] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 991.597570][T31966] team0: Device macvtap1 is already an upper device of the team interface [ 991.624200][T31966] team0: left promiscuous mode [ 992.060404][T31987] loop6: detected capacity change from 0 to 512 [ 992.085004][T31987] ------------[ cut here ]------------ [ 992.090662][T31987] EA inode 11 i_nlink=2 [ 992.090747][T31987] WARNING: fs/ext4/xattr.c:1059 at ext4_xattr_inode_update_ref+0x313/0x350, CPU#0: syz.6.7487/31987 [ 992.106343][T31987] Modules linked in: [ 992.111692][T31987] CPU: 0 UID: 0 PID: 31987 Comm: syz.6.7487 Not tainted syzkaller #0 PREEMPT(full) [ 992.121889][T31987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 992.133509][T31987] RIP: 0010:ext4_xattr_inode_update_ref+0x332/0x350 [ 992.142720][T31987] Code: d4 3b 9a ff 4c 8d 2d 6d 9d 3d 05 49 8d 7e 40 e8 84 a4 b6 ff 49 8b 6e 40 4c 89 e7 e8 b8 9f b6 ff 41 8b 56 48 4c 89 ef 48 89 ee <67> 48 0f b9 3a e9 02 ff ff ff e8 bf 1e d1 03 66 66 66 66 66 66 2e [ 992.165414][T31987] RSP: 0018:ffffc9000737f778 EFLAGS: 00010246 [ 992.172382][T31987] RAX: ffff88811c092ae8 RBX: ffff88811b1564e8 RCX: ffffffff81becef8 [ 992.180566][T31987] RDX: 0000000000000002 RSI: 000000000000000b RDI: ffffffff86fc6c50 [ 992.188893][T31987] RBP: 000000000000000b R08: 000188811b15649b R09: 0000000000000000 [ 992.197499][T31987] R10: ffffc9000737f6a8 R11: 0001c9000737f6a8 R12: ffff88811b156498 [ 992.207002][T31987] R13: ffffffff86fc6c50 R14: ffff88811b156450 R15: 0000000000000001 [ 992.215933][T31987] FS: 00007f87b58d66c0(0000) GS:ffff8882aeb49000(0000) knlGS:0000000000000000 [ 992.225469][T31987] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 992.232968][T31987] CR2: 00007f2c2ad117d0 CR3: 0000000129fec000 CR4: 00000000003506f0 [ 992.241204][T31987] DR0: fffffffffffffffe DR1: 0000000000000000 DR2: 0000000000000000 [ 992.249325][T31987] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 992.257596][T31987] Call Trace: [ 992.262196][T31987] [ 992.265207][T31987] ext4_xattr_inode_dec_ref_all+0x57c/0x880 [ 992.271280][T31987] ? errseq_check+0x2c/0x50 [ 992.276579][T31987] ext4_xattr_delete_inode+0x6c1/0x7a0 [ 992.282615][T31987] ? ext4_truncate+0x92b/0xad0 [ 992.287564][T31987] ext4_evict_inode+0xa1f/0xd40 [ 992.293259][T31987] ? __pfx_ext4_evict_inode+0x10/0x10 [ 992.298687][T31987] evict+0x2af/0x510 [ 992.302890][T31987] ? __dquot_initialize+0x146/0x7c0 [ 992.308305][T31987] iput+0x41a/0x580 [ 992.312316][T31987] ext4_process_orphan+0x1a9/0x1c0 [ 992.317479][T31987] ext4_orphan_cleanup+0x6a8/0xa00 [ 992.323456][T31987] ext4_fill_super+0x3476/0x3800 [ 992.328465][T31987] ? set_blocksize+0x19e/0x2c0 [ 992.333311][T31987] ? setup_bdev_super+0x30e/0x370 [ 992.338492][T31987] ? __pfx_ext4_fill_super+0x10/0x10 [ 992.343935][T31987] get_tree_bdev_flags+0x291/0x300 [ 992.349123][T31987] ? __pfx_ext4_fill_super+0x10/0x10 [ 992.355310][T31987] get_tree_bdev+0x1f/0x30 [ 992.359926][T31987] ext4_get_tree+0x1c/0x30 [ 992.364546][T31987] vfs_get_tree+0x57/0x1d0 [ 992.369026][T31987] do_new_mount+0x288/0x8d0 [ 992.373721][T31987] path_mount+0x4d0/0xbc0 [ 992.378186][T31987] __se_sys_mount+0x28c/0x2e0 [ 992.383816][T31987] __x64_sys_mount+0x67/0x80 [ 992.388571][T31987] x64_sys_call+0x2d61/0x3020 [ 992.393365][T31987] do_syscall_64+0x12c/0x370 [ 992.398320][T31987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 992.404329][T31987] RIP: 0033:0x7f87b6e9d20a [ 992.408797][T31987] Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 992.429839][T31987] RSP: 002b:00007f87b58d5e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 992.438924][T31987] RAX: ffffffffffffffda RBX: 00007f87b58d5ee0 RCX: 00007f87b6e9d20a [ 992.447278][T31987] RDX: 00002000000009c0 RSI: 0000200000000540 RDI: 00007f87b58d5ea0 [ 992.455733][T31987] RBP: 00002000000009c0 R08: 00007f87b58d5ee0 R09: 0000000000800718 [ 992.464732][T31987] R10: 0000000000800718 R11: 0000000000000246 R12: 0000200000000540 [ 992.472997][T31987] R13: 00007f87b58d5ea0 R14: 000000000000048d R15: 0000200000000200 [ 992.481597][T31987] [ 992.484899][T31987] ---[ end trace 0000000000000000 ]--- [ 992.498167][T31987] EXT4-fs (loop6): 1 orphan inode deleted [ 992.505745][T31987] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 992.846717][ T931] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 992.915639][T30451] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 992.994546][ T931] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 993.010433][T32023] loop6: detected capacity change from 0 to 128 [ 993.115223][ T931] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 993.133225][T32030] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 993.159644][T32030] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 993.200619][T32012] netlink: 'syz.8.7492': attribute type 4 has an invalid length. [ 993.239715][T32034] netlink: 'syz.8.7492': attribute type 4 has an invalid length. [ 993.250450][ T931] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 993.496870][T32042] loop8: detected capacity change from 0 to 8192 [ 993.720472][ T6274] bio_check_eod: 49 callbacks suppressed [ 993.720498][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.720498][ T6274] loop6: rw=1, sector=145, nr_sectors = 16 limit=128 [ 993.775891][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.775891][ T6274] loop6: rw=1, sector=169, nr_sectors = 8 limit=128 [ 993.826945][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.826945][ T6274] loop6: rw=1, sector=185, nr_sectors = 8 limit=128 [ 993.858863][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.858863][ T6274] loop6: rw=1, sector=201, nr_sectors = 8 limit=128 [ 993.876675][ T931] bond0 (unregistering): Released all slaves [ 993.883644][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.883644][ T6274] loop6: rw=1, sector=217, nr_sectors = 8 limit=128 [ 993.918300][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.918300][ T6274] loop6: rw=1, sector=233, nr_sectors = 8 limit=128 [ 993.932231][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.932231][ T6274] loop6: rw=1, sector=249, nr_sectors = 8 limit=128 [ 993.965310][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.965310][ T6274] loop6: rw=1, sector=265, nr_sectors = 8 limit=128 [ 993.990094][ T6274] kworker/u8:9: attempt to access beyond end of device [ 993.990094][ T6274] loop6: rw=1, sector=281, nr_sectors = 8 limit=128 [ 994.004026][ T6274] kworker/u8:9: attempt to access beyond end of device [ 994.004026][ T6274] loop6: rw=1, sector=297, nr_sectors = 8 limit=128 [ 994.037971][T31993] chnl_net:caif_netlink_parms(): no params data found [ 994.136175][ T931] hsr_slave_0: left promiscuous mode [ 994.145884][ T931] hsr_slave_1: left promiscuous mode [ 994.162744][ T931] veth1_macvtap: left promiscuous mode [ 994.187333][ T931] veth0_macvtap: left promiscuous mode [ 994.193012][ T931] veth1_vlan: left promiscuous mode [ 994.207036][ T931] veth0_vlan: left promiscuous mode [ 994.352944][T32099] netlink: 'syz.6.7496': attribute type 4 has an invalid length. [ 994.406233][T32106] netlink: 'syz.6.7496': attribute type 4 has an invalid length. [ 994.482719][ T28] kauditd_printk_skb: 149 callbacks suppressed [ 994.482738][ T28] audit: type=1326 audit(1770822239.887:14644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32078 comm="syz.6.7496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f87b6e9bce2 code=0x7ffc0000 [ 994.532299][T31993] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.558915][T31993] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.572764][T31993] bridge_slave_0: entered allmulticast mode [ 994.599766][T31993] bridge_slave_0: entered promiscuous mode [ 994.614853][T31993] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.654537][T31993] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.686091][T31993] bridge_slave_1: entered allmulticast mode [ 994.707097][T31993] bridge_slave_1: entered promiscuous mode [ 994.769322][T31993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 994.813487][T31993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 994.881826][T31993] team0: Port device team_slave_0 added [ 994.899720][T31993] team0: Port device team_slave_1 added [ 994.939108][T31993] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 994.953905][T31993] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 995.016662][T31993] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 995.049973][T31993] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 995.057637][T31993] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 995.118724][T31993] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 995.287339][T32134] team_slave_0: entered promiscuous mode [ 995.294172][T32134] team_slave_1: entered promiscuous mode [ 995.320762][T32144] loop0: detected capacity change from 0 to 512 [ 995.328949][T32134] macvtap1: entered promiscuous mode [ 995.334849][T32134] team0: entered promiscuous mode [ 995.377937][T32144] EXT4-fs error (device loop0): ext4_expand_extra_isize_ea:2808: inode #11: comm syz.0.7497: corrupted xattr block 95: invalid header [ 995.394860][T32144] loop0: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 995.406294][T32134] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 995.436105][T32134] team0: Device macvtap1 is already an upper device of the team interface [ 995.442033][T32144] EXT4-fs error (device loop0): ext4_validate_block_bitmap:432: comm syz.0.7497: bg 0: block 7: invalid block bitmap [ 995.549397][T32144] loop0: lost filesystem error report for type 5 error -117 [ 995.551607][T32144] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6688: Corrupt filesystem [ 995.598157][T32134] team0: left promiscuous mode [ 995.609743][T32144] loop0: lost filesystem error report for type 5 error -117 [ 995.612713][T32144] EXT4-fs error (device loop0): ext4_xattr_delete_inode:2972: inode #11: comm syz.0.7497: corrupted xattr block 95: invalid header [ 995.640129][ T28] audit: type=1326 audit(1770822241.017:14645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32078 comm="syz.6.7496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f87b6e5c84e code=0x7ffc0000 [ 995.666649][T32134] team_slave_0: left promiscuous mode [ 995.673435][T32134] team_slave_1: left promiscuous mode [ 995.692570][T32144] loop0: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 995.696115][T32144] EXT4-fs warning (device loop0): ext4_evict_inode:273: xattr delete (err -117) [ 995.718661][T32144] EXT4-fs (loop0): 1 orphan inode deleted [ 995.737237][T32144] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 995.766242][ T931] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.817401][T31993] hsr_slave_0: entered promiscuous mode [ 995.849832][T31993] hsr_slave_1: entered promiscuous mode [ 995.863273][T30435] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 995.874371][T31993] debugfs: 'hsr0' already exists in 'hsr' [ 995.880485][T31993] Cannot create hsr debugfs directory [ 995.885963][ T28] audit: type=1400 audit(1770822241.287:14646): avc: denied { watch } for pid=32152 comm="syz.1.7501" path="/392/file0" dev="tmpfs" ino=2112 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 995.889954][T32153] 9p: Bad value for 'rfdno' [ 995.925490][ T931] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.003099][ T931] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.063944][ T28] audit: type=1326 audit(1770822241.467:14647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 996.110074][ T28] audit: type=1326 audit(1770822241.467:14648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 996.138918][ T28] audit: type=1326 audit(1770822241.467:14650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 996.181089][ T28] audit: type=1326 audit(1770822241.467:14649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 996.207490][ T931] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.218876][ T28] audit: type=1326 audit(1770822241.467:14651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 996.237702][T32079] loop6: detected capacity change from 0 to 8192 [ 996.272654][ T28] audit: type=1326 audit(1770822241.537:14652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 996.272721][ T28] audit: type=1326 audit(1770822241.537:14653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32159 comm="syz.1.7503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb35fe7bce2 code=0x7ffc0000 [ 996.338710][T32157] team_slave_0: entered promiscuous mode [ 996.339344][T32157] team_slave_1: entered promiscuous mode [ 996.341545][T32157] macvtap1: entered promiscuous mode [ 996.341566][T32157] team0: entered promiscuous mode [ 996.376846][T32157] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 996.457033][T32157] team0: Device macvtap1 is already an upper device of the team interface [ 996.507371][T32157] team0: left promiscuous mode [ 996.532131][T32157] team_slave_0: left promiscuous mode [ 996.539611][T32157] team_slave_1: left promiscuous mode [ 996.676016][T32161] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7503'. [ 996.811054][T32128] chnl_net:caif_netlink_parms(): no params data found [ 996.980415][ T931] bond0 (unregistering): Released all slaves [ 997.062712][T32128] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.069951][T32180] loop0: detected capacity change from 0 to 8192 [ 997.097296][T32128] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.113149][T32128] bridge_slave_0: entered allmulticast mode [ 997.120270][T32128] bridge_slave_0: entered promiscuous mode [ 997.128262][T32128] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.135485][T32128] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.142982][T32128] bridge_slave_1: entered allmulticast mode [ 997.150067][T32128] bridge_slave_1: entered promiscuous mode [ 997.199067][ T931] hsr_slave_0: left promiscuous mode [ 997.207675][ T931] hsr_slave_1: left promiscuous mode [ 997.217984][ T931] veth1_macvtap: left promiscuous mode [ 997.223972][ T931] veth0_macvtap: left promiscuous mode [ 997.232540][ T931] veth1_vlan: left promiscuous mode [ 997.238503][ T931] veth0_vlan: left promiscuous mode [ 997.331954][T32188] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 997.422940][T32128] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 997.494718][T32189] team_slave_0: entered promiscuous mode [ 997.501571][T32189] team_slave_1: entered promiscuous mode [ 997.513705][T32189] macvtap1: entered promiscuous mode [ 997.520735][T32189] team0: entered promiscuous mode [ 997.528973][T32189] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 997.536562][T32189] team0: Device macvtap1 is already an upper device of the team interface [ 997.547749][T32189] team0: left promiscuous mode [ 997.553238][T32189] team_slave_0: left promiscuous mode [ 997.560475][T32189] team_slave_1: left promiscuous mode [ 997.579037][T32128] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 997.624663][T32128] team0: Port device team_slave_0 added [ 997.845127][T32195] team_slave_0: entered promiscuous mode [ 997.852576][T32195] team_slave_1: entered promiscuous mode [ 997.862018][T32195] macvtap1: entered promiscuous mode [ 997.887953][T32195] team0: entered promiscuous mode [ 997.894972][T32203] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7514'. [ 997.938054][T32195] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 997.976171][T32195] team0: Device macvtap1 is already an upper device of the team interface [ 998.015925][T32195] team0: left promiscuous mode [ 998.032352][T32195] team_slave_0: left promiscuous mode [ 998.039209][T32195] team_slave_1: left promiscuous mode [ 998.208859][T32128] team0: Port device team_slave_1 added [ 998.246329][T32128] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 998.264348][T32128] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 998.296201][T32128] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 998.338781][T32128] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 998.346055][T32128] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 998.401740][T32128] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 998.541413][T32216] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7517'. [ 998.610511][T32207] team_slave_0: entered promiscuous mode [ 998.617347][T32207] team_slave_1: entered promiscuous mode [ 998.628197][T32207] macvtap1: entered promiscuous mode [ 998.634735][T32207] team0: entered promiscuous mode [ 998.722204][T32207] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 998.742985][T32207] team0: Device macvtap1 is already an upper device of the team interface [ 998.770699][T32207] team0: left promiscuous mode [ 998.791971][T32207] team_slave_0: left promiscuous mode [ 998.798425][T32207] team_slave_1: left promiscuous mode [ 999.049154][T32128] hsr_slave_0: entered promiscuous mode [ 999.055945][T32128] hsr_slave_1: entered promiscuous mode [ 999.088948][T32128] debugfs: 'hsr0' already exists in 'hsr' [ 999.116019][T32128] Cannot create hsr debugfs directory [ 999.163217][T31993] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 999.199207][T31993] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 999.245782][T31993] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 999.260192][T31993] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 999.307879][T32242] loop0: detected capacity change from 0 to 512 [ 999.365107][T32242] EXT4-fs (loop0): 1 orphan inode deleted [ 999.391995][T32242] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 999.472015][T31993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.507408][T31993] 8021q: adding VLAN 0 to HW filter on device team0 [ 999.535085][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.542475][ T7236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.573447][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.580650][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.599581][T31993] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 999.611513][T31993] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 999.619751][T30435] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 999.645716][ T28] kauditd_printk_skb: 143 callbacks suppressed [ 999.645735][ T28] audit: type=1326 audit(1770822245.049:14797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 999.742012][T32128] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 999.769556][ T28] audit: type=1326 audit(1770822245.049:14798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 999.802702][T32128] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 999.814905][ T28] audit: type=1326 audit(1770822245.099:14799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 999.841545][ T28] audit: type=1326 audit(1770822245.099:14800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32259 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f87b6e5c84e code=0x7ffc0000 [ 999.878990][ T28] audit: type=1326 audit(1770822245.099:14801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 999.921419][T31993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 999.929807][T32267] netlink: 'syz.6.7531': attribute type 4 has an invalid length. [ 999.940805][ T28] audit: type=1326 audit(1770822245.099:14802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 999.986809][ T28] audit: type=1326 audit(1770822245.119:14803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 1000.013462][ T28] audit: type=1326 audit(1770822245.119:14804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 1000.038138][T32270] netlink: 'syz.6.7531': attribute type 4 has an invalid length. [ 1000.047607][ T28] audit: type=1326 audit(1770822245.119:14805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 1000.063622][T32128] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1000.078492][ T28] audit: type=1326 audit(1770822245.199:14806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32255 comm="syz.6.7531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87b6e9bf79 code=0x7ffc0000 [ 1000.106262][T32128] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1000.201835][T32291] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 1000.279777][T32256] loop6: detected capacity change from 0 to 8192 [ 1000.451201][T32291] team_slave_0: entered promiscuous mode [ 1000.458792][T32291] team_slave_1: entered promiscuous mode [ 1000.468080][T32291] macvtap1: entered promiscuous mode [ 1000.474058][T32291] team0: entered promiscuous mode [ 1000.491932][T32291] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1000.512486][T32291] team0: Device macvtap1 is already an upper device of the team interface [ 1000.535690][T32291] team0: left promiscuous mode [ 1000.543549][T32291] team_slave_0: left promiscuous mode [ 1000.550186][T32291] team_slave_1: left promiscuous mode [ 1000.668160][T32128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1000.696852][T32128] 8021q: adding VLAN 0 to HW filter on device team0 [ 1000.720915][ T6274] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.728467][ T6274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1000.740786][ T6274] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.748130][ T6274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1000.830321][ T12] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1000.857880][T31993] veth0_vlan: entered promiscuous mode [ 1000.867704][T31993] veth1_vlan: entered promiscuous mode [ 1000.900157][T31993] veth0_macvtap: entered promiscuous mode [ 1000.917367][T31993] veth1_macvtap: entered promiscuous mode [ 1000.936550][ T12] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1000.981355][T32128] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1001.000590][T31993] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1001.027572][ T12] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1001.065003][T31993] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1001.091709][ T6274] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.126882][ T12] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1001.147798][ T6274] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.182684][ T6274] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.207477][ T6274] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.420774][ T12] dummy0: left allmulticast mode [ 1001.430482][T32379] random: crng reseeded on system resumption [ 1001.430875][ T12] bridge0: port 3(dummy0) entered disabled state [ 1001.444323][ T12] bridge_slave_1: left allmulticast mode [ 1001.451580][ T12] bridge_slave_1: left promiscuous mode [ 1001.458729][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.500256][ T12] bridge_slave_0: left allmulticast mode [ 1001.514593][ T12] bridge_slave_0: left promiscuous mode [ 1001.521382][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.538431][T32388] netlink: 'syz.1.7533': attribute type 4 has an invalid length. [ 1001.597353][T32396] netlink: 'syz.1.7533': attribute type 4 has an invalid length. [ 1001.688331][T32400] loop0: detected capacity change from 0 to 8192 [ 1001.740661][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1001.768261][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1001.787002][ T12] bond0 (unregistering): Released all slaves [ 1001.806401][ T12] bond1 (unregistering): Released all slaves [ 1001.994497][T32414] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 1002.019966][T32128] veth0_vlan: entered promiscuous mode [ 1002.026661][T32414] FAT-fs (loop0): Filesystem has been set read-only [ 1002.044259][ T12] hsr_slave_0: left promiscuous mode [ 1002.053279][T32422] loop5: detected capacity change from 0 to 8192 [ 1002.080006][ T12] hsr_slave_1: left promiscuous mode [ 1002.091853][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1002.102136][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1002.111141][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1002.122339][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1002.146547][T32422] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.164887][T32422] FAT-fs (loop5): Filesystem has been set read-only [ 1002.200758][T32422] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.215186][T32422] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.229901][T32422] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.239935][ T12] veth1_macvtap: left promiscuous mode [ 1002.246254][ T12] veth0_macvtap: left promiscuous mode [ 1002.251901][ T12] veth1_vlan: left promiscuous mode [ 1002.258224][ T12] veth0_vlan: left promiscuous mode [ 1002.272443][T32426] loop0: detected capacity change from 0 to 512 [ 1002.577772][ T12] team0 (unregistering): Port device team_slave_1 removed [ 1002.601082][ T12] team0 (unregistering): Port device team_slave_0 removed [ 1002.777427][T32128] veth1_vlan: entered promiscuous mode [ 1002.798633][T32428] loop5: detected capacity change from 0 to 512 [ 1002.826924][T32128] veth0_macvtap: entered promiscuous mode [ 1002.845649][T32434] netlink: 24 bytes leftover after parsing attributes in process `syz.1.7541'. [ 1002.864170][T32337] chnl_net:caif_netlink_parms(): no params data found [ 1002.891616][T32128] veth1_macvtap: entered promiscuous mode [ 1002.928655][T32434] 9p: Bad value for 'rfdno' [ 1002.946857][T32434] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=32434 comm=syz.1.7541 [ 1002.973862][T32128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1003.012319][T32128] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1003.049483][T32428] EXT4-fs (loop5): 1 orphan inode deleted [ 1003.075147][ T931] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.087029][ T931] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.130181][T32428] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1003.156188][ T931] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.156349][ T931] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.277712][T32337] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.297102][T32337] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.322222][T32337] bridge_slave_0: entered allmulticast mode [ 1003.338010][T32337] bridge_slave_0: entered promiscuous mode [ 1003.352299][T31993] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1003.373115][T32337] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.390931][T32337] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.431141][T32337] bridge_slave_1: entered allmulticast mode [ 1003.451844][T32337] bridge_slave_1: entered promiscuous mode [ 1003.541646][T32337] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1003.570834][T32337] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1003.665144][T32337] team0: Port device team_slave_0 added [ 1003.674720][T32337] team0: Port device team_slave_1 added [ 1003.706442][T32337] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1003.724376][T32337] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1003.773887][T32337] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1003.787684][T32481] loop4: detected capacity change from 0 to 8192 [ 1003.805397][T32337] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1003.822049][T32337] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1003.885707][T32481] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 1003.898194][T32481] FAT-fs (loop4): Filesystem has been set read-only [ 1003.920917][T32481] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 1003.933979][T32337] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1003.951267][T32484] FAULT_INJECTION: forcing a failure. [ 1003.951267][T32484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1003.968536][T32481] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 1003.968576][T32481] bio_check_eod: 38 callbacks suppressed [ 1003.968591][T32481] syz.4.7499: attempt to access beyond end of device [ 1003.968591][T32481] loop4: rw=8388608, sector=57847, nr_sectors = 1 limit=8192 [ 1003.968639][T32481] Buffer I/O error on dev loop4, logical block 57847, async page read [ 1003.968663][T32481] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 1003.968702][T32481] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 1003.968767][T32481] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 1004.053875][T32484] CPU: 0 UID: 0 PID: 32484 Comm: syz.0.7546 Tainted: G W syzkaller #0 PREEMPT(full) [ 1004.053920][T32484] Tainted: [W]=WARN [ 1004.053929][T32484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1004.053946][T32484] Call Trace: [ 1004.053954][T32484] [ 1004.053965][T32484] __dump_stack+0x1d/0x30 [ 1004.054024][T32484] dump_stack_lvl+0x95/0xd0 [ 1004.054050][T32484] dump_stack+0x15/0x1b [ 1004.054123][T32484] should_fail_ex+0x263/0x280 [ 1004.054162][T32484] should_fail+0xb/0x20 [ 1004.054197][T32484] should_fail_usercopy+0x1a/0x20 [ 1004.054276][T32484] _copy_from_user+0x1c/0xb0 [ 1004.054315][T32484] __sys_bpf+0x183/0x7e0 [ 1004.054366][T32484] __x64_sys_bpf+0x41/0x50 [ 1004.054422][T32484] x64_sys_call+0x10cb/0x3020 [ 1004.054457][T32484] do_syscall_64+0x12c/0x370 [ 1004.054536][T32484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.054566][T32484] RIP: 0033:0x7faa6e50bf79 [ 1004.054656][T32484] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1004.054679][T32484] RSP: 002b:00007faa6cf67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1004.054933][T32484] RAX: ffffffffffffffda RBX: 00007faa6e785fa0 RCX: 00007faa6e50bf79 [ 1004.054954][T32484] RDX: 0000000000000050 RSI: 0000200000000200 RDI: 000000000000000a [ 1004.054970][T32484] RBP: 00007faa6cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 1004.054984][T32484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1004.055045][T32484] R13: 00007faa6e786038 R14: 00007faa6e785fa0 R15: 00007ffdbf7e0798 [ 1004.055074][T32484] [ 1004.270502][T32337] hsr_slave_0: entered promiscuous mode [ 1004.296381][T32337] hsr_slave_1: entered promiscuous mode [ 1004.304642][T32337] debugfs: 'hsr0' already exists in 'hsr' [ 1004.310530][T32337] Cannot create hsr debugfs directory [ 1004.356277][T32494] FAULT_INJECTION: forcing a failure. [ 1004.356277][T32494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1004.390950][T32494] CPU: 1 UID: 0 PID: 32494 Comm: syz.0.7550 Tainted: G W syzkaller #0 PREEMPT(full) [ 1004.390993][T32494] Tainted: [W]=WARN [ 1004.391002][T32494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1004.391061][T32494] Call Trace: [ 1004.391068][T32494] [ 1004.391077][T32494] __dump_stack+0x1d/0x30 [ 1004.391111][T32494] dump_stack_lvl+0x95/0xd0 [ 1004.391140][T32494] dump_stack+0x15/0x1b [ 1004.391168][T32494] should_fail_ex+0x263/0x280 [ 1004.391258][T32494] should_fail+0xb/0x20 [ 1004.391293][T32494] should_fail_usercopy+0x1a/0x20 [ 1004.391360][T32494] _copy_from_user+0x1c/0xb0 [ 1004.391478][T32494] ___sys_sendmsg+0xc1/0x1e0 [ 1004.391529][T32494] __x64_sys_sendmsg+0xd4/0x160 [ 1004.391589][T32494] x64_sys_call+0x194c/0x3020 [ 1004.391625][T32494] do_syscall_64+0x12c/0x370 [ 1004.391739][T32494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.391792][T32494] RIP: 0033:0x7faa6e50bf79 [ 1004.391895][T32494] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1004.391921][T32494] RSP: 002b:00007faa6cf67028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1004.392103][T32494] RAX: ffffffffffffffda RBX: 00007faa6e785fa0 RCX: 00007faa6e50bf79 [ 1004.392123][T32494] RDX: 0000000000000040 RSI: 0000200000009b40 RDI: 0000000000000003 [ 1004.392140][T32494] RBP: 00007faa6cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 1004.392158][T32494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1004.392217][T32494] R13: 00007faa6e786038 R14: 00007faa6e785fa0 R15: 00007ffdbf7e0798 [ 1004.392288][T32494] [ 1004.663066][ T28] kauditd_printk_skb: 156 callbacks suppressed [ 1004.663082][ T28] audit: type=1326 audit(1770822250.052:14963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1004.754821][T32489] netlink: 'syz.5.7549': attribute type 4 has an invalid length. [ 1004.773099][T32507] netlink: 'syz.4.7547': attribute type 4 has an invalid length. [ 1004.779851][T32507] netlink: 'syz.4.7547': attribute type 4 has an invalid length. [ 1004.813321][ T28] audit: type=1326 audit(1770822250.102:14964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32486 comm="syz.4.7547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb5ab0dbf79 code=0x7ffc0000 [ 1004.849904][T32500] netlink: 'syz.5.7549': attribute type 4 has an invalid length. [ 1004.860764][ T28] audit: type=1326 audit(1770822250.102:14965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32486 comm="syz.4.7547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fb5ab0dbf79 code=0x7ffc0000 [ 1004.886989][ T28] audit: type=1326 audit(1770822250.102:14966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1004.934000][T32502] loop0: detected capacity change from 0 to 512 [ 1004.975661][ T28] audit: type=1326 audit(1770822250.152:14968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1005.043275][ T28] audit: type=1326 audit(1770822250.152:14969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1005.133229][ T28] audit: type=1326 audit(1770822250.152:14970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1005.162227][T32510] loop5: detected capacity change from 0 to 8192 [ 1005.199461][T32492] loop4: detected capacity change from 0 to 512 [ 1005.213955][ T28] audit: type=1326 audit(1770822250.152:14971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1005.289285][ T28] audit: type=1326 audit(1770822250.162:14972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32488 comm="syz.5.7549" exe="/root/syz-executor" sig=0 arch=c000003e syscall=20 compat=0 ip=0x7f4a193cbf79 code=0x7ffc0000 [ 1005.327014][T32492] EXT4-fs: Ignoring removed nobh option [ 1005.334155][T32492] ext4: Unknown parameter 'barrier..' [ 1005.360790][ T28] audit: type=1326 audit(1770822250.142:14967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32486 comm="syz.4.7547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb5ab07d399 code=0x7ffc0000 [ 1005.406248][T32502] FAULT_INJECTION: forcing a failure. [ 1005.406248][T32502] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.437404][T32502] CPU: 1 UID: 0 PID: 32502 Comm: syz.0.7551 Tainted: G W syzkaller #0 PREEMPT(full) [ 1005.437519][T32502] Tainted: [W]=WARN [ 1005.437529][T32502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1005.437546][T32502] Call Trace: [ 1005.437555][T32502] [ 1005.437565][T32502] __dump_stack+0x1d/0x30 [ 1005.437650][T32502] dump_stack_lvl+0x95/0xd0 [ 1005.437949][T32502] dump_stack+0x15/0x1b [ 1005.437995][T32502] should_fail_ex+0x263/0x280 [ 1005.438035][T32502] should_failslab+0x8c/0xb0 [ 1005.438090][T32502] __kmalloc_cache_noprof+0x64/0x4a0 [ 1005.438142][T32502] ? alloc_fdtable+0x8c/0x1d0 [ 1005.438187][T32502] alloc_fdtable+0x8c/0x1d0 [ 1005.438274][T32502] dup_fd+0x492/0x510 [ 1005.438375][T32502] ? _raw_spin_unlock+0x9/0x30 [ 1005.438405][T32502] ksys_unshare+0x343/0x6d0 [ 1005.438441][T32502] ? ksys_write+0x194/0x1a0 [ 1005.438478][T32502] __x64_sys_unshare+0x1f/0x30 [ 1005.438513][T32502] x64_sys_call+0x1cef/0x3020 [ 1005.438556][T32502] do_syscall_64+0x12c/0x370 [ 1005.438684][T32502] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1005.438778][T32502] RIP: 0033:0x7faa6e50bf79 [ 1005.438817][T32502] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1005.438842][T32502] RSP: 002b:00007faa6cf67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1005.438879][T32502] RAX: ffffffffffffffda RBX: 00007faa6e785fa0 RCX: 00007faa6e50bf79 [ 1005.439016][T32502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c020400 [ 1005.439041][T32502] RBP: 00007faa6cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 1005.439060][T32502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1005.439078][T32502] R13: 00007faa6e786038 R14: 00007faa6e785fa0 R15: 00007ffdbf7e0798 [ 1005.439110][T32502] [ 1005.688087][T32507] loop4: detected capacity change from 0 to 1024 [ 1005.696825][T32507] EXT4-fs: inline encryption not supported [ 1005.740977][T32507] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1005.849638][T32128] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1005.949423][ T7236] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.023978][T32527] loop4: detected capacity change from 0 to 512 [ 1006.027669][T32337] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1006.079875][ T7236] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.091756][T32527] EXT4-fs (loop4): 1 orphan inode deleted [ 1006.103409][T32527] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1006.129337][T32337] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1006.146005][T32337] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1006.187756][T32337] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1006.221349][T32533] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1006.257191][T32533] FAT-fs (loop0): Filesystem has been set read-only [ 1006.266298][ T7236] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.272963][T32533] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1006.285255][T32533] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1006.286666][T32128] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1006.297322][T32533] syz.0.7556: attempt to access beyond end of device [ 1006.297322][T32533] loop0: rw=8388608, sector=57847, nr_sectors = 1 limit=8192 [ 1006.338182][T32533] Buffer I/O error on dev loop0, logical block 57847, async page read [ 1006.365704][T32533] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1006.376287][ T7236] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.388042][T32533] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1006.396064][T32533] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1006.409910][T32539] netlink: 'syz.1.7557': attribute type 4 has an invalid length. [ 1006.434974][T32337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1006.475274][T32548] netlink: 'syz.1.7557': attribute type 4 has an invalid length. [ 1006.605941][T32337] 8021q: adding VLAN 0 to HW filter on device team0 [ 1006.627259][ T931] bridge0: port 1(bridge_slave_0) entered blocking state [ 1006.634933][ T931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1006.652943][T32557] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1006.666201][T32557] FAT-fs (loop0): Filesystem has been set read-only [ 1006.677726][T32557] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1006.692003][T32557] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1006.704075][ T931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1006.711440][ T931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1006.739731][T32557] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1006.784460][T32337] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1006.795766][T32337] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1006.808901][ T7236] bridge_slave_1: left allmulticast mode [ 1006.822344][ T7236] bridge_slave_1: left promiscuous mode [ 1006.833262][ T7236] bridge0: port 2(bridge_slave_1) entered disabled state [ 1006.849756][ T7236] bridge_slave_0: left allmulticast mode [ 1006.855606][ T7236] bridge_slave_0: left promiscuous mode [ 1006.868109][ T7236] bridge0: port 1(bridge_slave_0) entered disabled state [ 1006.976021][ T7236] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1006.986294][ T7236] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1006.998009][ T7236] bond0 (unregistering): Released all slaves [ 1007.036164][T32563] syzkaller0: entered promiscuous mode [ 1007.042133][T32563] syzkaller0: entered allmulticast mode [ 1007.085576][ T7236] hsr_slave_0: left promiscuous mode [ 1007.096939][ T7236] hsr_slave_1: left promiscuous mode [ 1007.102815][ T7236] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1007.110396][ T7236] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1007.118788][ T7236] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1007.127238][ T7236] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1007.141283][ T7236] veth1_macvtap: left promiscuous mode [ 1007.147047][ T7236] veth0_macvtap: left promiscuous mode [ 1007.153334][ T7236] veth1_vlan: left promiscuous mode [ 1007.159021][ T7236] veth0_vlan: left promiscuous mode [ 1007.247197][ T7236] team0 (unregistering): Port device team_slave_1 removed [ 1007.260933][ T7236] team0 (unregistering): Port device team_slave_0 removed [ 1007.395673][T32528] chnl_net:caif_netlink_parms(): no params data found [ 1007.460054][T32574] netlink: 'syz.4.7566': attribute type 4 has an invalid length. [ 1007.516539][T32337] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1007.547391][T32588] netlink: 'syz.4.7566': attribute type 4 has an invalid length. [ 1007.562052][T32587] set_capacity_and_notify: 2 callbacks suppressed [ 1007.562074][T32587] loop0: detected capacity change from 0 to 2048 [ 1007.630666][T32587] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1007.730712][T32596] loop4: detected capacity change from 0 to 8192 [ 1007.743270][T32528] bridge0: port 1(bridge_slave_0) entered blocking state [ 1007.751224][T32528] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.761968][T32528] bridge_slave_0: entered allmulticast mode [ 1007.768708][T32528] bridge_slave_0: entered promiscuous mode [ 1007.775901][T32528] bridge0: port 2(bridge_slave_1) entered blocking state [ 1007.783937][T32528] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.791346][T32528] bridge_slave_1: entered allmulticast mode [ 1007.798551][T32528] bridge_slave_1: entered promiscuous mode [ 1007.870101][T32528] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1007.886190][T32528] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1008.008919][T32528] team0: Port device team_slave_0 added [ 1008.016697][T32528] team0: Port device team_slave_1 added [ 1008.054137][T32528] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1008.074421][T32528] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1008.111860][T32528] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1008.173334][T32528] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1008.180724][T32528] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1008.269066][T32528] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1008.361342][T32528] hsr_slave_0: entered promiscuous mode [ 1008.377440][T32528] hsr_slave_1: entered promiscuous mode [ 1008.387255][T32528] debugfs: 'hsr0' already exists in 'hsr' [ 1008.393923][T32528] Cannot create hsr debugfs directory [ 1008.411296][T32337] veth0_vlan: entered promiscuous mode [ 1008.440173][T32337] veth1_vlan: entered promiscuous mode [ 1008.515762][T32337] veth0_macvtap: entered promiscuous mode [ 1008.541975][T30435] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1008.558250][T32337] veth1_macvtap: entered promiscuous mode [ 1008.630736][T32337] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1008.649410][T32337] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1008.677339][T32646] usb usb1: usbfs: process 32646 (syz.0.7572) did not claim interface 0 before use [ 1008.699894][ T931] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.723000][ T931] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.745591][ T931] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.778673][ T931] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.937155][ T8934] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.060125][ T8934] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.198485][ T8934] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.267769][T32666] netlink: 'syz.0.7578': attribute type 4 has an invalid length. [ 1009.287041][ T8934] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.294228][T32680] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7530'. [ 1009.307761][T32685] netlink: 'syz.0.7578': attribute type 4 has an invalid length. [ 1009.505509][T32690] loop0: detected capacity change from 0 to 8192 [ 1009.552372][T32528] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1009.584829][T32528] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1009.652310][T32528] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1009.662004][T32528] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1009.673676][ T28] kauditd_printk_skb: 317 callbacks suppressed [ 1009.673693][ T28] audit: type=1326 audit(1770822255.084:15290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32697 comm="syz.7.7580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3965a4d399 code=0x7ffc0000 [ 1009.778699][ T28] audit: type=1326 audit(1770822255.114:15291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32697 comm="syz.7.7580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1009.804449][ T28] audit: type=1326 audit(1770822255.134:15292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32697 comm="syz.7.7580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1009.831550][ T28] audit: type=1326 audit(1770822255.154:15294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32665 comm="syz.0.7578" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7faa6e4cc84e code=0x7ffc0000 [ 1009.864181][ T8934] bridge_slave_1: left allmulticast mode [ 1009.875116][ T8934] bridge_slave_1: left promiscuous mode [ 1009.892757][ T8934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.900411][ T28] audit: type=1326 audit(1770822255.154:15293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32697 comm="syz.7.7580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1009.936351][T32698] loop7: detected capacity change from 0 to 512 [ 1009.937361][ T8934] bridge_slave_0: left allmulticast mode [ 1009.968999][T32698] EXT4-fs: Ignoring removed nobh option [ 1009.969128][ T8934] bridge_slave_0: left promiscuous mode [ 1009.984759][ T28] audit: type=1326 audit(1770822255.164:15295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32697 comm="syz.7.7580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1010.011428][T32698] ext4: Unknown parameter 'barrier..' [ 1010.024924][ T8934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.040349][ T28] audit: type=1326 audit(1770822255.174:15296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32697 comm="syz.7.7580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f3965aabce2 code=0x7ffc0000 [ 1010.118315][ T28] audit: type=1326 audit(1770822255.184:15297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32665 comm="syz.0.7578" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7faa6e50bda7 code=0x7ffc0000 [ 1010.174662][ T28] audit: type=1326 audit(1770822255.184:15298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32665 comm="syz.0.7578" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7faa6e4cc84e code=0x7ffc0000 [ 1010.256539][ T28] audit: type=1326 audit(1770822255.214:15299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32665 comm="syz.0.7578" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7faa6e4cc84e code=0x7ffc0000 [ 1010.376362][ T8934] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1010.387744][ T8934] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1010.420811][ T8934] bond0 (unregistering): Released all slaves [ 1010.450440][T32698] loop7: detected capacity change from 0 to 1024 [ 1010.502720][T32698] EXT4-fs: inline encryption not supported [ 1010.543629][ T8934] hsr_slave_0: left promiscuous mode [ 1010.552059][ T8934] hsr_slave_1: left promiscuous mode [ 1010.564224][ T8934] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1010.586422][ T8934] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1010.600757][ T8934] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1010.608296][ T8934] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1010.614079][T32698] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1010.646308][ T8934] veth1_macvtap: left promiscuous mode [ 1010.656558][ T8934] veth0_macvtap: left promiscuous mode [ 1010.664833][ T8934] veth1_vlan: left promiscuous mode [ 1010.670104][ T8934] veth0_vlan: left promiscuous mode [ 1010.746922][T32766] netlink: 'syz.1.7586': attribute type 4 has an invalid length. [ 1010.773810][T32337] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1010.800012][T32767] netlink: 'syz.1.7586': attribute type 4 has an invalid length. [ 1010.846895][ T8934] team0 (unregistering): Port device team_slave_1 removed [ 1010.861756][ T8934] team0 (unregistering): Port device team_slave_0 removed [ 1010.975750][T32672] chnl_net:caif_netlink_parms(): no params data found [ 1011.075154][T32528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1011.086559][T32528] 8021q: adding VLAN 0 to HW filter on device team0 [ 1011.097016][T32672] bridge0: port 1(bridge_slave_0) entered blocking state [ 1011.106230][T32672] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.115751][T32672] bridge_slave_0: entered allmulticast mode [ 1011.125075][T32672] bridge_slave_0: entered promiscuous mode [ 1011.133727][T32672] bridge0: port 2(bridge_slave_1) entered blocking state [ 1011.142848][T32672] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.150595][T32672] bridge_slave_1: entered allmulticast mode [ 1011.158153][T32672] bridge_slave_1: entered promiscuous mode [ 1011.198608][T32672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1011.235118][T32672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1011.264817][ T931] bridge0: port 1(bridge_slave_0) entered blocking state [ 1011.272107][ T931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1011.290241][ T931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1011.297642][ T931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1011.361823][T32672] team0: Port device team_slave_0 added [ 1011.438835][T32672] team0: Port device team_slave_1 added [ 1011.495798][T32672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1011.521035][T32672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1011.591981][T32672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1011.611085][T32672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1011.618166][T32672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1011.679473][T32672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1011.702132][ T8934] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.777026][T32528] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1011.811984][ T8934] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.818859][ T375] 9p: Bad value for 'wfdno' [ 1011.884148][T32672] hsr_slave_0: entered promiscuous mode [ 1011.895893][T32672] hsr_slave_1: entered promiscuous mode [ 1011.920318][T32672] debugfs: 'hsr0' already exists in 'hsr' [ 1011.936425][T32672] Cannot create hsr debugfs directory [ 1011.971064][ T8934] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1012.063169][ T8934] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1012.343594][ T337] chnl_net:caif_netlink_parms(): no params data found [ 1012.361666][ T8934] bridge_slave_1: left allmulticast mode [ 1012.367381][ T8934] bridge_slave_1: left promiscuous mode [ 1012.380557][ T8934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.393398][ T8934] bridge_slave_0: left allmulticast mode [ 1012.399109][ T8934] bridge_slave_0: left promiscuous mode [ 1012.420100][ T8934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.563067][ T8934] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1012.582046][ T8934] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1012.597721][ T8934] bond0 (unregistering): Released all slaves [ 1012.663875][ T8934] hsr_slave_0: left promiscuous mode [ 1012.678957][ T8934] hsr_slave_1: left promiscuous mode [ 1012.690018][ T8934] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1012.698241][ T8934] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1012.727489][ T8934] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1012.738657][ T8934] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1012.752207][ T8934] veth1_macvtap: left promiscuous mode [ 1012.758357][ T8934] veth0_macvtap: left promiscuous mode [ 1012.765393][ T8934] veth1_vlan: left promiscuous mode [ 1012.771844][ T8934] veth0_vlan: left promiscuous mode [ 1012.863718][ T8934] team0 (unregistering): Port device team_slave_1 removed [ 1012.878498][ T8934] team0 (unregistering): Port device team_slave_0 removed [ 1012.958009][T32528] veth0_vlan: entered promiscuous mode [ 1013.015423][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 1013.025115][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 1013.033030][ T337] bridge_slave_0: entered allmulticast mode [ 1013.040259][ T337] bridge_slave_0: entered promiscuous mode [ 1013.049816][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 1013.061914][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.079777][ T337] bridge_slave_1: entered allmulticast mode [ 1013.087976][ T337] bridge_slave_1: entered promiscuous mode [ 1013.105858][ T344] loop7: detected capacity change from 0 to 8192 [ 1013.136095][T32528] veth1_vlan: entered promiscuous mode [ 1013.171744][ T337] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1013.192549][ T337] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1013.228077][T32528] veth0_macvtap: entered promiscuous mode [ 1013.258438][T32528] veth1_macvtap: entered promiscuous mode [ 1013.271262][T32672] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1013.283315][ T337] team0: Port device team_slave_0 added [ 1013.299194][ T337] team0: Port device team_slave_1 added [ 1013.313373][T32672] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1013.327036][T32672] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1013.353353][T32528] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1013.371562][T32672] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1013.419861][ T337] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1013.426857][ T337] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1013.454082][ T337] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1013.468852][T32528] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1013.496299][ T931] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.506746][ T931] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.527438][ T337] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1013.537591][ T337] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1013.572150][ T337] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1013.590127][ T931] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.641841][ T931] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.695076][ T337] hsr_slave_0: entered promiscuous mode [ 1013.722391][ T337] hsr_slave_1: entered promiscuous mode [ 1013.865198][T32672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1013.908430][ T497] loop9: detected capacity change from 0 to 512 [ 1013.916280][ T510] netlink: 'syz.1.7608': attribute type 4 has an invalid length. [ 1013.957635][ T492] netlink: 'syz.7.7601': attribute type 4 has an invalid length. [ 1013.994353][ T513] netlink: 'syz.7.7601': attribute type 4 has an invalid length. [ 1014.007366][ T486] netlink: 'syz.1.7608': attribute type 4 has an invalid length. [ 1014.019728][T32672] 8021q: adding VLAN 0 to HW filter on device team0 [ 1014.188328][ T515] loop7: detected capacity change from 0 to 8192 [ 1014.389110][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.396440][ T7236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1014.428874][ T7236] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.436389][ T7236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1014.644325][ T337] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1014.683562][ T337] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1014.701735][ T28] kauditd_printk_skb: 261 callbacks suppressed [ 1014.701753][ T28] audit: type=1326 audit(1770822260.087:15561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=517 comm="syz.7.7602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1014.734679][ T522] netlink: 'syz.7.7602': attribute type 4 has an invalid length. [ 1014.748388][ T545] netlink: 'syz.7.7602': attribute type 4 has an invalid length. [ 1014.761739][ T337] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1014.777043][T32672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1014.784395][ T28] audit: type=1326 audit(1770822260.117:15562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=517 comm="syz.7.7602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3965a4d399 code=0x7ffc0000 [ 1014.792009][ T538] loop9: detected capacity change from 0 to 8192 [ 1014.840016][ T28] audit: type=1326 audit(1770822260.117:15563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=517 comm="syz.7.7602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=20 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1015.032855][ T28] audit: type=1326 audit(1770822260.437:15564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=517 comm="syz.7.7602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1015.067556][ T549] loop7: detected capacity change from 0 to 8192 [ 1015.068433][ T337] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1015.095672][ T28] audit: type=1326 audit(1770822260.447:15565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=517 comm="syz.7.7602" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3965aabf79 code=0x7ffc0000 [ 1015.125572][ T28] audit: type=1326 audit(1770822260.507:15566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=567 comm="syz.1.7612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1015.156886][ T28] audit: type=1326 audit(1770822260.527:15567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=567 comm="syz.1.7612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1015.185535][ T28] audit: type=1326 audit(1770822260.527:15568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=567 comm="syz.1.7612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1015.302575][ T28] audit: type=1326 audit(1770822260.537:15569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=567 comm="syz.1.7612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1015.334571][ T337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1015.354468][ T568] netlink: 'syz.1.7612': attribute type 4 has an invalid length. [ 1015.380180][ T28] audit: type=1326 audit(1770822260.557:15570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=567 comm="syz.1.7612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1015.383253][ T337] 8021q: adding VLAN 0 to HW filter on device team0 [ 1015.418693][ T587] netlink: 'syz.1.7612': attribute type 4 has an invalid length. [ 1015.560616][ T566] loop9: detected capacity change from 0 to 256 [ 1015.677468][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.685037][ T7236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.726363][ T605] Cannot find add_set index 0 as target [ 1015.820659][T32672] veth0_vlan: entered promiscuous mode [ 1015.840642][ T931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.848536][ T931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1015.888478][T32672] veth1_vlan: entered promiscuous mode [ 1015.971179][T32672] veth0_macvtap: entered promiscuous mode [ 1015.983288][T32672] veth1_macvtap: entered promiscuous mode [ 1016.010750][T32672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1016.034133][T32672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1016.068065][ T7236] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1016.261909][ T612] team_slave_0: entered promiscuous mode [ 1016.268488][ T612] team_slave_1: entered promiscuous mode [ 1016.296043][ T612] macvtap1: entered promiscuous mode [ 1016.303493][ T612] team0: entered promiscuous mode [ 1016.346293][ T612] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1016.372804][ T612] team0: Device macvtap1 is already an upper device of the team interface [ 1016.405745][ T612] team0: left promiscuous mode [ 1016.420355][ T612] team_slave_0: left promiscuous mode [ 1016.428091][ T612] team_slave_1: left promiscuous mode [ 1016.597093][ T7236] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1016.622836][ T337] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1016.637698][ T7236] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1016.649415][ T7236] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1016.833835][ T6274] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.952918][ T6274] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1017.004000][ T337] veth0_vlan: entered promiscuous mode [ 1017.035185][ T337] veth1_vlan: entered promiscuous mode [ 1017.072605][ T6274] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1017.098970][ T692] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1017.121547][ T337] veth0_macvtap: entered promiscuous mode [ 1017.144733][ T686] netlink: 'syz.9.7621': attribute type 10 has an invalid length. [ 1017.160882][ T686] netlink: 32 bytes leftover after parsing attributes in process `syz.9.7621'. [ 1017.191194][ T695] netlink: 'syz.2.7577': attribute type 4 has an invalid length. [ 1017.201744][ T6274] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1017.219542][ T337] veth1_macvtap: entered promiscuous mode [ 1017.261442][ T337] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1017.380119][ T716] loop2: detected capacity change from 0 to 512 [ 1017.407530][ T716] EXT4-fs: Ignoring removed nobh option [ 1017.413297][ T716] ext4: Unknown parameter 'barrier..' [ 1017.425921][ T337] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1017.525941][ T7236] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1017.552215][ T7236] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1017.773122][ T674] loop2: detected capacity change from 0 to 1024 [ 1017.791990][ T7236] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1017.804700][ T719] loop9: detected capacity change from 0 to 8192 [ 1017.871974][ T7236] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1017.902728][ T6274] bridge_slave_1: left allmulticast mode [ 1017.915614][ T674] EXT4-fs: inline encryption not supported [ 1017.926978][ T6274] bridge_slave_1: left promiscuous mode [ 1017.965644][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.009961][ T6274] bridge_slave_0: left allmulticast mode [ 1018.015775][ T6274] bridge_slave_0: left promiscuous mode [ 1018.070893][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.136424][ T674] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1018.420963][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1018.447273][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1018.476526][ T6274] bond0 (unregistering): Released all slaves [ 1018.519888][ T786] loop3: detected capacity change from 0 to 512 [ 1018.535320][ T786] EXT4-fs: Ignoring removed nobh option [ 1018.550152][ T786] ext4: Unknown parameter 'barrier..' [ 1018.554179][ T6274] hsr_slave_0: left promiscuous mode [ 1018.578141][ T6274] hsr_slave_1: left promiscuous mode [ 1018.584563][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1018.603494][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1018.612791][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1018.622780][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1018.649867][ T6274] veth1_macvtap: left promiscuous mode [ 1018.656275][ T6274] veth0_macvtap: left promiscuous mode [ 1018.662531][ T6274] veth1_vlan: left promiscuous mode [ 1018.667955][ T6274] veth0_vlan: left promiscuous mode [ 1018.814414][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1018.837751][ T6274] team0 (unregistering): Port device team_slave_0 removed [ 1018.961156][T32672] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1019.022205][ T790] team_slave_0: entered promiscuous mode [ 1019.028473][ T790] team_slave_1: entered promiscuous mode [ 1019.052669][ T790] macvtap1: entered promiscuous mode [ 1019.059538][ T790] team0: entered promiscuous mode [ 1019.066854][ T790] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1019.075473][ T790] team0: Device macvtap1 is already an upper device of the team interface [ 1019.097735][ T790] team0: left promiscuous mode [ 1019.103921][ T790] team_slave_0: left promiscuous mode [ 1019.109937][ T790] team_slave_1: left promiscuous mode [ 1019.327590][ T839] 9p: Bad value for 'rfdno' [ 1019.338842][ T683] chnl_net:caif_netlink_parms(): no params data found [ 1019.340579][ T832] loop2: detected capacity change from 0 to 512 [ 1019.548166][ T836] validate_nla: 5 callbacks suppressed [ 1019.548398][ T836] netlink: 'syz.1.7635': attribute type 4 has an invalid length. [ 1019.587922][ T683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.596493][ T683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.604595][ T683] bridge_slave_0: entered allmulticast mode [ 1019.612125][ T865] netlink: 'syz.1.7635': attribute type 4 has an invalid length. [ 1019.622019][ T832] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1019.641637][ T683] bridge_slave_0: entered promiscuous mode [ 1019.656562][ T6274] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1019.670109][ T832] ext4 filesystem being mounted at /1/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1019.836974][ T28] kauditd_printk_skb: 257 callbacks suppressed [ 1019.836991][ T28] audit: type=1326 audit(1770822265.259:15828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=835 comm="syz.1.7635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1019.873951][ T28] audit: type=1326 audit(1770822265.289:15829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=835 comm="syz.1.7635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1019.958035][ T683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.969670][ T683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.979992][ T683] bridge_slave_1: entered allmulticast mode [ 1019.983531][T32672] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1019.997669][ T683] bridge_slave_1: entered promiscuous mode [ 1020.011358][ T28] audit: type=1326 audit(1770822265.429:15830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=835 comm="syz.1.7635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fb35fe7bf79 code=0x7ffc0000 [ 1020.067542][ T683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1020.092721][ T683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1020.101768][ T28] audit: type=1326 audit(1770822265.469:15832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=899 comm="syz.2.7637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f567397bf79 code=0x7ffc0000 [ 1020.157886][ T6274] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1020.181821][ T28] audit: type=1326 audit(1770822265.469:15833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=899 comm="syz.2.7637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f567397bf79 code=0x7ffc0000 [ 1020.245815][ T28] audit: type=1326 audit(1770822265.469:15834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=899 comm="syz.2.7637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f567397bf79 code=0x7ffc0000 [ 1020.295812][ T6274] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1020.315199][ T28] audit: type=1326 audit(1770822265.429:15831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=835 comm="syz.1.7635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb35fe7bce2 code=0x7ffc0000 [ 1020.343319][ T28] audit: type=1326 audit(1770822265.469:15835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=902 comm="syz.2.7637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f567393c84e code=0x7ffc0000 [ 1020.371289][ T923] netlink: 'syz.2.7637': attribute type 4 has an invalid length. [ 1020.381816][ T683] team0: Port device team_slave_0 added [ 1020.388102][ T28] audit: type=1326 audit(1770822265.479:15836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=899 comm="syz.2.7637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f567397bf79 code=0x7ffc0000 [ 1020.420029][ T683] team0: Port device team_slave_1 added [ 1020.434256][ T28] audit: type=1326 audit(1770822265.509:15837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=899 comm="syz.2.7637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f567397bf79 code=0x7ffc0000 [ 1020.448577][ T901] netlink: 'syz.2.7637': attribute type 4 has an invalid length. [ 1020.461389][ T925] netlink: 'syz.3.7640': attribute type 4 has an invalid length. [ 1020.509685][ T918] netlink: 'syz.3.7640': attribute type 4 has an invalid length. [ 1020.632360][ T918] loop3: detected capacity change from 0 to 8192 [ 1020.641370][ T919] loop2: detected capacity change from 0 to 8192 [ 1020.788067][ T6274] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1020.804884][ T842] chnl_net:caif_netlink_parms(): no params data found [ 1020.828669][ T683] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1020.836186][ T683] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1020.862951][ T683] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1020.912430][ T938] team_slave_0: entered promiscuous mode [ 1020.918907][ T938] team_slave_1: entered promiscuous mode [ 1020.926644][ T938] macvtap1: entered promiscuous mode [ 1020.932308][ T938] team0: entered promiscuous mode [ 1020.952356][ T938] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1020.962827][ T938] team0: Device macvtap1 is already an upper device of the team interface [ 1020.976035][ T938] team0: left promiscuous mode [ 1020.983079][ T938] team_slave_0: left promiscuous mode [ 1020.989118][ T938] team_slave_1: left promiscuous mode [ 1021.031641][ T683] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1021.039944][ T683] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1021.068979][ T683] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1021.137871][ T842] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.147993][ T842] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.157081][ T842] bridge_slave_0: entered allmulticast mode [ 1021.164162][ T842] bridge_slave_0: entered promiscuous mode [ 1021.192951][ T842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.202331][ T842] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.210667][ T842] bridge_slave_1: entered allmulticast mode [ 1021.220651][ T842] bridge_slave_1: entered promiscuous mode [ 1021.251059][ T683] hsr_slave_0: entered promiscuous mode [ 1021.258073][ T683] hsr_slave_1: entered promiscuous mode [ 1021.264595][ T683] debugfs: 'hsr0' already exists in 'hsr' [ 1021.270731][ T683] Cannot create hsr debugfs directory [ 1021.307487][ T842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1021.337026][ T842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1021.367067][ T6274] bridge_slave_1: left allmulticast mode [ 1021.373134][ T6274] bridge_slave_1: left promiscuous mode [ 1021.380125][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.397183][ T6274] bridge_slave_0: left allmulticast mode [ 1021.402991][ T6274] bridge_slave_0: left promiscuous mode [ 1021.410449][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.527997][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1021.538233][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1021.548813][ T6274] bond0 (unregistering): Released all slaves [ 1021.566783][ T969] netlink: 'syz.1.7651': attribute type 4 has an invalid length. [ 1021.603200][ T967] netlink: 'syz.1.7651': attribute type 4 has an invalid length. [ 1021.619509][ T842] team0: Port device team_slave_0 added [ 1021.627230][ T842] team0: Port device team_slave_1 added [ 1021.641023][ T6274] hsr_slave_0: left promiscuous mode [ 1021.647402][ T6274] hsr_slave_1: left promiscuous mode [ 1021.653290][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1021.660818][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1021.685447][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1021.692978][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1021.711582][ T6274] veth1_macvtap: left promiscuous mode [ 1021.718790][ T6274] veth0_macvtap: left promiscuous mode [ 1021.725780][ T6274] veth1_vlan: left promiscuous mode [ 1021.731651][ T6274] veth0_vlan: left promiscuous mode [ 1021.817173][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1021.828217][ T6274] team0 (unregistering): Port device team_slave_0 removed [ 1021.945681][ T842] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1021.952681][ T842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1021.991939][ T842] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1022.117466][ T983] team_slave_0: entered promiscuous mode [ 1022.123727][ T983] team_slave_1: entered promiscuous mode [ 1022.130603][ T983] macvtap1: entered promiscuous mode [ 1022.136438][ T983] team0: entered promiscuous mode [ 1022.150371][ T983] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1022.160732][ T983] team0: Device macvtap1 is already an upper device of the team interface [ 1022.175881][ T983] team0: left promiscuous mode [ 1022.182759][ T983] team_slave_0: left promiscuous mode [ 1022.188722][ T983] team_slave_1: left promiscuous mode [ 1022.222740][ T842] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1022.232027][ T842] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1022.259136][ T842] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1022.291658][ T3303] ================================================================== [ 1022.299814][ T3303] BUG: KCSAN: data-race in set_nlink / set_nlink [ 1022.306372][ T3303] [ 1022.308728][ T3303] read to 0xffff88818cc3f858 of 4 bytes by task 2997 on cpu 1: [ 1022.316615][ T3303] set_nlink+0x29/0xb0 [ 1022.321008][ T3303] kernfs_iop_permission+0x1e2/0x220 [ 1022.326618][ T3303] inode_permission+0x31f/0x3b0 [ 1022.331792][ T3303] link_path_walk+0x779/0xe30 [ 1022.336691][ T3303] path_openat+0x1c6/0x2050 [ 1022.341242][ T3303] do_file_open+0x16c/0x290 [ 1022.345972][ T3303] do_sys_openat2+0x94/0x130 [ 1022.350904][ T3303] __x64_sys_openat+0xf2/0x120 [ 1022.355807][ T3303] x64_sys_call+0x1e39/0x3020 [ 1022.360561][ T3303] do_syscall_64+0x12c/0x370 [ 1022.365190][ T3303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1022.371317][ T3303] [ 1022.373681][ T3303] write to 0xffff88818cc3f858 of 4 bytes by task 3303 on cpu 0: [ 1022.381759][ T3303] set_nlink+0x99/0xb0 [ 1022.386416][ T3303] kernfs_iop_permission+0x1e2/0x220 [ 1022.391937][ T3303] inode_permission+0x31f/0x3b0 [ 1022.396919][ T3303] link_path_walk+0x779/0xe30 [ 1022.401624][ T3303] path_openat+0x1c6/0x2050 [ 1022.407469][ T3303] do_file_open+0x16c/0x290 [ 1022.417179][ T3303] do_sys_openat2+0x94/0x130 [ 1022.422061][ T3303] __x64_sys_openat+0xf2/0x120 [ 1022.427390][ T3303] x64_sys_call+0x1e39/0x3020 [ 1022.432277][ T3303] do_syscall_64+0x12c/0x370 [ 1022.437372][ T3303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1022.443478][ T3303] [ 1022.446094][ T3303] value changed: 0x00000005 -> 0x00000004 [ 1022.452203][ T3303] [ 1022.454696][ T3303] Reported by Kernel Concurrency Sanitizer on: [ 1022.461504][ T3303] CPU: 0 UID: 0 PID: 3303 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(full) [ 1022.472407][ T3303] Tainted: [W]=WARN [ 1022.476360][ T3303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1022.487417][ T3303] ================================================================== [ 1022.822930][ T6274] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1022.925789][ T6274] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.035722][ T6274] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.114597][ T6274] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.180665][ T6274] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.229464][ T6274] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.278955][ T6274] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.333716][ T6274] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.405006][ T6274] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.457252][ T6274] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.487998][ T6274] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.537520][ T6274] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1023.609731][ T6274] bridge_slave_1: left allmulticast mode [ 1023.616282][ T6274] bridge_slave_1: left promiscuous mode [ 1023.622007][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.631023][ T6274] bridge_slave_0: left allmulticast mode [ 1023.637160][ T6274] bridge_slave_0: left promiscuous mode [ 1023.643425][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.652648][ T6274] bridge_slave_1: left allmulticast mode [ 1023.658567][ T6274] bridge_slave_1: left promiscuous mode [ 1023.664657][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.673378][ T6274] bridge_slave_0: left allmulticast mode [ 1023.679720][ T6274] bridge_slave_0: left promiscuous mode [ 1023.686079][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.696232][ T6274] bridge_slave_1: left allmulticast mode [ 1023.701917][ T6274] bridge_slave_1: left promiscuous mode [ 1023.708090][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.716440][ T6274] bridge_slave_0: left allmulticast mode [ 1023.722260][ T6274] bridge_slave_0: left promiscuous mode [ 1023.728481][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.738595][ T6274] bridge_slave_1: left allmulticast mode [ 1023.744556][ T6274] bridge_slave_1: left promiscuous mode [ 1023.750421][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.758846][ T6274] bridge_slave_0: left allmulticast mode [ 1023.764619][ T6274] bridge_slave_0: left promiscuous mode [ 1023.770831][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.955941][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1023.966136][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1023.976300][ T6274] bond0 (unregistering): Released all slaves [ 1023.986593][ T6274] ip6gretap0 (unregistering): left promiscuous mode [ 1024.011478][ T6274] gretap0 (unregistering): left promiscuous mode [ 1024.029566][ T6274] bridge0 (unregistering): left promiscuous mode [ 1024.236407][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1024.246412][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1024.256345][ T6274] bond0 (unregistering): Released all slaves [ 1024.307867][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1024.318536][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1024.328336][ T6274] bond0 (unregistering): Released all slaves [ 1024.386857][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1024.397886][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1024.408025][ T6274] bond0 (unregistering): Released all slaves [ 1024.447148][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1024.455953][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1024.467866][ T6274] hsr_slave_0: left promiscuous mode [ 1024.474124][ T6274] hsr_slave_1: left promiscuous mode [ 1024.481840][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1024.492389][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1024.504306][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1024.512036][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1024.522565][ T6274] hsr_slave_0: left promiscuous mode [ 1024.528560][ T6274] hsr_slave_1: left promiscuous mode [ 1024.534781][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1024.542976][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1024.551093][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1024.558729][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1024.568910][ T6274] hsr_slave_0: left promiscuous mode [ 1024.575357][ T6274] hsr_slave_1: left promiscuous mode [ 1024.581132][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1024.589120][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1024.596948][ T6274] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1024.604751][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1024.622408][ T6274] veth1_macvtap: left allmulticast mode [ 1024.628619][ T6274] veth1_macvtap: left promiscuous mode [ 1024.634340][ T6274] veth0_macvtap: left promiscuous mode [ 1024.639943][ T6274] veth1_vlan: left promiscuous mode [ 1024.645726][ T6274] veth0_vlan: left promiscuous mode [ 1024.651746][ T6274] veth1_macvtap: left promiscuous mode [ 1024.657574][ T6274] veth0_macvtap: left promiscuous mode [ 1024.663134][ T6274] veth1_vlan: left promiscuous mode [ 1024.668828][ T6274] veth0_vlan: left promiscuous mode [ 1024.674875][ T6274] veth1_macvtap: left promiscuous mode [ 1024.680416][ T6274] veth0_macvtap: left promiscuous mode [ 1024.686436][ T6274] veth1_vlan: left promiscuous mode [ 1024.692002][ T6274] veth0_vlan: left promiscuous mode [ 1024.818842][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1024.829364][ T6274] team0 (unregistering): Port device team_slave_0 removed [ 1024.896553][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1024.908911][ T6274] team0 (unregistering): Port device team_slave_0 removed [ 1024.970151][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1024.980681][ T6274] team0 (unregistering): Port device team_slave_0 removed [ 1025.045454][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1025.055915][ T6274] team0 (unregistering): Port device team_slave_0 removed [ 1025.934098][ T6274] bridge_slave_1: left allmulticast mode [ 1025.940043][ T6274] bridge_slave_1: left promiscuous mode [ 1025.946389][ T6274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.954981][ T6274] bridge_slave_0: left allmulticast mode [ 1025.960671][ T6274] bridge_slave_0: left promiscuous mode [ 1025.967044][ T6274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.015352][ T6274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1026.025257][ T6274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1026.035372][ T6274] bond0 (unregistering): Released all slaves [ 1026.088834][ T6274] hsr_slave_0: left promiscuous mode [ 1026.094733][ T6274] hsr_slave_1: left promiscuous mode [ 1026.100902][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1026.109469][ T6274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1026.158772][ T6274] team0 (unregistering): Port device team_slave_1 removed [ 1026.169270][ T6274] team0 (unregistering): Port device team_slave_0 removed